Information and Cyber Security : 23rd International Conference, ISSA 2024, Gqeberha, South Africa, December 2-3, 2024, Revised Selected Papers (Communications in Computer and Information Science)

個数:

Information and Cyber Security : 23rd International Conference, ISSA 2024, Gqeberha, South Africa, December 2-3, 2024, Revised Selected Papers (Communications in Computer and Information Science)

  • 提携先の海外書籍取次会社に在庫がございます。通常3週間で発送いたします。
    重要ご説明事項
    1. 納期遅延や、ご入手不能となる場合が若干ございます。
    2. 複数冊ご注文の場合は、ご注文数量が揃ってからまとめて発送いたします。
    3. 美品のご指定は承りかねます。

    ●3Dセキュア導入とクレジットカードによるお支払いについて
  • 【入荷遅延について】
    世界情勢の影響により、海外からお取り寄せとなる洋書・洋古書の入荷が、表示している標準的な納期よりも遅延する場合がございます。
    おそれいりますが、あらかじめご了承くださいますようお願い申し上げます。
  • ◆画像の表紙や帯等は実物とは異なる場合があります。
  • ◆ウェブストアでの洋書販売価格は、弊社店舗等での販売価格とは異なります。
    また、洋書販売価格は、ご注文確定時点での日本円価格となります。
    ご注文確定後に、同じ洋書の販売価格が変動しても、それは反映されません。
  • 製本 Paperback:紙装版/ペーパーバック版/ページ数 213 p.
  • 言語 ENG
  • 商品コード 9783032096593
  • DDC分類 005.8

Full Description

This book constitutes the refereed post-conference proceedings of the 23rd International Conference on Information Security, ISSA 2024, held in Gqeberha, South Africa, during December 2-3, 2024.

The 21 full papers presented were carefully reviewed and selected from 55 submissions. The papers focus on topics such as Cyber security; Information Security; Network Security; Computer Security; Digital Forensics; Botnets; Security in Cloud Computing; ChatBot security; Insider Threats; NIDS; GANs and Malware; Privacy; Cyber security Education; Cyber security & AI; Digital Forensics & AI.

Contents

.- A Rapid Review Cybersecurity Strategic Analysis Framework: The Case of Higher Education Institutions.

.- Privacy and Legal Implications Regarding the Processing of Honeypot Data.

.- Social Network Graphs in Email Forensics: Analysis of a Personal Email Dataset.

.- Smoke Signals: Analysing and Decoding Quiet Quitting and Burnout Among Cybersecurity Professionals.

.- Solving the Privacy and Security Challenge using ZKP: Its Positive Impact on the 
Economy.

.- Biometric authentication: Stress as a factor in keystroke dynamics.

.- Profiling Prominent Ransomware Threat Actors.

.- Trust Requirements and Mechanisms in Peer-to-Peer Energy Markets.

.- Contextual Factors influencing the Cybersecurity Commitment of Government Institutions in Developing Countries.

.- Digital Forensic Investigation and Linguistic Analysis of Cybercrime: A Systematic 
Review.

.- Conceptual Model for Taxation and Regulatory Governance among South African 
Crypto Asset Holders.

.- Countering mobile application threats through a structured threat modelling approach.

.- Enhancing Forensic Readiness through an Integrated Approach to Fraud Risk Management throughout the Digital Transformation Lifecycle.

.- Guidance for the Creation of Management and Cost Accounting Computerized Infor mation Systems: Assurance of Information Integrity and Flexibility.

.- A chatbot LLM based access control mechanism.

.- Factors influencing Sensitive Data Protection practices in South African public schools.

.- Changes in Observed Internet Background Radiation Traffic in the 155/8 netblock.

.- Using artificial intelligence techniques to standardize and automated generation of digital forensic reports.

.- Exploring the Cybersecurity-Resilience Gap: An Analysis of Student Attitudes and Behaviors in Higher Education.

.- A Decentralized E-voting System Using Blockchain.

.- Lacking Balance? Assessing the Content and Coverage of Cyber Security Degrees.

最近チェックした商品