Language:
English
繁體中文
Help
Login
Back
Switch To:
Labeled
|
MARC Mode
|
ISBD
Proceedings of the International Conference on Cybersecurity, Situational Awareness and Social Media = Cyber Science 2024 ; 27-28 June ; Edinburgh Napier University, Scotland /
Record Type:
Language materials, printed : Monograph/item
Title/Author:
Proceedings of the International Conference on Cybersecurity, Situational Awareness and Social Media/ edited by Martin Gilje Jaatun ... [et al.].
Reminder of title:
Cyber Science 2024 ; 27-28 June ; Edinburgh Napier University, Scotland /
remainder title:
Cyber Science 2024
other author:
Jaatun, Martin Gilje.
corporate name:
Workshop on the Preservation of Stability under Discretization
Published:
Singapore :Springer Nature Singapore : : 2025.,
Description:
xxii, 384 p. :ill. (some col.), digital ; : 24 cm.;
Contained By:
Springer Nature eBook
Subject:
Computer security - Congresses. -
Online resource:
https://doi.org/10.1007/978-981-96-0401-2
ISBN:
9789819604012
Proceedings of the International Conference on Cybersecurity, Situational Awareness and Social Media = Cyber Science 2024 ; 27-28 June ; Edinburgh Napier University, Scotland /
Proceedings of the International Conference on Cybersecurity, Situational Awareness and Social Media
Cyber Science 2024 ; 27-28 June ; Edinburgh Napier University, Scotland /[electronic resource] :Cyber Science 2024edited by Martin Gilje Jaatun ... [et al.]. - Singapore :Springer Nature Singapore :2025. - xxii, 384 p. :ill. (some col.), digital ;24 cm. - Springer proceedings in complexity,2213-8692. - Springer proceedings in complexity..
Part 1 Artificial Intelligence Applications -- RingGuard: A privacy protected Peer to Peer Federated Learning Framework -- Improving Credit Card Fraud Detection with Combined Feature Extraction and Class Balance Optimisation Techniques -- Attention based Image Steganography Using CNNs in Integration with Quantization -- Part 2 Advanced Cryptography in Emerging Applications -- vSPACE Voting in a Scalable, Privacy-Aware and Confidential Election -- Design of Pairing Free Attribute based Encryption for Smart Grid Applications -- Critical Infrastructures in the Cloud -- Part 3 Security Operations Centre (SOC) & Advanced Malware Detection Techniques -- An Exemplar Incident Response Plan for Security Operations Center Analysts -- Malware Detection using Machine Learning Algorithms -- A Case Study of a Ransomware and Social Engineering Competition -- Exploring DTrace as an Incident Response Tool for Unix Systems -- Utilizing YARA: An Effective Method for Phishing Attack Response -- Part 4 Threat Intelligence and Emerging Techniques for Fraud Detection and Prevention -- TIPS: Threat Sharing Information Platform for Enhanced Security -- TRIST: Towards a container-based ICS testbed for cyber threat simulation and anomaly detection -- Radio Frequency (RF) Cyber Threats and a novel RF Cyber Kill Chain -- Part 5 Cybersecurity Governance, Risk Management and Assurance -- Perception of cyber risk for assisted living technologies in the Norwegian healthcare sector key stakeholders perceptions -- Workshop Insights: Navigating Cybersecurity Regulations for Device Manufacturers and Healthcare Operators -- Digital Evidence from the Legal Practitioners' Perspective -- Part 6 Critical Infrastructures, Systems & Applications -- Fuzzing the ARM Cortex-M: A Survey -- Towards a Secure Manufacturing Framework for Single Malt Whisky in Industry 4.0 -- Implementation of Zones and Conduits in Industrial Control and Automation Systems.
This book presents peer-reviewed articles from Cyber Science 2024, held on 27-28 June at Edinburgh Napier University in Scotland. With no competing conferences in this unique and specialized area (cyber science), especially focusing on the application of situation awareness to cyber security (CS), artificial intelligence, blockchain technologies, cyber physical systems (CPS), social media and cyber incident response, it presents a fusion of these unique and multidisciplinary areas into one that serves a wider audience making this conference a sought-after event. Hence, this proceedings offers a cutting edge and fast reaching forum for organizations to learn, network, and promote their services. Also, it offers professionals, students, and practitioners a platform to learn new and emerging disciplines.
ISBN: 9789819604012
Standard No.: 10.1007/978-981-96-0401-2doiSubjects--Topical Terms:
574522
Computer security
--Congresses.
LC Class. No.: QA76.9.A25
Dewey Class. No.: 005.8
Proceedings of the International Conference on Cybersecurity, Situational Awareness and Social Media = Cyber Science 2024 ; 27-28 June ; Edinburgh Napier University, Scotland /
LDR
:03984nam a2200349 a 4500
001
1162574
003
DE-He213
005
20250423130232.0
006
m d
007
cr nn 008maaau
008
251029s2025 si s 0 eng d
020
$a
9789819604012
$q
(electronic bk.)
020
$a
9789819604005
$q
(paper)
024
7
$a
10.1007/978-981-96-0401-2
$2
doi
035
$a
978-981-96-0401-2
040
$a
GP
$c
GP
041
0
$a
eng
050
4
$a
QA76.9.A25
072
7
$a
GPFC
$2
bicssc
072
7
$a
SCI064000
$2
bisacsh
072
7
$a
GPFC
$2
thema
082
0 4
$a
005.8
$2
23
090
$a
QA76.9.A25
$b
I61 2024
111
2
$a
Workshop on the Preservation of Stability under Discretization
$d
(2001 :
$c
Fort Collins, Colo.)
$3
527686
245
1 0
$a
Proceedings of the International Conference on Cybersecurity, Situational Awareness and Social Media
$h
[electronic resource] :
$b
Cyber Science 2024 ; 27-28 June ; Edinburgh Napier University, Scotland /
$c
edited by Martin Gilje Jaatun ... [et al.].
246
3
$a
Cyber Science 2024
260
$a
Singapore :
$c
2025.
$b
Springer Nature Singapore :
$b
Imprint: Springer,
300
$a
xxii, 384 p. :
$b
ill. (some col.), digital ;
$c
24 cm.
490
1
$a
Springer proceedings in complexity,
$x
2213-8692
505
0
$a
Part 1 Artificial Intelligence Applications -- RingGuard: A privacy protected Peer to Peer Federated Learning Framework -- Improving Credit Card Fraud Detection with Combined Feature Extraction and Class Balance Optimisation Techniques -- Attention based Image Steganography Using CNNs in Integration with Quantization -- Part 2 Advanced Cryptography in Emerging Applications -- vSPACE Voting in a Scalable, Privacy-Aware and Confidential Election -- Design of Pairing Free Attribute based Encryption for Smart Grid Applications -- Critical Infrastructures in the Cloud -- Part 3 Security Operations Centre (SOC) & Advanced Malware Detection Techniques -- An Exemplar Incident Response Plan for Security Operations Center Analysts -- Malware Detection using Machine Learning Algorithms -- A Case Study of a Ransomware and Social Engineering Competition -- Exploring DTrace as an Incident Response Tool for Unix Systems -- Utilizing YARA: An Effective Method for Phishing Attack Response -- Part 4 Threat Intelligence and Emerging Techniques for Fraud Detection and Prevention -- TIPS: Threat Sharing Information Platform for Enhanced Security -- TRIST: Towards a container-based ICS testbed for cyber threat simulation and anomaly detection -- Radio Frequency (RF) Cyber Threats and a novel RF Cyber Kill Chain -- Part 5 Cybersecurity Governance, Risk Management and Assurance -- Perception of cyber risk for assisted living technologies in the Norwegian healthcare sector key stakeholders perceptions -- Workshop Insights: Navigating Cybersecurity Regulations for Device Manufacturers and Healthcare Operators -- Digital Evidence from the Legal Practitioners' Perspective -- Part 6 Critical Infrastructures, Systems & Applications -- Fuzzing the ARM Cortex-M: A Survey -- Towards a Secure Manufacturing Framework for Single Malt Whisky in Industry 4.0 -- Implementation of Zones and Conduits in Industrial Control and Automation Systems.
520
$a
This book presents peer-reviewed articles from Cyber Science 2024, held on 27-28 June at Edinburgh Napier University in Scotland. With no competing conferences in this unique and specialized area (cyber science), especially focusing on the application of situation awareness to cyber security (CS), artificial intelligence, blockchain technologies, cyber physical systems (CPS), social media and cyber incident response, it presents a fusion of these unique and multidisciplinary areas into one that serves a wider audience making this conference a sought-after event. Hence, this proceedings offers a cutting edge and fast reaching forum for organizations to learn, network, and promote their services. Also, it offers professionals, students, and practitioners a platform to learn new and emerging disciplines.
650
0
$a
Computer security
$v
Congresses.
$3
574522
$3
727780
650
1 4
$a
Complex Systems.
$3
888664
650
2 4
$a
Artificial Intelligence.
$3
646849
650
2 4
$a
Cyber-Physical Systems.
$3
1387591
650
2 4
$a
Cybercrime.
$3
1109747
650
2 4
$a
Security Science and Technology.
$3
783419
650
2 4
$a
Blockchain.
$3
1387659
700
1
$a
Jaatun, Martin Gilje.
$3
792537
710
2
$a
SpringerLink (Online service)
$3
593884
773
0
$t
Springer Nature eBook
830
0
$a
Springer proceedings in complexity.
$3
1019956
856
4 0
$u
https://doi.org/10.1007/978-981-96-0401-2
950
$a
Physics and Astronomy (SpringerNature-11651)
based on 0 review(s)
Multimedia
Reviews
Add a review
and share your thoughts with other readers
Export
pickup library
Processing
...
Change password
Login