Information and Cyber Security (eBook, PDF)
23rd International Conference, ISSA 2024, Gqeberha, South Africa, December 2-3, 2024, Revised Selected Papers
Redaktion: Venter, Hein; Mushtaq, Umer; Loock, Marianne; Botha, Reinhardt; Eloff, Jan; Eloff, Mariki
Alle Infos zum eBook verschenken
Information and Cyber Security (eBook, PDF)
23rd International Conference, ISSA 2024, Gqeberha, South Africa, December 2-3, 2024, Revised Selected Papers
Redaktion: Venter, Hein; Mushtaq, Umer; Loock, Marianne; Botha, Reinhardt; Eloff, Jan; Eloff, Mariki
- Format: PDF
- Merkliste
- Auf die Merkliste
- Bewerten Bewerten
- Teilen
- Produkt teilen
- Produkterinnerung
- Produkterinnerung

Hier können Sie sich einloggen

Bitte loggen Sie sich zunächst in Ihr Kundenkonto ein oder registrieren Sie sich bei bücher.de, um das eBook-Abo tolino select nutzen zu können.
This book constitutes the refereed post-conference proceedings of the 23rd International Conference on Information Security, ISSA 2024, held in Gqeberha, South Africa, during December 2-3, 2024.
The 21 full papers presented were carefully reviewed and selected from 55 submissions. The papers focus on topics such as Cyber security; Information Security; Network Security; Computer Security; Digital Forensics; Botnets; Security in Cloud Computing; ChatBot security; Insider Threats; NIDS; GANs and Malware; Privacy; Cyber security Education; Cyber security & AI; Digital Forensics & AI.
- Geräte: PC
- ohne Kopierschutz
- eBook Hilfe
- Größe: 17.07MB
Constructive Approaches for Security Analysis and Design of Embedded Systems (eBook, PDF)59,95 €
Financial Cryptography and Data Security. FC 2025 International Workshops (eBook, PDF)59,95 €
Financial Cryptography and Data Security. FC 2025 International Workshops (eBook, PDF)59,95 €
Information and Communications Security (eBook, PDF)40,95 €
Jeff StapletonSecurity without Obscurity (eBook, PDF)44,95 €
Anne V. D. M. KayemAdaptive Cryptographic Access Control (eBook, PDF)72,95 €
Progress in Cryptology - LATINCRYPT 2025 (eBook, PDF)59,95 €-
-
-
The 21 full papers presented were carefully reviewed and selected from 55 submissions. The papers focus on topics such as Cyber security; Information Security; Network Security; Computer Security; Digital Forensics; Botnets; Security in Cloud Computing; ChatBot security; Insider Threats; NIDS; GANs and Malware; Privacy; Cyber security Education; Cyber security & AI; Digital Forensics & AI.
Dieser Download kann aus rechtlichen Gründen nur mit Rechnungsadresse in A, B, BG, CY, CZ, D, DK, EW, E, FIN, F, GR, HR, H, IRL, I, LT, L, LR, M, NL, PL, P, R, S, SLO, SK ausgeliefert werden.
- Produktdetails
- Verlag: Springer International Publishing
- Seitenzahl: 218
- Erscheinungstermin: 14. November 2025
- Englisch
- ISBN-13: 9783032096609
- Artikelnr.: 75897962
- Verlag: Springer International Publishing
- Seitenzahl: 218
- Erscheinungstermin: 14. November 2025
- Englisch
- ISBN-13: 9783032096609
- Artikelnr.: 75897962
- Herstellerkennzeichnung Die Herstellerinformationen sind derzeit nicht verfügbar.
Higher Education Institutions.
.- Privacy and Legal Implications Regarding the Processing of Honeypot
Data.
.- Social Network Graphs in Email Forensics: Analysis of a Personal Email
Dataset.
.- Smoke Signals: Analysing and Decoding Quiet Quitting and Burnout Among
Cybersecurity Professionals.
.- Solving the Privacy and Security Challenge using ZKP: Its Positive
Impact on the
Economy.
.- Biometric authentication: Stress as a factor in keystroke dynamics.
.- Profiling Prominent Ransomware Threat Actors.
.- Trust Requirements and Mechanisms in Peer-to-Peer Energy Markets.
.- Contextual Factors influencing the Cybersecurity Commitment of
Government Institutions in Developing Countries.
.- Digital Forensic Investigation and Linguistic Analysis of Cybercrime: A
Systematic
Review.
.- Conceptual Model for Taxation and Regulatory Governance among South
African
Crypto Asset Holders.
.- Countering mobile application threats through a structured threat
modelling approach.
.- Enhancing Forensic Readiness through an Integrated Approach to Fraud
Risk Management throughout the Digital Transformation Lifecycle.
.- Guidance for the Creation of Management and Cost Accounting Computerized
Infor mation Systems: Assurance of Information Integrity and Flexibility.
.- A chatbot LLM based access control mechanism.
.- Factors influencing Sensitive Data Protection practices in South African
public schools.
.- Changes in Observed Internet Background Radiation Traffic in the 155/8
netblock.
.- Using artificial intelligence techniques to standardize and automated
generation of digital forensic reports.
.- Exploring the Cybersecurity-Resilience Gap: An Analysis of Student
Attitudes and Behaviors in Higher Education.
.- A Decentralized E-voting System Using Blockchain.
.- Lacking Balance? Assessing the Content and Coverage of Cyber Security
Degrees.
Higher Education Institutions.
.- Privacy and Legal Implications Regarding the Processing of Honeypot
Data.
.- Social Network Graphs in Email Forensics: Analysis of a Personal Email
Dataset.
.- Smoke Signals: Analysing and Decoding Quiet Quitting and Burnout Among
Cybersecurity Professionals.
.- Solving the Privacy and Security Challenge using ZKP: Its Positive
Impact on the
Economy.
.- Biometric authentication: Stress as a factor in keystroke dynamics.
.- Profiling Prominent Ransomware Threat Actors.
.- Trust Requirements and Mechanisms in Peer-to-Peer Energy Markets.
.- Contextual Factors influencing the Cybersecurity Commitment of
Government Institutions in Developing Countries.
.- Digital Forensic Investigation and Linguistic Analysis of Cybercrime: A
Systematic
Review.
.- Conceptual Model for Taxation and Regulatory Governance among South
African
Crypto Asset Holders.
.- Countering mobile application threats through a structured threat
modelling approach.
.- Enhancing Forensic Readiness through an Integrated Approach to Fraud
Risk Management throughout the Digital Transformation Lifecycle.
.- Guidance for the Creation of Management and Cost Accounting Computerized
Infor mation Systems: Assurance of Information Integrity and Flexibility.
.- A chatbot LLM based access control mechanism.
.- Factors influencing Sensitive Data Protection practices in South African
public schools.
.- Changes in Observed Internet Background Radiation Traffic in the 155/8
netblock.
.- Using artificial intelligence techniques to standardize and automated
generation of digital forensic reports.
.- Exploring the Cybersecurity-Resilience Gap: An Analysis of Student
Attitudes and Behaviors in Higher Education.
.- A Decentralized E-voting System Using Blockchain.
.- Lacking Balance? Assessing the Content and Coverage of Cyber Security
Degrees.







