Muutke küpsiste eelistusi

E-raamat: Advancing Innovative Cybersecurity Solutions and Approaches to Protect Digital Ecosystems: First IFIP TC 9, TC 11 International Conference in Cybersecurity, IFIP-UNIVEN-CSIR ICC 2025, Tshwane, South Africa, December 11-12, 2025, Proceedings

Edited by , Edited by , Edited by , Edited by , Edited by , Edited by , Edited by
  • Formaat - PDF+DRM
  • Hind: 135,23 €*
  • * hind on lõplik, st. muud allahindlused enam ei rakendu
  • Lisa ostukorvi
  • Lisa soovinimekirja
  • See e-raamat on mõeldud ainult isiklikuks kasutamiseks. E-raamatuid ei saa tagastada.

DRM piirangud

  • Kopeerimine (copy/paste):

    ei ole lubatud

  • Printimine:

    ei ole lubatud

  • Kasutamine:

    Digitaalõiguste kaitse (DRM)
    Kirjastus on väljastanud selle e-raamatu krüpteeritud kujul, mis tähendab, et selle lugemiseks peate installeerima spetsiaalse tarkvara. Samuti peate looma endale  Adobe ID Rohkem infot siin. E-raamatut saab lugeda 1 kasutaja ning alla laadida kuni 6'de seadmesse (kõik autoriseeritud sama Adobe ID-ga).

    Vajalik tarkvara
    Mobiilsetes seadmetes (telefon või tahvelarvuti) lugemiseks peate installeerima selle tasuta rakenduse: PocketBook Reader (iOS / Android)

    PC või Mac seadmes lugemiseks peate installima Adobe Digital Editionsi (Seeon tasuta rakendus spetsiaalselt e-raamatute lugemiseks. Seda ei tohi segamini ajada Adober Reader'iga, mis tõenäoliselt on juba teie arvutisse installeeritud )

    Seda e-raamatut ei saa lugeda Amazon Kindle's. 

This book constitutes the proceedings of the First IFIP TC 9, TC 11 International Cybersecurity Conference, IFIP-UNIVEN-CSIR ICC 2025, held in Tshwane, South Africa, in December 2025.



The 17 full papers included in the proceedings were carefully reviewed and selected from 43 submissions. They were organized in topical sections as follows: Security in Emerging and Advanced Technologies (AI/ML and Blockchain); Cybersecurity Governance, Policy, and National Strategies; Cybersecurity Education, Training, and Human Factors; Security Architectures, Models, and Authentication Mechanisms. 
.- Security in Emerging & Advanced Technologies (AI/ML & Blockchain).
.- Security Risks in Large Language Models and General Mitigation
Strategies.
.- AI-Blockchain Synergy for Next-Generation Cybersecurity Adaptive, Ethical,
and Efficient Architectures.
.- From Regex to Transformers: A Hybrid Framework for Cyber Threat Indicator
Extraction from Unstructured Text .
.- Towards facial expression analysis for enhanced threat detection in
surveillance.
.- Securing Agricultural Sustainability: Integrating Digital Twins and
Blockchain for Smart Farming.
.- Cybersecurity Governance, Policy, and National Strategies.
.- African Cyber Power: Establishing a Strategic Rationale for Offensive
Cyber Power  Capabilities. The Case of South Africa.
.- Addressing Evolving Cybersecurity Threats from Industrial Internet of
Things (IIoT) Adoption Through Improved Cybersecurity Governance.
.- Digital Literacy and the challenge for NIST compliance in developing
countries.
.- Privacy by design for GDPR Compliance Assessment.
.- Cybersecurity Education, Training, and Human Factors.
.- Identifying Gaps in the Evaluation of Security Education, Training and
Awareness (SETA) Programs: A Systematic Literature Review.
.- Teaching Cybersecurity through Practice: Approaches and Insights.
.- The Influence of Cybersecurity Fatigue on Students Compliance with
Cybersecurity Measures.
.- Beyond Smoke Signals: A Conceptual Model Positioning Burnout and Quiet
Quitting in Cybersecurity Professionals.
.- Security Architectures, Models, and Authentication Mechanisms.
.- Multidimensional Review of Cybersecurity Vulnerabilities in E-Government
Systems: The Case of South Africa.
.- Managing Risks and Improving Cyber Resilience Assessing Mobile
Application Security using a Reference Model.
.- Enhancing Digital Wallet Security: A Systematic Comparison of Passwordless
and Risk-Based Authentication Approaches.
.- Diagnosability of Attack Trees.