Information and Cyber Security
Springer International Publishing (Verlag)
978-3-032-09659-3 (ISBN)
- Noch nicht erschienen - erscheint am 07.12.2025
- Versandkostenfrei
- Auch auf Rechnung
- Artikel merken
This book constitutes the refereed post-conference proceedings of the 23rd International Conference on Information Security, ISSA 2024, held in Gqeberha, South Africa, during December 2-3, 2024.
The 21 full papers presented were carefully reviewed and selected from 55 submissions. The papers focus on topics such as Cyber security; Information Security; Network Security; Computer Security; Digital Forensics; Botnets; Security in Cloud Computing; ChatBot security; Insider Threats; NIDS; GANs and Malware; Privacy; Cyber security Education; Cyber security & AI; Digital Forensics & AI.
.- A Rapid Review Cybersecurity Strategic Analysis Framework: The Case of Higher Education Institutions.
.- Privacy and Legal Implications Regarding the Processing of Honeypot Data.
.- Social Network Graphs in Email Forensics: Analysis of a Personal Email Dataset.
.- Smoke Signals: Analysing and Decoding Quiet Quitting and Burnout Among Cybersecurity Professionals.
.- Solving the Privacy and Security Challenge using ZKP: Its Positive Impact on the
Economy.
.- Biometric authentication: Stress as a factor in keystroke dynamics.
.- Profiling Prominent Ransomware Threat Actors.
.- Trust Requirements and Mechanisms in Peer-to-Peer Energy Markets.
.- Contextual Factors influencing the Cybersecurity Commitment of Government Institutions in Developing Countries.
.- Digital Forensic Investigation and Linguistic Analysis of Cybercrime: A Systematic
Review.
.- Conceptual Model for Taxation and Regulatory Governance among South African
Crypto Asset Holders.
.- Countering mobile application threats through a structured threat modelling approach.
.- Enhancing Forensic Readiness through an Integrated Approach to Fraud Risk Management throughout the Digital Transformation Lifecycle.
.- Guidance for the Creation of Management and Cost Accounting Computerized Infor mation Systems: Assurance of Information Integrity and Flexibility.
.- A chatbot LLM based access control mechanism.
.- Factors influencing Sensitive Data Protection practices in South African public schools.
.- Changes in Observed Internet Background Radiation Traffic in the 155/8 netblock.
.- Using artificial intelligence techniques to standardize and automated generation of digital forensic reports.
.- Exploring the Cybersecurity-Resilience Gap: An Analysis of Student Attitudes and Behaviors in Higher Education.
.- A Decentralized E-voting System Using Blockchain.
.- Lacking Balance? Assessing the Content and Coverage of Cyber Security Degrees.
| Erscheinungsdatum | 15.11.2025 |
|---|---|
| Reihe/Serie | Communications in Computer and Information Science |
| Zusatzinfo | XIV, 218 p. 39 illus., 19 illus. in color. |
| Verlagsort | Cham |
| Sprache | englisch |
| Maße | 155 x 235 mm |
| Themenwelt | Informatik ► Theorie / Studium ► Kryptologie |
| Schlagworte | Access Control • cyber forensics • cybersecurity • Digital forensic Investigations • digital forensics • Information Security • Information Security Management |
| ISBN-10 | 3-032-09659-6 / 3032096596 |
| ISBN-13 | 978-3-032-09659-3 / 9783032096593 |
| Zustand | Neuware |
| Informationen gemäß Produktsicherheitsverordnung (GPSR) | |
| Haben Sie eine Frage zum Produkt? |
aus dem Bereich