語系:
繁體中文
English
說明(常見問題)
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Proceedings of the International Conference on Cybersecurity, Situational Awareness and Social Media = Cyber Science 2024 ; 27-28 June ; Edinburgh Napier University, Scotland /
紀錄類型:
書目-語言資料,印刷品 : Monograph/item
正題名/作者:
Proceedings of the International Conference on Cybersecurity, Situational Awareness and Social Media/ edited by Martin Gilje Jaatun ... [et al.].
其他題名:
Cyber Science 2024 ; 27-28 June ; Edinburgh Napier University, Scotland /
其他題名:
Cyber Science 2024
其他作者:
Jaatun, Martin Gilje.
團體作者:
Workshop on the Preservation of Stability under Discretization
出版者:
Singapore :Springer Nature Singapore : : 2025.,
面頁冊數:
xxii, 384 p. :ill. (some col.), digital ; : 24 cm.;
Contained By:
Springer Nature eBook
標題:
Blockchain. -
電子資源:
https://doi.org/10.1007/978-981-96-0401-2
ISBN:
9789819604012
Proceedings of the International Conference on Cybersecurity, Situational Awareness and Social Media = Cyber Science 2024 ; 27-28 June ; Edinburgh Napier University, Scotland /
Proceedings of the International Conference on Cybersecurity, Situational Awareness and Social Media
Cyber Science 2024 ; 27-28 June ; Edinburgh Napier University, Scotland /[electronic resource] :Cyber Science 2024edited by Martin Gilje Jaatun ... [et al.]. - Singapore :Springer Nature Singapore :2025. - xxii, 384 p. :ill. (some col.), digital ;24 cm. - Springer proceedings in complexity,2213-8692. - Springer proceedings in complexity..
Part 1 Artificial Intelligence Applications -- RingGuard: A privacy protected Peer to Peer Federated Learning Framework -- Improving Credit Card Fraud Detection with Combined Feature Extraction and Class Balance Optimisation Techniques -- Attention based Image Steganography Using CNNs in Integration with Quantization -- Part 2 Advanced Cryptography in Emerging Applications -- vSPACE Voting in a Scalable, Privacy-Aware and Confidential Election -- Design of Pairing Free Attribute based Encryption for Smart Grid Applications -- Critical Infrastructures in the Cloud -- Part 3 Security Operations Centre (SOC) & Advanced Malware Detection Techniques -- An Exemplar Incident Response Plan for Security Operations Center Analysts -- Malware Detection using Machine Learning Algorithms -- A Case Study of a Ransomware and Social Engineering Competition -- Exploring DTrace as an Incident Response Tool for Unix Systems -- Utilizing YARA: An Effective Method for Phishing Attack Response -- Part 4 Threat Intelligence and Emerging Techniques for Fraud Detection and Prevention -- TIPS: Threat Sharing Information Platform for Enhanced Security -- TRIST: Towards a container-based ICS testbed for cyber threat simulation and anomaly detection -- Radio Frequency (RF) Cyber Threats and a novel RF Cyber Kill Chain -- Part 5 Cybersecurity Governance, Risk Management and Assurance -- Perception of cyber risk for assisted living technologies in the Norwegian healthcare sector key stakeholders perceptions -- Workshop Insights: Navigating Cybersecurity Regulations for Device Manufacturers and Healthcare Operators -- Digital Evidence from the Legal Practitioners' Perspective -- Part 6 Critical Infrastructures, Systems & Applications -- Fuzzing the ARM Cortex-M: A Survey -- Towards a Secure Manufacturing Framework for Single Malt Whisky in Industry 4.0 -- Implementation of Zones and Conduits in Industrial Control and Automation Systems.
This book presents peer-reviewed articles from Cyber Science 2024, held on 27-28 June at Edinburgh Napier University in Scotland. With no competing conferences in this unique and specialized area (cyber science), especially focusing on the application of situation awareness to cyber security (CS), artificial intelligence, blockchain technologies, cyber physical systems (CPS), social media and cyber incident response, it presents a fusion of these unique and multidisciplinary areas into one that serves a wider audience making this conference a sought-after event. Hence, this proceedings offers a cutting edge and fast reaching forum for organizations to learn, network, and promote their services. Also, it offers professionals, students, and practitioners a platform to learn new and emerging disciplines.
ISBN: 9789819604012
Standard No.: 10.1007/978-981-96-0401-2doiSubjects--Topical Terms:
1387659
Blockchain.
LC Class. No.: QA76.9.A25
Dewey Class. No.: 005.8
Proceedings of the International Conference on Cybersecurity, Situational Awareness and Social Media = Cyber Science 2024 ; 27-28 June ; Edinburgh Napier University, Scotland /
LDR
:03984nam a2200349 a 4500
001
1162574
003
DE-He213
005
20250423130232.0
006
m d
007
cr nn 008maaau
008
251029s2025 si s 0 eng d
020
$a
9789819604012
$q
(electronic bk.)
020
$a
9789819604005
$q
(paper)
024
7
$a
10.1007/978-981-96-0401-2
$2
doi
035
$a
978-981-96-0401-2
040
$a
GP
$c
GP
041
0
$a
eng
050
4
$a
QA76.9.A25
072
7
$a
GPFC
$2
bicssc
072
7
$a
SCI064000
$2
bisacsh
072
7
$a
GPFC
$2
thema
082
0 4
$a
005.8
$2
23
090
$a
QA76.9.A25
$b
I61 2024
111
2
$a
Workshop on the Preservation of Stability under Discretization
$d
(2001 :
$c
Fort Collins, Colo.)
$3
527686
245
1 0
$a
Proceedings of the International Conference on Cybersecurity, Situational Awareness and Social Media
$h
[electronic resource] :
$b
Cyber Science 2024 ; 27-28 June ; Edinburgh Napier University, Scotland /
$c
edited by Martin Gilje Jaatun ... [et al.].
246
3
$a
Cyber Science 2024
260
$a
Singapore :
$c
2025.
$b
Springer Nature Singapore :
$b
Imprint: Springer,
300
$a
xxii, 384 p. :
$b
ill. (some col.), digital ;
$c
24 cm.
490
1
$a
Springer proceedings in complexity,
$x
2213-8692
505
0
$a
Part 1 Artificial Intelligence Applications -- RingGuard: A privacy protected Peer to Peer Federated Learning Framework -- Improving Credit Card Fraud Detection with Combined Feature Extraction and Class Balance Optimisation Techniques -- Attention based Image Steganography Using CNNs in Integration with Quantization -- Part 2 Advanced Cryptography in Emerging Applications -- vSPACE Voting in a Scalable, Privacy-Aware and Confidential Election -- Design of Pairing Free Attribute based Encryption for Smart Grid Applications -- Critical Infrastructures in the Cloud -- Part 3 Security Operations Centre (SOC) & Advanced Malware Detection Techniques -- An Exemplar Incident Response Plan for Security Operations Center Analysts -- Malware Detection using Machine Learning Algorithms -- A Case Study of a Ransomware and Social Engineering Competition -- Exploring DTrace as an Incident Response Tool for Unix Systems -- Utilizing YARA: An Effective Method for Phishing Attack Response -- Part 4 Threat Intelligence and Emerging Techniques for Fraud Detection and Prevention -- TIPS: Threat Sharing Information Platform for Enhanced Security -- TRIST: Towards a container-based ICS testbed for cyber threat simulation and anomaly detection -- Radio Frequency (RF) Cyber Threats and a novel RF Cyber Kill Chain -- Part 5 Cybersecurity Governance, Risk Management and Assurance -- Perception of cyber risk for assisted living technologies in the Norwegian healthcare sector key stakeholders perceptions -- Workshop Insights: Navigating Cybersecurity Regulations for Device Manufacturers and Healthcare Operators -- Digital Evidence from the Legal Practitioners' Perspective -- Part 6 Critical Infrastructures, Systems & Applications -- Fuzzing the ARM Cortex-M: A Survey -- Towards a Secure Manufacturing Framework for Single Malt Whisky in Industry 4.0 -- Implementation of Zones and Conduits in Industrial Control and Automation Systems.
520
$a
This book presents peer-reviewed articles from Cyber Science 2024, held on 27-28 June at Edinburgh Napier University in Scotland. With no competing conferences in this unique and specialized area (cyber science), especially focusing on the application of situation awareness to cyber security (CS), artificial intelligence, blockchain technologies, cyber physical systems (CPS), social media and cyber incident response, it presents a fusion of these unique and multidisciplinary areas into one that serves a wider audience making this conference a sought-after event. Hence, this proceedings offers a cutting edge and fast reaching forum for organizations to learn, network, and promote their services. Also, it offers professionals, students, and practitioners a platform to learn new and emerging disciplines.
650
2 4
$a
Blockchain.
$3
1387659
650
2 4
$a
Security Science and Technology.
$3
783419
650
2 4
$a
Cybercrime.
$3
1109747
650
2 4
$a
Cyber-Physical Systems.
$3
1387591
650
2 4
$a
Artificial Intelligence.
$3
646849
650
1 4
$a
Complex Systems.
$3
888664
650
0
$a
Computer security
$v
Congresses.
$3
574522
$3
727780
700
1
$a
Jaatun, Martin Gilje.
$3
792537
710
2
$a
SpringerLink (Online service)
$3
593884
773
0
$t
Springer Nature eBook
830
0
$a
Springer proceedings in complexity.
$3
1019956
856
4 0
$u
https://doi.org/10.1007/978-981-96-0401-2
950
$a
Physics and Astronomy (SpringerNature-11651)
筆 0 讀者評論
多媒體
評論
新增評論
分享你的心得
Export
取書館別
處理中
...
變更密碼[密碼必須為2種組合(英文和數字)及長度為10碼以上]
登入