Advancing Innovative Cybersecurity Solutions and Approaches to Protect Digital Ecosystems (IFIP Advances in Information and Communication Technology 777) (2025. xii, 260 S. XII, 260 p. 48 illus., 27 illus. in color. 235 mm)

個数:
  • 予約

Advancing Innovative Cybersecurity Solutions and Approaches to Protect Digital Ecosystems (IFIP Advances in Information and Communication Technology 777) (2025. xii, 260 S. XII, 260 p. 48 illus., 27 illus. in color. 235 mm)

  • 現在予約受付中です。出版後の入荷・発送となります。
    重要:表示されている発売日は予定となり、発売が延期、中止、生産限定品で商品確保ができないなどの理由により、ご注文をお取消しさせていただく場合がございます。予めご了承ください。

    ●3Dセキュア導入とクレジットカードによるお支払いについて
  • ≪洋書のご注文について≫ 「海外取次在庫あり」「国内在庫僅少」および「国内仕入れ先からお取り寄せいたします」表示の商品でもクリスマス前(12/20~12/25)および年末年始までにお届けできないことがございます。あらかじめご了承ください。

  • 【入荷遅延について】
    世界情勢の影響により、海外からお取り寄せとなる洋書・洋古書の入荷が、表示している標準的な納期よりも遅延する場合がございます。
    おそれいりますが、あらかじめご了承くださいますようお願い申し上げます。
  • ◆画像の表紙や帯等は実物とは異なる場合があります。
  • ◆ウェブストアでの洋書販売価格は、弊社店舗等での販売価格とは異なります。
    また、洋書販売価格は、ご注文確定時点での日本円価格となります。
    ご注文確定後に、同じ洋書の販売価格が変動しても、それは反映されません。
  • 製本 Hardcover:ハードカバー版
  • 商品コード 9783032130747

Full Description

This book constitutes the proceedings of the First IFIP TC 9, TC 11 International Cybersecurity Conference, IFIP-UNIVEN-CSIR ICC 2025, held in Tshwane, South Africa, in December 2025.

The 17 full papers included in the proceedings were carefully reviewed and selected from 43 submissions. They were organized in topical sections as follows: Security in Emerging and Advanced Technologies (AI/ML and Blockchain); Cybersecurity Governance, Policy, and National Strategies; Cybersecurity Education, Training, and Human Factors; Security Architectures, Models, and Authentication Mechanisms. 

Contents

.- Security in Emerging & Advanced Technologies (AI/ML & Blockchain).
.- Security Risks in Large Language Models and General Mitigation Strategies.
.- AI-Blockchain Synergy for Next-Generation Cybersecurity Adaptive, Ethical, and Efficient Architectures.
.- From Regex to Transformers: A Hybrid Framework for Cyber Threat Indicator Extraction from Unstructured Text .
.- Towards facial expression analysis for enhanced threat detection in surveillance.
.- Securing Agricultural Sustainability: Integrating Digital Twins and Blockchain for Smart Farming.
.- Cybersecurity Governance, Policy, and National Strategies.
.- African Cyber Power: Establishing a Strategic Rationale for Offensive Cyber Power  Capabilities. The Case of South Africa.
.- Addressing Evolving Cybersecurity Threats from Industrial Internet of Things (IIoT) Adoption Through Improved Cybersecurity Governance.
.- Digital Literacy and the challenge for NIST compliance in developing countries.
.- Privacy by design for GDPR Compliance Assessment.
.- Cybersecurity Education, Training, and Human Factors.
.- Identifying Gaps in the Evaluation of Security Education, Training and Awareness (SETA) Programs: A Systematic Literature Review.
.- Teaching Cybersecurity through Practice: Approaches and Insights.
.- The Influence of Cybersecurity Fatigue on Students' Compliance with Cybersecurity Measures.
.- Beyond Smoke Signals: A Conceptual Model Positioning Burnout and Quiet Quitting in Cybersecurity Professionals.
.- Security Architectures, Models, and Authentication Mechanisms.
.- Multidimensional Review of Cybersecurity Vulnerabilities in E-Government Systems: The Case of South Africa.
.- Managing Risks and Improving Cyber Resilience - Assessing Mobile Application Security using a Reference Model.
.- Enhancing Digital Wallet Security: A Systematic Comparison of Passwordless and Risk-Based Authentication Approaches.
.- Diagnosability of Attack Trees.

最近チェックした商品