|
![]() |
|||
|
||||
OverviewFull Product DetailsAuthor: Martin Gilje Jaatun , Cyril Onwubiko , Pierangelo Rosati , Aunshul RegePublisher: Springer Nature Switzerland AG Imprint: Springer Nature Switzerland AG ISBN: 9789819604005ISBN 10: 9819604001 Pages: 384 Publication Date: 23 April 2025 Audience: Professional and scholarly , College/higher education , Professional & Vocational , Postgraduate, Research & Scholarly Format: Hardback Publisher's Status: Active Availability: Manufactured on demand ![]() We will order this item for you from a manufactured on demand supplier. Table of ContentsPart 1 Artificial Intelligence Applications.- RingGuard: A privacy protected Peer to Peer Federated Learning Framework.- Improving Credit Card Fraud Detection with Combined Feature Extraction and Class Balance Optimisation Techniques.- Attention based Image Steganography Using CNNs in Integration with Quantization.- Part 2 Advanced Cryptography in Emerging Applications.- vSPACE Voting in a Scalable, Privacy-Aware and Confidential Election.- Design of Pairing Free Attribute based Encryption for Smart Grid Applications.- Critical Infrastructures in the Cloud.- Part 3 Security Operations Centre (SOC) & Advanced Malware Detection Techniques.- An Exemplar Incident Response Plan for Security Operations Center Analysts.- Malware Detection using Machine Learning Algorithms.- A Case Study of a Ransomware and Social Engineering Competition.- Exploring DTrace as an Incident Response Tool for Unix Systems.- Utilizing YARA: An Effective Method for Phishing Attack Response.- Part 4 Threat Intelligence and Emerging Techniques for Fraud Detection and Prevention.- TIPS: Threat Sharing Information Platform for Enhanced Security.- TRIST: Towards a container-based ICS testbed for cyber threat simulation and anomaly detection.- Radio Frequency (RF) Cyber Threats and a novel RF Cyber Kill Chain.- Part 5 Cybersecurity Governance, Risk Management and Assurance.- Perception of cyber risk for assisted living technologies in the Norwegian healthcare sector key stakeholders perceptions.- Workshop Insights: Navigating Cybersecurity Regulations for Device Manufacturers and Healthcare Operators.- Digital Evidence from the Legal Practitioners’ Perspective.- Part 6 Critical Infrastructures, Systems & Applications.- Fuzzing the ARM Cortex-M: A Survey.- Towards a Secure Manufacturing Framework for Single Malt Whisky in Industry 4.0.- Implementation of Zones and Conduits in Industrial Control and Automation Systems.ReviewsAuthor InformationTab Content 6Author Website:Countries AvailableAll regions |