Language:
English
繁體中文
Help
回圖書館首頁
手機版館藏查詢
Login
Back
Switch To:
Labeled
|
MARC Mode
|
ISBD
Proceedings of the International Con...
~
International Conference on Cybersecurity, Situational Awareness and Social Media (2024 :)
Linked to FindBook
Google Book
Amazon
博客來
Proceedings of the International Conference on Cybersecurity, Situational Awareness and Social Media = Cyber Science 2024 ; 27-28 June ; Edinburgh Napier University, Scotland /
Record Type:
Electronic resources : Monograph/item
Title/Author:
Proceedings of the International Conference on Cybersecurity, Situational Awareness and Social Media/ edited by Martin Gilje Jaatun ... [et al.].
Reminder of title:
Cyber Science 2024 ; 27-28 June ; Edinburgh Napier University, Scotland /
remainder title:
Cyber Science 2024
other author:
Jaatun, Martin Gilje.
corporate name:
International Conference on Cybersecurity, Situational Awareness and Social Media
Published:
Singapore :Springer Nature Singapore : : 2025.,
Description:
xxii, 384 p. :ill. (some col.), digital ;24 cm.
[NT 15003449]:
Part 1 Artificial Intelligence Applications -- RingGuard: A privacy protected Peer to Peer Federated Learning Framework -- Improving Credit Card Fraud Detection with Combined Feature Extraction and Class Balance Optimisation Techniques -- Attention based Image Steganography Using CNNs in Integration with Quantization -- Part 2 Advanced Cryptography in Emerging Applications -- vSPACE Voting in a Scalable, Privacy-Aware and Confidential Election -- Design of Pairing Free Attribute based Encryption for Smart Grid Applications -- Critical Infrastructures in the Cloud -- Part 3 Security Operations Centre (SOC) & Advanced Malware Detection Techniques -- An Exemplar Incident Response Plan for Security Operations Center Analysts -- Malware Detection using Machine Learning Algorithms -- A Case Study of a Ransomware and Social Engineering Competition -- Exploring DTrace as an Incident Response Tool for Unix Systems -- Utilizing YARA: An Effective Method for Phishing Attack Response -- Part 4 Threat Intelligence and Emerging Techniques for Fraud Detection and Prevention -- TIPS: Threat Sharing Information Platform for Enhanced Security -- TRIST: Towards a container-based ICS testbed for cyber threat simulation and anomaly detection -- Radio Frequency (RF) Cyber Threats and a novel RF Cyber Kill Chain -- Part 5 Cybersecurity Governance, Risk Management and Assurance -- Perception of cyber risk for assisted living technologies in the Norwegian healthcare sector key stakeholders perceptions -- Workshop Insights: Navigating Cybersecurity Regulations for Device Manufacturers and Healthcare Operators -- Digital Evidence from the Legal Practitioners' Perspective -- Part 6 Critical Infrastructures, Systems & Applications -- Fuzzing the ARM Cortex-M: A Survey -- Towards a Secure Manufacturing Framework for Single Malt Whisky in Industry 4.0 -- Implementation of Zones and Conduits in Industrial Control and Automation Systems.
Contained By:
Springer Nature eBook
Subject:
Computer security - Congresses. -
Online resource:
https://doi.org/10.1007/978-981-96-0401-2
ISBN:
9789819604012
Proceedings of the International Conference on Cybersecurity, Situational Awareness and Social Media = Cyber Science 2024 ; 27-28 June ; Edinburgh Napier University, Scotland /
Proceedings of the International Conference on Cybersecurity, Situational Awareness and Social Media
Cyber Science 2024 ; 27-28 June ; Edinburgh Napier University, Scotland /[electronic resource] :Cyber Science 2024edited by Martin Gilje Jaatun ... [et al.]. - Singapore :Springer Nature Singapore :2025. - xxii, 384 p. :ill. (some col.), digital ;24 cm. - Springer proceedings in complexity,2213-8692. - Springer proceedings in complexity..
Part 1 Artificial Intelligence Applications -- RingGuard: A privacy protected Peer to Peer Federated Learning Framework -- Improving Credit Card Fraud Detection with Combined Feature Extraction and Class Balance Optimisation Techniques -- Attention based Image Steganography Using CNNs in Integration with Quantization -- Part 2 Advanced Cryptography in Emerging Applications -- vSPACE Voting in a Scalable, Privacy-Aware and Confidential Election -- Design of Pairing Free Attribute based Encryption for Smart Grid Applications -- Critical Infrastructures in the Cloud -- Part 3 Security Operations Centre (SOC) & Advanced Malware Detection Techniques -- An Exemplar Incident Response Plan for Security Operations Center Analysts -- Malware Detection using Machine Learning Algorithms -- A Case Study of a Ransomware and Social Engineering Competition -- Exploring DTrace as an Incident Response Tool for Unix Systems -- Utilizing YARA: An Effective Method for Phishing Attack Response -- Part 4 Threat Intelligence and Emerging Techniques for Fraud Detection and Prevention -- TIPS: Threat Sharing Information Platform for Enhanced Security -- TRIST: Towards a container-based ICS testbed for cyber threat simulation and anomaly detection -- Radio Frequency (RF) Cyber Threats and a novel RF Cyber Kill Chain -- Part 5 Cybersecurity Governance, Risk Management and Assurance -- Perception of cyber risk for assisted living technologies in the Norwegian healthcare sector key stakeholders perceptions -- Workshop Insights: Navigating Cybersecurity Regulations for Device Manufacturers and Healthcare Operators -- Digital Evidence from the Legal Practitioners' Perspective -- Part 6 Critical Infrastructures, Systems & Applications -- Fuzzing the ARM Cortex-M: A Survey -- Towards a Secure Manufacturing Framework for Single Malt Whisky in Industry 4.0 -- Implementation of Zones and Conduits in Industrial Control and Automation Systems.
This book presents peer-reviewed articles from Cyber Science 2024, held on 27-28 June at Edinburgh Napier University in Scotland. With no competing conferences in this unique and specialized area (cyber science), especially focusing on the application of situation awareness to cyber security (CS), artificial intelligence, blockchain technologies, cyber physical systems (CPS), social media and cyber incident response, it presents a fusion of these unique and multidisciplinary areas into one that serves a wider audience making this conference a sought-after event. Hence, this proceedings offers a cutting edge and fast reaching forum for organizations to learn, network, and promote their services. Also, it offers professionals, students, and practitioners a platform to learn new and emerging disciplines.
ISBN: 9789819604012
Standard No.: 10.1007/978-981-96-0401-2doiSubjects--Topical Terms:
622818
Computer security
--Congresses.
LC Class. No.: QA76.9.A25
Dewey Class. No.: 005.8
Proceedings of the International Conference on Cybersecurity, Situational Awareness and Social Media = Cyber Science 2024 ; 27-28 June ; Edinburgh Napier University, Scotland /
LDR
:03984nmm a2200349 a 4500
001
2410480
003
DE-He213
005
20250423130232.0
006
m d
007
cr nn 008maaau
008
260204s2025 si s 0 eng d
020
$a
9789819604012
$q
(electronic bk.)
020
$a
9789819604005
$q
(paper)
024
7
$a
10.1007/978-981-96-0401-2
$2
doi
035
$a
978-981-96-0401-2
040
$a
GP
$c
GP
041
0
$a
eng
050
4
$a
QA76.9.A25
072
7
$a
GPFC
$2
bicssc
072
7
$a
SCI064000
$2
bisacsh
072
7
$a
GPFC
$2
thema
082
0 4
$a
005.8
$2
23
090
$a
QA76.9.A25
$b
I61 2024
111
2
$a
International Conference on Cybersecurity, Situational Awareness and Social Media
$n
(10th :
$d
2024 :
$c
Edinburgh, Scotland)
$3
3784392
245
1 0
$a
Proceedings of the International Conference on Cybersecurity, Situational Awareness and Social Media
$h
[electronic resource] :
$b
Cyber Science 2024 ; 27-28 June ; Edinburgh Napier University, Scotland /
$c
edited by Martin Gilje Jaatun ... [et al.].
246
3
$a
Cyber Science 2024
260
$a
Singapore :
$b
Springer Nature Singapore :
$b
Imprint: Springer,
$c
2025.
300
$a
xxii, 384 p. :
$b
ill. (some col.), digital ;
$c
24 cm.
490
1
$a
Springer proceedings in complexity,
$x
2213-8692
505
0
$a
Part 1 Artificial Intelligence Applications -- RingGuard: A privacy protected Peer to Peer Federated Learning Framework -- Improving Credit Card Fraud Detection with Combined Feature Extraction and Class Balance Optimisation Techniques -- Attention based Image Steganography Using CNNs in Integration with Quantization -- Part 2 Advanced Cryptography in Emerging Applications -- vSPACE Voting in a Scalable, Privacy-Aware and Confidential Election -- Design of Pairing Free Attribute based Encryption for Smart Grid Applications -- Critical Infrastructures in the Cloud -- Part 3 Security Operations Centre (SOC) & Advanced Malware Detection Techniques -- An Exemplar Incident Response Plan for Security Operations Center Analysts -- Malware Detection using Machine Learning Algorithms -- A Case Study of a Ransomware and Social Engineering Competition -- Exploring DTrace as an Incident Response Tool for Unix Systems -- Utilizing YARA: An Effective Method for Phishing Attack Response -- Part 4 Threat Intelligence and Emerging Techniques for Fraud Detection and Prevention -- TIPS: Threat Sharing Information Platform for Enhanced Security -- TRIST: Towards a container-based ICS testbed for cyber threat simulation and anomaly detection -- Radio Frequency (RF) Cyber Threats and a novel RF Cyber Kill Chain -- Part 5 Cybersecurity Governance, Risk Management and Assurance -- Perception of cyber risk for assisted living technologies in the Norwegian healthcare sector key stakeholders perceptions -- Workshop Insights: Navigating Cybersecurity Regulations for Device Manufacturers and Healthcare Operators -- Digital Evidence from the Legal Practitioners' Perspective -- Part 6 Critical Infrastructures, Systems & Applications -- Fuzzing the ARM Cortex-M: A Survey -- Towards a Secure Manufacturing Framework for Single Malt Whisky in Industry 4.0 -- Implementation of Zones and Conduits in Industrial Control and Automation Systems.
520
$a
This book presents peer-reviewed articles from Cyber Science 2024, held on 27-28 June at Edinburgh Napier University in Scotland. With no competing conferences in this unique and specialized area (cyber science), especially focusing on the application of situation awareness to cyber security (CS), artificial intelligence, blockchain technologies, cyber physical systems (CPS), social media and cyber incident response, it presents a fusion of these unique and multidisciplinary areas into one that serves a wider audience making this conference a sought-after event. Hence, this proceedings offers a cutting edge and fast reaching forum for organizations to learn, network, and promote their services. Also, it offers professionals, students, and practitioners a platform to learn new and emerging disciplines.
650
0
$a
Computer security
$v
Congresses.
$3
622818
650
1 4
$a
Complex Systems.
$3
1566441
650
2 4
$a
Artificial Intelligence.
$3
769149
650
2 4
$a
Cyber-Physical Systems.
$3
3591993
650
2 4
$a
Cybercrime.
$3
2195714
650
2 4
$a
Security Science and Technology.
$3
1531662
650
2 4
$a
Blockchain.
$3
3591823
700
1
$a
Jaatun, Martin Gilje.
$3
3784393
710
2
$a
SpringerLink (Online service)
$3
836513
773
0
$t
Springer Nature eBook
830
0
$a
Springer proceedings in complexity.
$3
2054895
856
4 0
$u
https://doi.org/10.1007/978-981-96-0401-2
950
$a
Physics and Astronomy (SpringerNature-11651)
based on 0 review(s)
Location:
ALL
電子資源
Year:
Volume Number:
Items
1 records • Pages 1 •
1
Inventory Number
Location Name
Item Class
Material type
Call number
Usage Class
Loan Status
No. of reservations
Opac note
Attachments
W9515978
電子資源
11.線上閱覽_V
電子書
EB QA76.9.A25
一般使用(Normal)
On shelf
0
1 records • Pages 1 •
1
Multimedia
Reviews
Add a review
and share your thoughts with other readers
Export
pickup library
Processing
...
Change password
Login