Katalog der Deutschen Nationalbibliothek
Ergebnis der Suche nach: "Machine Learning"
|
|
|
| Link zu diesem Datensatz | https://d-nb.info/1383249113 |
| Titel | Advancing Innovative Cybersecurity Solutions and Approaches to Protect Digital Ecosystems : First IFIP TC 9, TC 11 International Conference in Cybersecurity, IFIP-UNIVEN-CSIR ICC 2025, Tshwane, South Africa, December 11–12, 2025, Proceedings / edited by Jabu Mtsweni, Modimowabarwa Kanyane, Jackie Phahlamohlaka, Willard Munyoka, Kerry-Lynn Thomson, Lynn Futcher, Joey Jansen van Vuuren |
| Person(en) |
Mtsweni, Jabu (Herausgeber) Kanyane, Modimowabarwa (Herausgeber) Phahlamohlaka, Jackie (Herausgeber) Munyoka, Willard (Herausgeber) Thomson, Kerry-Lynn (Herausgeber) Futcher, Lynn (Herausgeber) Jansen van Vuuren, Joey (Herausgeber) |
| Organisation(en) | SpringerLink (Online service) (Sonstige) |
| Ausgabe | 1st ed. 2026 |
| Verlag | Cham : Springer Nature Switzerland, Imprint: Springer |
| Zeitliche Einordnung | Erscheinungsdatum: 2026 |
| Umfang/Format | Online-Ressource, XII, 260 p. 48 illus., 27 illus. in color. : online resource. |
| Andere Ausgabe(n) |
Printed edition:: ISBN: 978-3-032-13074-7 Printed edition:: ISBN: 978-3-032-13076-1 Printed edition:: ISBN: 978-3-032-13077-8 |
| Inhalt | -- Security in Emerging & Advanced Technologies (AI/ML & Blockchain). -- Security Risks in Large Language Models and General Mitigation Strategies. -- AI-Blockchain Synergy for Next-Generation Cybersecurity Adaptive, Ethical, and Efficient Architectures. -- From Regex to Transformers: A Hybrid Framework for Cyber Threat Indicator Extraction from Unstructured Text . -- Towards facial expression analysis for enhanced threat detection in surveillance. -- Securing Agricultural Sustainability: Integrating Digital Twins and Blockchain for Smart Farming. -- Cybersecurity Governance, Policy, and National Strategies. -- African Cyber Power: Establishing a Strategic Rationale for Offensive Cyber Power Capabilities. The Case of South Africa. -- Addressing Evolving Cybersecurity Threats from Industrial Internet of Things (IIoT) Adoption Through Improved Cybersecurity Governance. -- Digital Literacy and the challenge for NIST compliance in developing countries. -- Privacy by design for GDPR Compliance Assessment. -- Cybersecurity Education, Training, and Human Factors. -- Identifying Gaps in the Evaluation of Security Education, Training and Awareness (SETA) Programs: A Systematic Literature Review. -- Teaching Cybersecurity through Practice: Approaches and Insights. -- The Influence of Cybersecurity Fatigue on Students’ Compliance with Cybersecurity Measures. -- Beyond Smoke Signals: A Conceptual Model Positioning Burnout and Quiet Quitting in Cybersecurity Professionals. -- Security Architectures, Models, and Authentication Mechanisms. -- Multidimensional Review of Cybersecurity Vulnerabilities in E-Government Systems: The Case of South Africa. -- Managing Risks and Improving Cyber Resilience – Assessing Mobile Application Security using a Reference Model. -- Enhancing Digital Wallet Security: A Systematic Comparison of Passwordless and Risk-Based Authentication Approaches. -- Diagnosability of Attack Trees |
| Persistent Identifier |
URN: urn:nbn:de:101:1-2512030305297.603218374427 DOI: 10.1007/978-3-032-13075-4 |
| URL | https://doi.org/10.1007/978-3-032-13075-4 |
| ISBN/Einband/Preis | 978-3-032-13075-4 |
| Sprache(n) | Englisch (eng) |
| Beziehungen | IFIP Advances in Information and Communication Technology ; 777 |
| DDC-Notation | 005.8 (maschinell ermittelte DDC-Kurznotation) |
| Sachgruppe(n) | 004 Informatik |
| Online-Zugriff | Archivobjekt öffnen |

