• Neu
Jaatun / Onwubiko / Rosati | Proceedings of the International Conference on Cybersecurity, Situational Awareness and Social Media | E-Book | sack.de
E-Book

E-Book, Englisch, 384 Seiten

Reihe: Springer Proceedings in Complexity

Jaatun / Onwubiko / Rosati Proceedings of the International Conference on Cybersecurity, Situational Awareness and Social Media

Cyber Science 2024; 27–28 June; Edinburgh Napier University, Scotland
1. Auflage 2025
ISBN: 978-981-960401-2
Verlag: Springer Singapore
Format: PDF
Kopierschutz: 1 - PDF Watermark

Cyber Science 2024; 27–28 June; Edinburgh Napier University, Scotland

E-Book, Englisch, 384 Seiten

Reihe: Springer Proceedings in Complexity

ISBN: 978-981-960401-2
Verlag: Springer Singapore
Format: PDF
Kopierschutz: 1 - PDF Watermark



This book presents peer-reviewed articles from Cyber Science 2024, held on 27–28 June at Edinburgh Napier University in Scotland. With no competing conferences in this unique and specialized area (cyber science), especially focusing on the application of situation awareness to cyber security (CS), artificial intelligence, blockchain technologies, cyber physical systems (CPS), social media and cyber incident response, it presents a fusion of these unique and multidisciplinary areas into one that serves a wider audience making this conference a sought-after event. Hence, this proceedings offers a cutting edge and fast reaching forum for organizations to learn, network, and promote their services. Also, it offers professionals, students, and practitioners a platform to learn new and emerging disciplines.

Jaatun / Onwubiko / Rosati Proceedings of the International Conference on Cybersecurity, Situational Awareness and Social Media jetzt bestellen!

Zielgruppe


Professional/practitioner

Weitere Infos & Material


Part 1 Artificial Intelligence Applications.- RingGuard: A privacy protected Peer to Peer Federated Learning Framework.-  Improving Credit Card Fraud Detection with Combined Feature Extraction and Class Balance Optimisation Techniques.-  Attention based Image Steganography Using CNNs in Integration with Quantization.- Part 2 Advanced Cryptography in Emerging Applications.- vSPACE Voting in a Scalable, Privacy-Aware and Confidential Election.- Design of Pairing Free Attribute based Encryption for Smart Grid Applications.- Critical Infrastructures in the Cloud.- Part 3 Security Operations Centre (SOC) & Advanced Malware Detection Techniques.- An Exemplar Incident Response Plan for Security Operations Center Analysts.- Malware Detection using Machine Learning Algorithms.- A Case Study of a Ransomware and Social Engineering Competition.- Exploring DTrace as an Incident Response Tool for Unix Systems.- Utilizing YARA: An Effective Method for Phishing Attack Response.- Part 4 Threat Intelligence and Emerging Techniques for Fraud Detection and Prevention.- TIPS: Threat Sharing Information Platform for Enhanced Security.- TRIST: Towards a container-based ICS testbed for cyber threat simulation and anomaly detection.- Radio Frequency (RF) Cyber Threats and a novel RF Cyber Kill Chain.- Part 5 Cybersecurity Governance, Risk Management and Assurance.- Perception of cyber risk for assisted living technologies in the Norwegian healthcare sector key stakeholders perceptions.- Workshop Insights: Navigating Cybersecurity Regulations for Device Manufacturers and Healthcare Operators.- Digital Evidence from the Legal Practitioners’ Perspective.- Part 6 Critical Infrastructures, Systems & Applications.- Fuzzing the ARM Cortex-M: A Survey.- Towards a Secure Manufacturing Framework for Single Malt Whisky in Industry 4.0.- Implementation of Zones and Conduits in Industrial Control and Automation Systems.



Ihre Fragen, Wünsche oder Anmerkungen
Vorname*
Nachname*
Ihre E-Mail-Adresse*
Kundennr.
Ihre Nachricht*
Lediglich mit * gekennzeichnete Felder sind Pflichtfelder.
Wenn Sie die im Kontaktformular eingegebenen Daten durch Klick auf den nachfolgenden Button übersenden, erklären Sie sich damit einverstanden, dass wir Ihr Angaben für die Beantwortung Ihrer Anfrage verwenden. Selbstverständlich werden Ihre Daten vertraulich behandelt und nicht an Dritte weitergegeben. Sie können der Verwendung Ihrer Daten jederzeit widersprechen. Das Datenhandling bei Sack Fachmedien erklären wir Ihnen in unserer Datenschutzerklärung.