Sie sind bereits eingeloggt. Klicken Sie auf 2. tolino select Abo, um fortzufahren.
Bitte loggen Sie sich zunächst in Ihr Kundenkonto ein oder registrieren Sie sich bei bücher.de, um das eBook-Abo tolino select nutzen zu können.
This book constitutes the proceedings of the First IFIP TC 9, TC 11 International Cybersecurity Conference, IFIP-UNIVEN-CSIR ICC 2025, held in Tshwane, South Africa, in December 2025. The 17 full papers included in the proceedings were carefully reviewed and selected from 43 submissions. They were organized in topical sections as follows: Security in Emerging and Advanced Technologies (AI/ML and Blockchain); Cybersecurity Governance, Policy, and National Strategies; Cybersecurity Education, Training, and Human Factors; Security Architectures, Models, and Authentication Mechanisms.
This book constitutes the proceedings of the First IFIP TC 9, TC 11 International Cybersecurity Conference, IFIP-UNIVEN-CSIR ICC 2025, held in Tshwane, South Africa, in December 2025.
The 17 full papers included in the proceedings were carefully reviewed and selected from 43 submissions. They were organized in topical sections as follows: Security in Emerging and Advanced Technologies (AI/ML and Blockchain); Cybersecurity Governance, Policy, and National Strategies; Cybersecurity Education, Training, and Human Factors; Security Architectures, Models, and Authentication Mechanisms.
Dieser Download kann aus rechtlichen Gründen nur mit Rechnungsadresse in A, B, BG, CY, CZ, D, DK, EW, E, FIN, F, GR, HR, H, IRL, I, LT, L, LR, M, NL, PL, P, R, S, SLO, SK ausgeliefert werden.
Die Herstellerinformationen sind derzeit nicht verfügbar.
Inhaltsangabe
.- Security in Emerging & Advanced Technologies (AI/ML & Blockchain). .- Security Risks in Large Language Models and General Mitigation Strategies. .- AI-Blockchain Synergy for Next-Generation Cybersecurity Adaptive, Ethical, and Efficient Architectures. .- From Regex to Transformers: A Hybrid Framework for Cyber Threat Indicator Extraction from Unstructured Text . .- Towards facial expression analysis for enhanced threat detection in surveillance. .- Securing Agricultural Sustainability: Integrating Digital Twins and Blockchain for Smart Farming. .- Cybersecurity Governance, Policy, and National Strategies. .- African Cyber Power: Establishing a Strategic Rationale for Offensive Cyber Power Capabilities. The Case of South Africa. .- Addressing Evolving Cybersecurity Threats from Industrial Internet of Things (IIoT) Adoption Through Improved Cybersecurity Governance. .- Digital Literacy and the challenge for NIST compliance in developing countries. .- Privacy by design for GDPR Compliance Assessment. .- Cybersecurity Education, Training, and Human Factors. .- Identifying Gaps in the Evaluation of Security Education, Training and Awareness (SETA) Programs: A Systematic Literature Review. .- Teaching Cybersecurity through Practice: Approaches and Insights. .- The Influence of Cybersecurity Fatigue on Students’ Compliance with Cybersecurity Measures. .- Beyond Smoke Signals: A Conceptual Model Positioning Burnout and Quiet Quitting in Cybersecurity Professionals. .- Security Architectures, Models, and Authentication Mechanisms. .- Multidimensional Review of Cybersecurity Vulnerabilities in E-Government Systems: The Case of South Africa. .- Managing Risks and Improving Cyber Resilience – Assessing Mobile Application Security using a Reference Model. .- Enhancing Digital Wallet Security: A Systematic Comparison of Passwordless and Risk-Based Authentication Approaches. .- Diagnosability of Attack Trees.
.- Security in Emerging & Advanced Technologies (AI/ML & Blockchain). .- Security Risks in Large Language Models and General Mitigation Strategies. .- AI-Blockchain Synergy for Next-Generation Cybersecurity Adaptive, Ethical, and Efficient Architectures. .- From Regex to Transformers: A Hybrid Framework for Cyber Threat Indicator Extraction from Unstructured Text . .- Towards facial expression analysis for enhanced threat detection in surveillance. .- Securing Agricultural Sustainability: Integrating Digital Twins and Blockchain for Smart Farming. .- Cybersecurity Governance, Policy, and National Strategies. .- African Cyber Power: Establishing a Strategic Rationale for Offensive Cyber Power Capabilities. The Case of South Africa. .- Addressing Evolving Cybersecurity Threats from Industrial Internet of Things (IIoT) Adoption Through Improved Cybersecurity Governance. .- Digital Literacy and the challenge for NIST compliance in developing countries. .- Privacy by design for GDPR Compliance Assessment. .- Cybersecurity Education, Training, and Human Factors. .- Identifying Gaps in the Evaluation of Security Education, Training and Awareness (SETA) Programs: A Systematic Literature Review. .- Teaching Cybersecurity through Practice: Approaches and Insights. .- The Influence of Cybersecurity Fatigue on Students’ Compliance with Cybersecurity Measures. .- Beyond Smoke Signals: A Conceptual Model Positioning Burnout and Quiet Quitting in Cybersecurity Professionals. .- Security Architectures, Models, and Authentication Mechanisms. .- Multidimensional Review of Cybersecurity Vulnerabilities in E-Government Systems: The Case of South Africa. .- Managing Risks and Improving Cyber Resilience – Assessing Mobile Application Security using a Reference Model. .- Enhancing Digital Wallet Security: A Systematic Comparison of Passwordless and Risk-Based Authentication Approaches. .- Diagnosability of Attack Trees.
Es gelten unsere Allgemeinen Geschäftsbedingungen: www.buecher.de/agb
Impressum
www.buecher.de ist ein Internetauftritt der buecher.de internetstores GmbH
Geschäftsführung: Monica Sawhney | Roland Kölbl | Günter Hilger
Sitz der Gesellschaft: Batheyer Straße 115 - 117, 58099 Hagen
Postanschrift: Bürgermeister-Wegele-Str. 12, 86167 Augsburg
Amtsgericht Hagen HRB 13257
Steuernummer: 321/5800/1497
USt-IdNr: DE450055826