AISMA-2024: International Workshop on Advanced Information Security Management and Applications

AISMA-2024: International Workshop on Advanced Information Security Management and Applications

Sajid, Mohammad; Zolotarev, Vyacheslav; Tchernykh, Andrei; Babenko, Mikhail; Raza, Zahid; Lapina, Maria

Springer International Publishing AG

11/2024

360

Mole

9783031721700

Pré-lançamento - envio 15 a 20 dias após a sua edição

Descrição não disponível.
Chapter 1. Technology for assessing the readiness of information security specialists in the system of continuing education using game approaches.- Chapter 2. Access authentication and key distribution using physically unclonable functions, with SHA-256 as an example.- Chapter 3. Development of a framework for describing security incidents.- Chapter 4. Analysing information security risks when remotely connecting to the web interface.- Chapter 5. A safe and secure online system for bidding using blockchain technology.- Chapter 6. Theoretical framework for blockchain secured predictive maintenance learning model using digital twin.- Chapter 7. Advancements in Sybil attack detection: a comprehensive survey of machine learning-based approaches in wireless sensor networks.- Chapter 8. Guaranteed Output Delivery with More than 1/3 of Malicious Corruption for Client Server MPC Protocols and Applications.- Chapter 9. Methods of safe processing of user-entered information in information systems.- Chapter 10. Comparative analysis of methods for assessing confidence in the information security audit process.- Etc...
Este título pertence ao(s) assunto(s) indicados(s). Para ver outros títulos clique no assunto desejado.
Data Engineering;Computational Intelligence;Information security,;AI model training in information security;Blockchain technologies;Cryptography and applications;Information risk analysis and applications;Information security awareness and applications;Information security in education;Information security in Internet of Things;Machine learning in information security;Threat detection;UAV security control systems