
Proceedings of the International Conference on Cybersecurity, Situational Awareness and Social Media
Cyber Science 2024; 27?28 June; Edinburgh Napier University, Scotland
Series: Springer Proceedings in Complexity;
- Publisher's listprice EUR 235.39
-
The price is estimated because at the time of ordering we do not know what conversion rates will apply to HUF / product currency when the book arrives. In case HUF is weaker, the price increases slightly, in case HUF is stronger, the price goes lower slightly.
- Discount 8% (cc. 7 988 Ft off)
- Discounted price 91 864 Ft (87 489 Ft + 5% VAT)
99 852 Ft
Availability
Not yet published.
Why don't you give exact delivery time?
Delivery time is estimated on our previous experiences. We give estimations only, because we order from outside Hungary, and the delivery time mainly depends on how quickly the publisher supplies the book. Faster or slower deliveries both happen, but we do our best to supply as quickly as possible.
Product details:
- Publisher Springer
- Date of Publication 29 May 2025
- Number of Volumes 1 pieces, Book
- ISBN 9789819604005
- Binding Hardback
- No. of pages384 pages
- Size 235x155 mm
- Language English
- Illustrations 22 Illustrations, black & white; 100 Illustrations, color 700
Categories
Short description:
This book presents peer-reviewed articles from Cyber Science 2024, held on 27?28 June at Edinburgh Napier University in Scotland. With no competing conferences in this unique and specialized area (cyber science), especially focusing on the application of situation awareness to cyber security (CS), artificial intelligence, blockchain technologies, cyber physical systems (CPS), social media and cyber incident response, it presents a fusion of these unique and multidisciplinary areas into one that serves a wider audience making this conference a sought-after event. Hence, this proceedings offers a cutting edge and fast reaching forum for organizations to learn, network, and promote their services. Also, it offers professionals, students, and practitioners a platform to learn new and emerging disciplines.
MoreLong description:
This book presents peer-reviewed articles from Cyber Science 2024, held on 27?28 June at Edinburgh Napier University in Scotland. With no competing conferences in this unique and specialized area (cyber science), especially focusing on the application of situation awareness to cyber security (CS), artificial intelligence, blockchain technologies, cyber physical systems (CPS), social media and cyber incident response, it presents a fusion of these unique and multidisciplinary areas into one that serves a wider audience making this conference a sought-after event. Hence, this proceedings offers a cutting edge and fast reaching forum for organizations to learn, network, and promote their services. Also, it offers professionals, students, and practitioners a platform to learn new and emerging disciplines.
MoreTable of Contents:
Part 1 Artificial Intelligence Applications.- RingGuard: A privacy protected Peer to Peer Federated Learning Framework.- Improving Credit Card Fraud Detection with Combined Feature Extraction and Class Balance Optimisation Techniques.- Attention based Image Steganography Using CNNs in Integration with Quantization.- Part 2 Advanced Cryptography in Emerging Applications.- vSPACE Voting in a Scalable, Privacy-Aware and Confidential Election.- Design of Pairing Free Attribute based Encryption for Smart Grid Applications.- Critical Infrastructures in the Cloud.- Part 3 Security Operations Centre (SOC) & Advanced Malware Detection Techniques.- An Exemplar Incident Response Plan for Security Operations Center Analysts.- Malware Detection using Machine Learning Algorithms.- A Case Study of a Ransomware and Social Engineering Competition.- Exploring DTrace as an Incident Response Tool for Unix Systems.- Utilizing YARA: An Effective Method for Phishing Attack Response.- Part 4 Threat Intelligence and Emerging Techniques for Fraud Detection and Prevention.- TIPS: Threat Sharing Information Platform for Enhanced Security.- TRIST: Towards a container-based ICS testbed for cyber threat simulation and anomaly detection.- Radio Frequency (RF) Cyber Threats and a novel RF Cyber Kill Chain.- Part 5 Cybersecurity Governance, Risk Management and Assurance.- Perception of cyber risk for assisted living technologies in the Norwegian healthcare sector key stakeholders perceptions.- Workshop Insights: Navigating Cybersecurity Regulations for Device Manufacturers and Healthcare Operators.- Digital Evidence from the Legal Practitioners? Perspective.- Part 6 Critical Infrastructures, Systems & Applications.- Fuzzing the ARM Cortex-M: A Survey.- Towards a Secure Manufacturing Framework for Single Malt Whisky in Industry 4.0.- Implementation of Zones and Conduits in Industrial Control and Automation Systems.
More