libri scuola books Fumetti ebook dvd top ten sconti 0 Carrello


Torna Indietro

jaatun martin gilje (curatore); onwubiko cyril (curatore); rosati pierangelo (curatore); rege aunshul (curatore); hindy hanan (curatore); erola arnau (curatore); bellekens xavier (curatore) - proceedings of the international conference on cybersecurity, situational awareness and social media
Zoom

Proceedings of the International Conference on Cybersecurity, Situational Awareness and Social Media Cyber Science 2024; 27–28 June; Edinburgh Napier University, Scotland

; ; ; ; ; ;




Disponibilità: Normalmente disponibile in 15 giorni


PREZZO
237,98 €
NICEPRICE
226,08 €
SCONTO
5%



Questo prodotto usufruisce delle SPEDIZIONI GRATIS
selezionando l'opzione Corriere Veloce in fase di ordine.


Pagabile anche con Carta della cultura giovani e del merito, 18App Bonus Cultura e Carta del Docente


Facebook Twitter Aggiungi commento


Spese Gratis

Dettagli

Genere:Libro
Lingua: Inglese
Editore:

Springer

Pubblicazione: 04/2025





Trama

This book presents peer-reviewed articles from Cyber Science 2024, held on 27–28 June at Edinburgh Napier University in Scotland. With no competing conferences in this unique and specialized area (cyber science), especially focusing on the application of situation awareness to cyber security (CS), artificial intelligence, blockchain technologies, cyber physical systems (CPS), social media and cyber incident response, it presents a fusion of these unique and multidisciplinary areas into one that serves a wider audience making this conference a sought-after event. Hence, this proceedings offers a cutting edge and fast reaching forum for organizations to learn, network, and promote their services. Also, it offers professionals, students, and practitioners a platform to learn new and emerging disciplines.





Sommario

Part 1 Artificial Intelligence Applications.- RingGuard: A privacy protected Peer to Peer Federated Learning Framework.-  Improving Credit Card Fraud Detection with Combined Feature Extraction and Class Balance Optimisation Techniques.-  Attention based Image Steganography Using CNNs in Integration with Quantization.- Part 2 Advanced Cryptography in Emerging Applications.- vSPACE Voting in a Scalable, Privacy-Aware and Confidential Election.- Design of Pairing Free Attribute based Encryption for Smart Grid Applications.- Critical Infrastructures in the Cloud.- Part 3 Security Operations Centre (SOC) & Advanced Malware Detection Techniques.- An Exemplar Incident Response Plan for Security Operations Center Analysts.- Malware Detection using Machine Learning Algorithms.- A Case Study of a Ransomware and Social Engineering Competition.- Exploring DTrace as an Incident Response Tool for Unix Systems.- Utilizing YARA: An Effective Method for Phishing Attack Response.- Part 4 Threat Intelligence and Emerging Techniques for Fraud Detection and Prevention.- TIPS: Threat Sharing Information Platform for Enhanced Security.- TRIST: Towards a container-based ICS testbed for cyber threat simulation and anomaly detection.- Radio Frequency (RF) Cyber Threats and a novel RF Cyber Kill Chain.- Part 5 Cybersecurity Governance, Risk Management and Assurance.- Perception of cyber risk for assisted living technologies in the Norwegian healthcare sector key stakeholders perceptions.- Workshop Insights: Navigating Cybersecurity Regulations for Device Manufacturers and Healthcare Operators.- Digital Evidence from the Legal Practitioners’ Perspective.- Part 6 Critical Infrastructures, Systems & Applications.- Fuzzing the ARM Cortex-M: A Survey.- Towards a Secure Manufacturing Framework for Single Malt Whisky in Industry 4.0.- Implementation of Zones and Conduits in Industrial Control and Automation Systems.











Altre Informazioni

ISBN:

9789819604005

Condizione: Nuovo
Collana: Springer Proceedings in Complexity
Dimensioni: 235 x 155 mm
Formato: Copertina rigida
Illustration Notes:XXII, 384 p. 122 illus., 100 illus. in color.
Pagine Arabe: 384
Pagine Romane: xxii


Dicono di noi