This book constitutes the refereed post-conference proceedings of the 23rd International Conference on Information Security, ISSA 2024, held in Gqeberha, South Africa, during December 2-3, 2024. The 21 full papers presented were carefully reviewed and selected from 55 submissions. The papers focus on topics such as Cyber security; Information Security; Network Security; Computer Security; Digital Forensics; Botnets; Security in Cloud Computing; ChatBot security; Insider Threats; NIDS; GANs and Malware; Privacy; Cyber security Education; Cyber security & AI; Digital Forensics & AI.
This book constitutes the refereed post-conference proceedings of the 23rd International Conference on Information Security, ISSA 2024, held in Gqeberha, South Africa, during December 2-3, 2024.
The 21 full papers presented were carefully reviewed and selected from 55 submissions. The papers focus on topics such as Cyber security; Information Security; Network Security; Computer Security; Digital Forensics; Botnets; Security in Cloud Computing; ChatBot security; Insider Threats; NIDS; GANs and Malware; Privacy; Cyber security Education; Cyber security & AI; Digital Forensics & AI.
Produktdetails
Produktdetails
Communications in Computer and Information Science 2661
.- A Rapid Review Cybersecurity Strategic Analysis Framework: The Case of Higher Education Institutions. .- Privacy and Legal Implications Regarding the Processing of Honeypot Data. .- Social Network Graphs in Email Forensics: Analysis of a Personal Email Dataset. .- Smoke Signals: Analysing and Decoding Quiet Quitting and Burnout Among Cybersecurity Professionals. .- Solving the Privacy and Security Challenge using ZKP: Its Positive Impact on the Economy. .- Biometric authentication: Stress as a factor in keystroke dynamics. .- Profiling Prominent Ransomware Threat Actors. .- Trust Requirements and Mechanisms in Peer-to-Peer Energy Markets. .- Contextual Factors influencing the Cybersecurity Commitment of Government Institutions in Developing Countries. .- Digital Forensic Investigation and Linguistic Analysis of Cybercrime: A Systematic Review. .- Conceptual Model for Taxation and Regulatory Governance among South African Crypto Asset Holders. .- Countering mobile application threats through a structured threat modelling approach. .- Enhancing Forensic Readiness through an Integrated Approach to Fraud Risk Management throughout the Digital Transformation Lifecycle. .- Guidance for the Creation of Management and Cost Accounting Computerized Infor mation Systems: Assurance of Information Integrity and Flexibility. .- A chatbot LLM based access control mechanism. .- Factors influencing Sensitive Data Protection practices in South African public schools. .- Changes in Observed Internet Background Radiation Traffic in the 155/8 netblock. .- Using artificial intelligence techniques to standardize and automated generation of digital forensic reports. .- Exploring the Cybersecurity-Resilience Gap: An Analysis of Student Attitudes and Behaviors in Higher Education. .- A Decentralized E-voting System Using Blockchain. .- Lacking Balance? Assessing the Content and Coverage of Cyber Security Degrees.
.- A Rapid Review Cybersecurity Strategic Analysis Framework: The Case of Higher Education Institutions. .- Privacy and Legal Implications Regarding the Processing of Honeypot Data. .- Social Network Graphs in Email Forensics: Analysis of a Personal Email Dataset. .- Smoke Signals: Analysing and Decoding Quiet Quitting and Burnout Among Cybersecurity Professionals. .- Solving the Privacy and Security Challenge using ZKP: Its Positive Impact on the Economy. .- Biometric authentication: Stress as a factor in keystroke dynamics. .- Profiling Prominent Ransomware Threat Actors. .- Trust Requirements and Mechanisms in Peer-to-Peer Energy Markets. .- Contextual Factors influencing the Cybersecurity Commitment of Government Institutions in Developing Countries. .- Digital Forensic Investigation and Linguistic Analysis of Cybercrime: A Systematic Review. .- Conceptual Model for Taxation and Regulatory Governance among South African Crypto Asset Holders. .- Countering mobile application threats through a structured threat modelling approach. .- Enhancing Forensic Readiness through an Integrated Approach to Fraud Risk Management throughout the Digital Transformation Lifecycle. .- Guidance for the Creation of Management and Cost Accounting Computerized Infor mation Systems: Assurance of Information Integrity and Flexibility. .- A chatbot LLM based access control mechanism. .- Factors influencing Sensitive Data Protection practices in South African public schools. .- Changes in Observed Internet Background Radiation Traffic in the 155/8 netblock. .- Using artificial intelligence techniques to standardize and automated generation of digital forensic reports. .- Exploring the Cybersecurity-Resilience Gap: An Analysis of Student Attitudes and Behaviors in Higher Education. .- A Decentralized E-voting System Using Blockchain. .- Lacking Balance? Assessing the Content and Coverage of Cyber Security Degrees.
Es gelten unsere Allgemeinen Geschäftsbedingungen: www.buecher.de/agb
Impressum
www.buecher.de ist ein Internetauftritt der buecher.de internetstores GmbH
Geschäftsführung: Monica Sawhney | Roland Kölbl | Günter Hilger
Sitz der Gesellschaft: Batheyer Straße 115 - 117, 58099 Hagen
Postanschrift: Bürgermeister-Wegele-Str. 12, 86167 Augsburg
Amtsgericht Hagen HRB 13257
Steuernummer: 321/5800/1497
USt-IdNr: DE450055826