Advancing Innovative Cybersecurity Solutions and Approaches to Protect Digital Ecosystems
First IFIP TC 9, TC 11 International Conference in Cybersecurity, IFIP-UNIVEN-CSIR ICC 2025, Tshwane, South Africa, December 11-12, 2025, Proceedings
Herausgegeben:Mtsweni, Jabu; Kanyane, Modimowabarwa; Phahlamohlaka, Jackie; Munyoka, Willard; Thomson, Kerry-Lynn; Futcher, Lynn; Jansen van Vuuren, Joey
Advancing Innovative Cybersecurity Solutions and Approaches to Protect Digital Ecosystems
First IFIP TC 9, TC 11 International Conference in Cybersecurity, IFIP-UNIVEN-CSIR ICC 2025, Tshwane, South Africa, December 11-12, 2025, Proceedings
Herausgegeben:Mtsweni, Jabu; Kanyane, Modimowabarwa; Phahlamohlaka, Jackie; Munyoka, Willard; Thomson, Kerry-Lynn; Futcher, Lynn; Jansen van Vuuren, Joey
- Gebundenes Buch
- Merkliste
- Auf die Merkliste
- Bewerten Bewerten
- Teilen
- Produkt teilen
- Produkterinnerung
- Produkterinnerung
This book constitutes the proceedings of the First IFIP TC 9, TC 11 International Cybersecurity Conference, IFIP-UNIVEN-CSIR ICC 2025, held in Tshwane, South Africa, in December 2025.
The 17 full papers included in the proceedings were carefully reviewed and selected from 43 submissions. They were organized in topical sections as follows: Security in Emerging and Advanced Technologies (AI/ML and Blockchain); Cybersecurity Governance, Policy, and National Strategies; Cybersecurity Education, Training, and Human Factors; Security Architectures, Models, and Authentication Mechanisms.
Andere Kunden interessierten sich auch für
Applications for Artificial Intelligence and Digital Forensics in National Security121,99 €
Applications for Artificial Intelligence and Digital Forensics in National Security121,99 €
Reza MontasariCyberspace, Cyberterrorism and the International Security in the Fourth Industrial Revolution121,99 €
Reza MontasariCyberspace, Cyberterrorism and the International Security in the Fourth Industrial Revolution121,99 €
Digital Transformation in Policing: The Promise, Perils and Solutions38,99 €
Digital Transformation in Policing: The Promise, Perils and Solutions53,99 €
Eric C. ThompsonCybersecurity Incident Response46,99 €-
-
-
This book constitutes the proceedings of the First IFIP TC 9, TC 11 International Cybersecurity Conference, IFIP-UNIVEN-CSIR ICC 2025, held in Tshwane, South Africa, in December 2025.
The 17 full papers included in the proceedings were carefully reviewed and selected from 43 submissions. They were organized in topical sections as follows: Security in Emerging and Advanced Technologies (AI/ML and Blockchain); Cybersecurity Governance, Policy, and National Strategies; Cybersecurity Education, Training, and Human Factors; Security Architectures, Models, and Authentication Mechanisms.
The 17 full papers included in the proceedings were carefully reviewed and selected from 43 submissions. They were organized in topical sections as follows: Security in Emerging and Advanced Technologies (AI/ML and Blockchain); Cybersecurity Governance, Policy, and National Strategies; Cybersecurity Education, Training, and Human Factors; Security Architectures, Models, and Authentication Mechanisms.
Produktdetails
- Produktdetails
- IFIP Advances in Information and Communication Technology 777
- Verlag: Springer, Berlin; Springer
- Seitenzahl: 272
- Erscheinungstermin: 3. Dezember 2025
- Englisch
- Abmessung: 241mm x 160mm x 21mm
- Gewicht: 574g
- ISBN-13: 9783032130747
- ISBN-10: 3032130743
- Artikelnr.: 75835252
- Herstellerkennzeichnung
- Springer-Verlag GmbH
- Tiergartenstr. 17
- 69121 Heidelberg
- ProductSafety@springernature.com
- IFIP Advances in Information and Communication Technology 777
- Verlag: Springer, Berlin; Springer
- Seitenzahl: 272
- Erscheinungstermin: 3. Dezember 2025
- Englisch
- Abmessung: 241mm x 160mm x 21mm
- Gewicht: 574g
- ISBN-13: 9783032130747
- ISBN-10: 3032130743
- Artikelnr.: 75835252
- Herstellerkennzeichnung
- Springer-Verlag GmbH
- Tiergartenstr. 17
- 69121 Heidelberg
- ProductSafety@springernature.com
.- Security in Emerging & Advanced Technologies (AI/ML & Blockchain).
.- Security Risks in Large Language Models and General Mitigation
Strategies.
.- AI-Blockchain Synergy for Next-Generation Cybersecurity Adaptive,
Ethical, and Efficient Architectures.
.- From Regex to Transformers: A Hybrid Framework for Cyber Threat
Indicator Extraction from Unstructured Text .
.- Towards facial expression analysis for enhanced threat detection in
surveillance.
.- Securing Agricultural Sustainability: Integrating Digital Twins and
Blockchain for Smart Farming.
.- Cybersecurity Governance, Policy, and National Strategies.
.- African Cyber Power: Establishing a Strategic Rationale for Offensive
Cyber Power Capabilities. The Case of South Africa.
.- Addressing Evolving Cybersecurity Threats from Industrial Internet of
Things (IIoT) Adoption Through Improved Cybersecurity Governance.
.- Digital Literacy and the challenge for NIST compliance in developing
countries.
.- Privacy by design for GDPR Compliance Assessment.
.- Cybersecurity Education, Training, and Human Factors.
.- Identifying Gaps in the Evaluation of Security Education, Training and
Awareness (SETA) Programs: A Systematic Literature Review.
.- Teaching Cybersecurity through Practice: Approaches and Insights.
.- The Influence of Cybersecurity Fatigue on Students’ Compliance with
Cybersecurity Measures.
.- Beyond Smoke Signals: A Conceptual Model Positioning Burnout and Quiet
Quitting in Cybersecurity Professionals.
.- Security Architectures, Models, and Authentication Mechanisms.
.- Multidimensional Review of Cybersecurity Vulnerabilities in E-Government
Systems: The Case of South Africa.
.- Managing Risks and Improving Cyber Resilience – Assessing Mobile
Application Security using a Reference Model.
.- Enhancing Digital Wallet Security: A Systematic Comparison of
Passwordless and Risk-Based Authentication Approaches.
.- Diagnosability of Attack Trees.
.- Security Risks in Large Language Models and General Mitigation
Strategies.
.- AI-Blockchain Synergy for Next-Generation Cybersecurity Adaptive,
Ethical, and Efficient Architectures.
.- From Regex to Transformers: A Hybrid Framework for Cyber Threat
Indicator Extraction from Unstructured Text .
.- Towards facial expression analysis for enhanced threat detection in
surveillance.
.- Securing Agricultural Sustainability: Integrating Digital Twins and
Blockchain for Smart Farming.
.- Cybersecurity Governance, Policy, and National Strategies.
.- African Cyber Power: Establishing a Strategic Rationale for Offensive
Cyber Power Capabilities. The Case of South Africa.
.- Addressing Evolving Cybersecurity Threats from Industrial Internet of
Things (IIoT) Adoption Through Improved Cybersecurity Governance.
.- Digital Literacy and the challenge for NIST compliance in developing
countries.
.- Privacy by design for GDPR Compliance Assessment.
.- Cybersecurity Education, Training, and Human Factors.
.- Identifying Gaps in the Evaluation of Security Education, Training and
Awareness (SETA) Programs: A Systematic Literature Review.
.- Teaching Cybersecurity through Practice: Approaches and Insights.
.- The Influence of Cybersecurity Fatigue on Students’ Compliance with
Cybersecurity Measures.
.- Beyond Smoke Signals: A Conceptual Model Positioning Burnout and Quiet
Quitting in Cybersecurity Professionals.
.- Security Architectures, Models, and Authentication Mechanisms.
.- Multidimensional Review of Cybersecurity Vulnerabilities in E-Government
Systems: The Case of South Africa.
.- Managing Risks and Improving Cyber Resilience – Assessing Mobile
Application Security using a Reference Model.
.- Enhancing Digital Wallet Security: A Systematic Comparison of
Passwordless and Risk-Based Authentication Approaches.
.- Diagnosability of Attack Trees.
.- Security in Emerging & Advanced Technologies (AI/ML & Blockchain).
.- Security Risks in Large Language Models and General Mitigation
Strategies.
.- AI-Blockchain Synergy for Next-Generation Cybersecurity Adaptive,
Ethical, and Efficient Architectures.
.- From Regex to Transformers: A Hybrid Framework for Cyber Threat
Indicator Extraction from Unstructured Text .
.- Towards facial expression analysis for enhanced threat detection in
surveillance.
.- Securing Agricultural Sustainability: Integrating Digital Twins and
Blockchain for Smart Farming.
.- Cybersecurity Governance, Policy, and National Strategies.
.- African Cyber Power: Establishing a Strategic Rationale for Offensive
Cyber Power Capabilities. The Case of South Africa.
.- Addressing Evolving Cybersecurity Threats from Industrial Internet of
Things (IIoT) Adoption Through Improved Cybersecurity Governance.
.- Digital Literacy and the challenge for NIST compliance in developing
countries.
.- Privacy by design for GDPR Compliance Assessment.
.- Cybersecurity Education, Training, and Human Factors.
.- Identifying Gaps in the Evaluation of Security Education, Training and
Awareness (SETA) Programs: A Systematic Literature Review.
.- Teaching Cybersecurity through Practice: Approaches and Insights.
.- The Influence of Cybersecurity Fatigue on Students’ Compliance with
Cybersecurity Measures.
.- Beyond Smoke Signals: A Conceptual Model Positioning Burnout and Quiet
Quitting in Cybersecurity Professionals.
.- Security Architectures, Models, and Authentication Mechanisms.
.- Multidimensional Review of Cybersecurity Vulnerabilities in E-Government
Systems: The Case of South Africa.
.- Managing Risks and Improving Cyber Resilience – Assessing Mobile
Application Security using a Reference Model.
.- Enhancing Digital Wallet Security: A Systematic Comparison of
Passwordless and Risk-Based Authentication Approaches.
.- Diagnosability of Attack Trees.
.- Security Risks in Large Language Models and General Mitigation
Strategies.
.- AI-Blockchain Synergy for Next-Generation Cybersecurity Adaptive,
Ethical, and Efficient Architectures.
.- From Regex to Transformers: A Hybrid Framework for Cyber Threat
Indicator Extraction from Unstructured Text .
.- Towards facial expression analysis for enhanced threat detection in
surveillance.
.- Securing Agricultural Sustainability: Integrating Digital Twins and
Blockchain for Smart Farming.
.- Cybersecurity Governance, Policy, and National Strategies.
.- African Cyber Power: Establishing a Strategic Rationale for Offensive
Cyber Power Capabilities. The Case of South Africa.
.- Addressing Evolving Cybersecurity Threats from Industrial Internet of
Things (IIoT) Adoption Through Improved Cybersecurity Governance.
.- Digital Literacy and the challenge for NIST compliance in developing
countries.
.- Privacy by design for GDPR Compliance Assessment.
.- Cybersecurity Education, Training, and Human Factors.
.- Identifying Gaps in the Evaluation of Security Education, Training and
Awareness (SETA) Programs: A Systematic Literature Review.
.- Teaching Cybersecurity through Practice: Approaches and Insights.
.- The Influence of Cybersecurity Fatigue on Students’ Compliance with
Cybersecurity Measures.
.- Beyond Smoke Signals: A Conceptual Model Positioning Burnout and Quiet
Quitting in Cybersecurity Professionals.
.- Security Architectures, Models, and Authentication Mechanisms.
.- Multidimensional Review of Cybersecurity Vulnerabilities in E-Government
Systems: The Case of South Africa.
.- Managing Risks and Improving Cyber Resilience – Assessing Mobile
Application Security using a Reference Model.
.- Enhancing Digital Wallet Security: A Systematic Comparison of
Passwordless and Risk-Based Authentication Approaches.
.- Diagnosability of Attack Trees.







