Muutke küpsiste eelistusi

Advancing Innovative Cybersecurity Solutions and Approaches to Protect Digital Ecosystems: First IFIP TC 9, TC 11 International Conference in Cybersecurity, IFIP-UNIVEN-CSIR ICC 2025, Tshwane, South Africa, December 1112, 2025, Proceedings [Kõva köide]

Edited by , Edited by , Edited by , Edited by , Edited by , Edited by , Edited by
  • Formaat: Hardback, 260 pages, kõrgus x laius: 235x155 mm, 27 Illustrations, color; 21 Illustrations, black and white
  • Sari: IFIP Advances in Information and Communication Technology
  • Ilmumisaeg: 03-Dec-2025
  • Kirjastus: Springer Nature Switzerland AG
  • ISBN-10: 3032130743
  • ISBN-13: 9783032130747
  • Kõva köide
  • Hind: 113,72 €*
  • * hind on lõplik, st. muud allahindlused enam ei rakendu
  • Tavahind: 133,79 €
  • Säästad 15%
  • Raamatu kohalejõudmiseks kirjastusest kulub orienteeruvalt 3-4 nädalat
  • Kogus:
  • Lisa ostukorvi
  • Tasuta tarne
  • Tellimisaeg 2-4 nädalat
  • Lisa soovinimekirja
  • Formaat: Hardback, 260 pages, kõrgus x laius: 235x155 mm, 27 Illustrations, color; 21 Illustrations, black and white
  • Sari: IFIP Advances in Information and Communication Technology
  • Ilmumisaeg: 03-Dec-2025
  • Kirjastus: Springer Nature Switzerland AG
  • ISBN-10: 3032130743
  • ISBN-13: 9783032130747
This book constitutes the proceedings of the First IFIP TC 9, TC 11 International Cybersecurity Conference, IFIP-UNIVEN-CSIR ICC 2025, held in Tshwane, South Africa, in December 2025.



The 17 full papers included in the proceedings were carefully reviewed and selected from 43 submissions. They were organized in topical sections as follows: Security in Emerging and Advanced Technologies (AI/ML and Blockchain); Cybersecurity Governance, Policy, and National Strategies; Cybersecurity Education, Training, and Human Factors; Security Architectures, Models, and Authentication Mechanisms. 
.- Security in Emerging & Advanced Technologies (AI/ML & Blockchain).
.- Security Risks in Large Language Models and General Mitigation
Strategies.
.- AI-Blockchain Synergy for Next-Generation Cybersecurity Adaptive, Ethical,
and Efficient Architectures.
.- From Regex to Transformers: A Hybrid Framework for Cyber Threat Indicator
Extraction from Unstructured Text .
.- Towards facial expression analysis for enhanced threat detection in
surveillance.
.- Securing Agricultural Sustainability: Integrating Digital Twins and
Blockchain for Smart Farming.
.- Cybersecurity Governance, Policy, and National Strategies.
.- African Cyber Power: Establishing a Strategic Rationale for Offensive
Cyber Power  Capabilities. The Case of South Africa.
.- Addressing Evolving Cybersecurity Threats from Industrial Internet of
Things (IIoT) Adoption Through Improved Cybersecurity Governance.
.- Digital Literacy and the challenge for NIST compliance in developing
countries.
.- Privacy by design for GDPR Compliance Assessment.
.- Cybersecurity Education, Training, and Human Factors.
.- Identifying Gaps in the Evaluation of Security Education, Training and
Awareness (SETA) Programs: A Systematic Literature Review.
.- Teaching Cybersecurity through Practice: Approaches and Insights.
.- The Influence of Cybersecurity Fatigue on Students Compliance with
Cybersecurity Measures.
.- Beyond Smoke Signals: A Conceptual Model Positioning Burnout and Quiet
Quitting in Cybersecurity Professionals.
.- Security Architectures, Models, and Authentication Mechanisms.
.- Multidimensional Review of Cybersecurity Vulnerabilities in E-Government
Systems: The Case of South Africa.
.- Managing Risks and Improving Cyber Resilience Assessing Mobile
Application Security using a Reference Model.
.- Enhancing Digital Wallet Security: A Systematic Comparison of Passwordless
and Risk-Based Authentication Approaches.
.- Diagnosability of Attack Trees.