Advancing Innovative Cybersecurity Solutions and Approaches to Protect Digital Ecosystems, Gebunden
Advancing Innovative Cybersecurity Solutions and Approaches to Protect Digital Ecosystems
- First IFIP TC 9, TC 11 International Conference in Cybersecurity, IFIP-UNIVEN-CSIR ICC 2025, Tshwane, South Africa, December 11-12, 2025, Proceedings
(soweit verfügbar beim Lieferanten)
- Herausgeber:
- Jabu Mtsweni, Modimowabarwa Kanyane, Jackie Phahlamohlaka, Willard Munyoka, Kerry-Lynn Thomson, Lynn Futcher, Joey Jansen van Vuuren
- Verlag:
- Springer, 12/2025
- Einband:
- Gebunden
- Sprache:
- Englisch
- ISBN-13:
- 9783032130747
- Artikelnummer:
- 12587486
- Umfang:
- 272 Seiten
- Gewicht:
- 574 g
- Maße:
- 241 x 160 mm
- Stärke:
- 21 mm
- Erscheinungstermin:
- 3.12.2025
- Hinweis
-
Achtung: Artikel ist nicht in deutscher Sprache!
Klappentext
.- Security in Emerging & Advanced Technologies (AI/ML & Blockchain). .- Security Risks in Large Language Models and General Mitigation Strategies. .- AI-Blockchain Synergy for Next-Generation Cybersecurity Adaptive, Ethical, and Efficient Architectures. .- From Regex to Transformers: A Hybrid Framework for Cyber Threat Indicator Extraction from Unstructured Text . .- Towards facial expression analysis for enhanced threat detection in surveillance. .- Securing Agricultural Sustainability: Integrating Digital Twins and Blockchain for Smart Farming. .- Cybersecurity Governance, Policy, and National Strategies. .- African Cyber Power: Establishing a Strategic Rationale for Offensive Cyber Power Capabilities. The Case of South Africa. .- Addressing Evolving Cybersecurity Threats from Industrial Internet of Things (IIoT) Adoption Through Improved Cybersecurity Governance. .- Digital Literacy and the challenge for NIST compliance in developing countries. .- Privacy by design for GDPR Compliance Assessment. .- Cybersecurity Education, Training, and Human Factors. .- Identifying Gaps in the Evaluation of Security Education, Training and Awareness (SETA) Programs: A Systematic Literature Review. .- Teaching Cybersecurity through Practice: Approaches and Insights. .- The Influence of Cybersecurity Fatigue on Students' Compliance with Cybersecurity Measures. .- Beyond Smoke Signals: A Conceptual Model Positioning Burnout and Quiet Quitting in Cybersecurity Professionals. .- Security Architectures, Models, and Authentication Mechanisms. .- Multidimensional Review of Cybersecurity Vulnerabilities in E-Government Systems: The Case of South Africa. .- Managing Risks and Improving Cyber Resilience -- Assessing Mobile Application Security using a Reference Model. .- Enhancing Digital Wallet Security: A Systematic Comparison of Passwordless and Risk-Based Authentication Approaches. .- Diagnosability of Attack Trees.