Venter / Eloff / Botha | Information and Cyber Security | E-Book | www.sack.de
E-Book

E-Book, Englisch, 218 Seiten

Reihe: Communications in Computer and Information Science

Venter / Eloff / Botha Information and Cyber Security

23rd International Conference, ISSA 2024, Gqeberha, South Africa, December 2-3, 2024, Revised Selected Papers
Erscheinungsjahr 2025
ISBN: 978-3-032-09660-9
Verlag: Springer International Publishing
Format: PDF
Kopierschutz: 1 - PDF Watermark

23rd International Conference, ISSA 2024, Gqeberha, South Africa, December 2-3, 2024, Revised Selected Papers

E-Book, Englisch, 218 Seiten

Reihe: Communications in Computer and Information Science

ISBN: 978-3-032-09660-9
Verlag: Springer International Publishing
Format: PDF
Kopierschutz: 1 - PDF Watermark



This book constitutes the refereed post-conference proceedings of the 23rd International Conference on Information Security, ISSA 2024, held in Gqeberha, South Africa, during December 2-3, 2024.

The 21 full papers presented were carefully reviewed and selected from 55 submissions. The papers focus on topics such as Cyber security; Information Security; Network Security; Computer Security; Digital Forensics; Botnets; Security in Cloud Computing; ChatBot security; Insider Threats; NIDS; GANs and Malware; Privacy; Cyber security Education; Cyber security & AI; Digital Forensics & AI.

Venter / Eloff / Botha Information and Cyber Security jetzt bestellen!

Zielgruppe


Research

Weitere Infos & Material


.- A Rapid Review Cybersecurity Strategic Analysis Framework: The Case of Higher Education Institutions.

.- Privacy and Legal Implications Regarding the Processing of Honeypot Data.

.- Social Network Graphs in Email Forensics: Analysis of a Personal Email Dataset.

.- Smoke Signals: Analysing and Decoding Quiet Quitting and Burnout Among Cybersecurity Professionals.

.- Solving the Privacy and Security Challenge using ZKP: Its Positive Impact on the 
Economy.

.- Biometric authentication: Stress as a factor in keystroke dynamics.

.- Profiling Prominent Ransomware Threat Actors.

.- Trust Requirements and Mechanisms in Peer-to-Peer Energy Markets.

.- Contextual Factors influencing the Cybersecurity Commitment of Government Institutions in Developing Countries.

.- Digital Forensic Investigation and Linguistic Analysis of Cybercrime: A Systematic 
Review.

.- Conceptual Model for Taxation and Regulatory Governance among South African 
Crypto Asset Holders.

.- Countering mobile application threats through a structured threat modelling approach.

.- Enhancing Forensic Readiness through an Integrated Approach to Fraud Risk Management throughout the Digital Transformation Lifecycle.

.- Guidance for the Creation of Management and Cost Accounting Computerized Infor mation Systems: Assurance of Information Integrity and Flexibility.

.- A chatbot LLM based access control mechanism.

.- Factors influencing Sensitive Data Protection practices in South African public schools.

.- Changes in Observed Internet Background Radiation Traffic in the 155/8 netblock.

.- Using artificial intelligence techniques to standardize and automated generation of digital forensic reports.

.- Exploring the Cybersecurity-Resilience Gap: An Analysis of Student Attitudes and Behaviors in Higher Education.

.- A Decentralized E-voting System Using Blockchain.

.- Lacking Balance? Assessing the Content and Coverage of Cyber Security Degrees.



Ihre Fragen, Wünsche oder Anmerkungen
Vorname*
Nachname*
Ihre E-Mail-Adresse*
Kundennr.
Ihre Nachricht*
Lediglich mit * gekennzeichnete Felder sind Pflichtfelder.
Wenn Sie die im Kontaktformular eingegebenen Daten durch Klick auf den nachfolgenden Button übersenden, erklären Sie sich damit einverstanden, dass wir Ihr Angaben für die Beantwortung Ihrer Anfrage verwenden. Selbstverständlich werden Ihre Daten vertraulich behandelt und nicht an Dritte weitergegeben. Sie können der Verwendung Ihrer Daten jederzeit widersprechen. Das Datenhandling bei Sack Fachmedien erklären wir Ihnen in unserer Datenschutzerklärung.