Proceedings of the International Conference on Cybersecurity, Situational Awareness and Social Media

Proceedings of the International Conference on Cybersecurity, Situational Awareness and Social Media

Cyber Science 2024; 27-28 June; Edinburgh Napier University, Scotland

Rosati, Pierangelo; Bellekens, Xavier; Hindy, Hanan; Jaatun, Martin Gilje; Rege, Aunshul; Onwubiko, Cyril; Erola, Arnau

Springer Nature Switzerland AG

02/2025

359

Dura

9789819604005

Pré-lançamento - envio 15 a 20 dias após a sua edição

Descrição não disponível.
Part 1 Artificial Intelligence Applications.- RingGuard: A privacy protected Peer to Peer Federated Learning Framework.- Improving Credit Card Fraud Detection with Combined Feature Extraction and Class Balance Optimisation Techniques.- Attention based Image Steganography Using CNNs in Integration with Quantization.- Part 2 Advanced Cryptography in Emerging Applications.- vSPACE Voting in a Scalable, Privacy-Aware and Confidential Election.- Design of Pairing Free Attribute based Encryption for Smart Grid Applications.- Critical Infrastructures in the Cloud.- Part 3 Security Operations Centre (SOC) & Advanced Malware Detection Techniques.- An Exemplar Incident Response Plan for Security Operations Center Analysts.- Malware Detection using Machine Learning Algorithms.- A Case Study of a Ransomware and Social Engineering Competition.- Exploring DTrace as an Incident Response Tool for Unix Systems.- Utilizing YARA: An Effective Method for Phishing Attack Response.- Part 4 Threat Intelligence and Emerging Techniques for Fraud Detection and Prevention.- TIPS: Threat Sharing Information Platform for Enhanced Security.- TRIST: Towards a container-based ICS testbed for cyber threat simulation and anomaly detection.- Radio Frequency (RF) Cyber Threats and a novel RF Cyber Kill Chain.- Part 5 Cybersecurity Governance, Risk Management and Assurance.- Perception of cyber risk for assisted living technologies in the Norwegian healthcare sector key stakeholders perceptions.- Workshop Insights: Navigating Cybersecurity Regulations for Device Manufacturers and Healthcare Operators.- Digital Evidence from the Legal Practitioners' Perspective.- Part 6 Critical Infrastructures, Systems & Applications.- Fuzzing the ARM Cortex-M: A Survey.- Towards a Secure Manufacturing Framework for Single Malt Whisky in Industry 4.0.- Implementation of Zones and Conduits in Industrial Control and Automation Systems.
Artificial Intelligence (AI);Security Analytics;Cyber Physical Systems;Cyber Defence;Blockchain Technologies;Machine Learning (ML);Cyber Science;Cyber Insurance;Cyber Incident Response;Internet of Things (IoT);Human Factor Cognition;Wearable and Web Analytics