Proceedings of the International Conference on Cybersecurity, Situational Awareness and Social Media: Cyber Science 2024; 27–28 June; Edinburgh Napier University, Scotland

Author:   Martin Gilje Jaatun ,  Cyril Onwubiko ,  Pierangelo Rosati ,  Aunshul Rege
Publisher:   Springer Nature Switzerland AG
ISBN:  

9789819604005


Pages:   384
Publication Date:   23 April 2025
Format:   Hardback
Availability:   Manufactured on demand   Availability explained
We will order this item for you from a manufactured on demand supplier.

Our Price $517.47 Quantity:  
Add to Cart

Share |

Proceedings of the International Conference on Cybersecurity, Situational Awareness and Social Media: Cyber Science 2024; 27–28 June; Edinburgh Napier University, Scotland


Add your own review!

Overview

Full Product Details

Author:   Martin Gilje Jaatun ,  Cyril Onwubiko ,  Pierangelo Rosati ,  Aunshul Rege
Publisher:   Springer Nature Switzerland AG
Imprint:   Springer Nature Switzerland AG
ISBN:  

9789819604005


ISBN 10:   9819604001
Pages:   384
Publication Date:   23 April 2025
Audience:   Professional and scholarly ,  College/higher education ,  Professional & Vocational ,  Postgraduate, Research & Scholarly
Format:   Hardback
Publisher's Status:   Active
Availability:   Manufactured on demand   Availability explained
We will order this item for you from a manufactured on demand supplier.

Table of Contents

Part 1 Artificial Intelligence Applications.- RingGuard: A privacy protected Peer to Peer Federated Learning Framework.-  Improving Credit Card Fraud Detection with Combined Feature Extraction and Class Balance Optimisation Techniques.-  Attention based Image Steganography Using CNNs in Integration with Quantization.- Part 2 Advanced Cryptography in Emerging Applications.- vSPACE Voting in a Scalable, Privacy-Aware and Confidential Election.- Design of Pairing Free Attribute based Encryption for Smart Grid Applications.- Critical Infrastructures in the Cloud.- Part 3 Security Operations Centre (SOC) & Advanced Malware Detection Techniques.- An Exemplar Incident Response Plan for Security Operations Center Analysts.- Malware Detection using Machine Learning Algorithms.- A Case Study of a Ransomware and Social Engineering Competition.- Exploring DTrace as an Incident Response Tool for Unix Systems.- Utilizing YARA: An Effective Method for Phishing Attack Response.- Part 4 Threat Intelligence and Emerging Techniques for Fraud Detection and Prevention.- TIPS: Threat Sharing Information Platform for Enhanced Security.- TRIST: Towards a container-based ICS testbed for cyber threat simulation and anomaly detection.- Radio Frequency (RF) Cyber Threats and a novel RF Cyber Kill Chain.- Part 5 Cybersecurity Governance, Risk Management and Assurance.- Perception of cyber risk for assisted living technologies in the Norwegian healthcare sector key stakeholders perceptions.- Workshop Insights: Navigating Cybersecurity Regulations for Device Manufacturers and Healthcare Operators.- Digital Evidence from the Legal Practitioners’ Perspective.- Part 6 Critical Infrastructures, Systems & Applications.- Fuzzing the ARM Cortex-M: A Survey.- Towards a Secure Manufacturing Framework for Single Malt Whisky in Industry 4.0.- Implementation of Zones and Conduits in Industrial Control and Automation Systems.

Reviews

Author Information

Tab Content 6

Author Website:  

Customer Reviews

Recent Reviews

No review item found!

Add your own review!

Countries Available

All regions
Latest Reading Guide

RGJUNE2025

 

Shopping Cart
Your cart is empty
Shopping cart
Mailing List