ECCWS 2020 20th European Conference on Cyber Warfare and Security

ECCWS 2020 20th European Conference on Cyber Warfare and Security

Author: Dr Thaddeus Eze

Publisher: Academic Conferences and publishing limited

ISBN: 9781912764624

Category: Computers

Page:

View: 611

These proceedings represent the work of contributors to the 19th European Conference on Cyber Warfare and Security (ECCWS 2020), supported by University of Chester, UK on 25-26 June 2020. The Conference Co-chairs are Dr Thaddeus Eze and Dr Lee Speakman, both from University of Chester and the Programme Chair is Dr Cyril Onwubiko from IEEE and Director, Cyber Security Intelligence at Research Series Limited. ECCWS is a well-established event on the academic research calendar and now in its 19th year the key aim remains the opportunity for participants to share ideas and meet. The conference was due to be held at University of Chester, UK, but due to the global Covid-19 pandemic it was moved online to be held as a virtual event. The scope of papers will ensure an interesting conference. The subjects covered illustrate the wide range of topics that fall into this important and ever-growing area of research.

16th International Conference on Cyber Warfare and Security

16th International Conference on Cyber Warfare and Security

Author: Dr Juan Lopez Jr

Publisher: Academic Conferences Limited

ISBN: 9781912764884

Category: History

Page:

View: 168

These proceedings represent the work of contributors to the 16th International Conference on Cyber Warfare and Security (ICCWS 2021), hosted by joint collaboration of Tennessee Tech Cybersecurity Education, Research and Outreach Center (CEROC), Computer Science department and the Oak Ridge National Laboratory, Tennessee on 25-26 February 2021. The Conference Co-Chairs are Dr. Juan Lopez Jr, Oak Ridge National Laboratory, Tennessee, and Dr. Ambareen Siraj, Tennessee Tech’s Cybersecurity Education, Research and Outreach Center (CEROC), and the Program Chair is Dr. Kalyan Perumalla, from Oak Ridge National Laboratory, Tennessee.

Cyber Security

Cyber Security

Author: Martti Lehto

Publisher: Springer Nature

ISBN: 9783030912932

Category: Computers

Page: 484

View: 973

This book focus on critical infrastructure protection. The chapters present detailed analysis of the issues and challenges in cyberspace and provide novel solutions in various aspects. The first part of the book focus on digital society, addressing critical infrastructure and different forms of the digitalization, strategic focus on cyber security, legal aspects on cyber security, citizen in digital society, and cyber security training. The second part focus on the critical infrastructure protection in different areas of the critical infrastructure. The chapters cover the cybersecurity situation awareness, aviation and air traffic control, cyber security in smart societies and cities, cyber security in smart buildings, maritime cyber security, cyber security in energy systems, and cyber security in healthcare. The third part presents the impact of new technologies upon cyber capability building as well as new challenges brought about by new technologies. These new technologies are among others are quantum technology, firmware and wireless technologies, malware analysis, virtualization.

Digital Transformation, Cyber Security and Resilience of Modern Societies

Digital Transformation, Cyber Security and Resilience of Modern Societies

Author: Todor Tagarev

Publisher: Springer Nature

ISBN: 9783030657222

Category: Computers

Page: 495

View: 734

This book presents the implementation of novel concepts and solutions, which allows to enhance the cyber security of administrative and industrial systems and the resilience of economies and societies to cyber and hybrid threats. This goal can be achieved by rigorous information sharing, enhanced situational awareness, advanced protection of industrial processes and critical infrastructures, and proper account of the human factor, as well as by adequate methods and tools for analysis of big data, including data from social networks, to find best ways to counter hybrid influence. The implementation of these methods and tools is examined here as part of the process of digital transformation through incorporation of advanced information technologies, knowledge management, training and testing environments, and organizational networking. The book is of benefit to practitioners and researchers in the field of cyber security and protection against hybrid threats, as well as to policymakers and senior managers with responsibilities in information and knowledge management, security policies, and human resource management and training.

ICT Systems Security and Privacy Protection

ICT Systems Security and Privacy Protection

Author: Audun Jøsang

Publisher: Springer Nature

ISBN: 9783030781200

Category: Computers

Page: 448

View: 369

This book constitutes the refereed proceedings of the 36th IFIP TC 11 International Conference on Information Security and Privacy Protection, SEC 2021, held in Oslo, Norway, in June 2021.* The 28 full papers presented were carefully reviewed and selected from 112 submissions. The papers present novel research on theoretical and practical aspects of security and privacy protection in ICT systems. They are organized in topical sections on digital signatures; vulnerability management; covert channels and cryptography; application and system security; privacy; network security; machine learning for security; and security management. *The conference was held virtually.

Illumination of Artificial Intelligence in Cybersecurity and Forensics

Illumination of Artificial Intelligence in Cybersecurity and Forensics

Author: Sanjay Misra

Publisher: Springer Nature

ISBN: 9783030934538

Category: Artificial intelligence

Page: 378

View: 202

This book covers a variety of topics that span from industry to academics: hybrid AI model for IDS in IoT, intelligent authentication framework for IoMT mobile devices for extracting bioelectrical signals, security audit in terms of vulnerability analysis to protect the electronic medical records in healthcare system using AI, classification using CNN a multi-face recognition attendance system with anti-spoofing capability, challenges in face morphing attack detection, a dimensionality reduction and feature-level fusion technique for morphing attack detection (MAD) systems, findings and discussion on AI-assisted forensics, challenges and open issues in the application of AI in forensics, a terrorist computational model that uses Baum-Welch optimization to improve the intelligence and predictive accuracy of the activities of criminal elements, a novel method for detecting security violations in IDSs, graphical-based city block distance algorithm method for E-payment systems, image encryption, and AI methods in ransomware mitigation and detection. It assists the reader in exploring new research areas, wherein AI can be applied to offer solutions through the contribution from researchers and academia.

Decolonising Political Communication in Africa

Decolonising Political Communication in Africa

Author: Beschara Karam

Publisher: Routledge

ISBN: 9781000411980

Category: Political Science

Page: 254

View: 641

This book uses decolonisation as a lens to interrogate political communication styles, performance, and practice in Africa and the diaspora. The book interrogates the theory and practice of political communication, using decolonial research methods to begin a process of self-reflexivity and the creation of a new approach to knowledge production about African political communication. In doing so, it explores political communication approaches that might until recently have been considered subversive or dissident: forms of political communication that served to challenge imposed western norms and to empower African citizens and their histories. Centring African scholarship, the book draws on case studies from across the continent, including Zimbabwe, South Africa, Nigeria and Ghana. This book will be of interest to students and scholars of politics, media and communication in Africa.