
This book constitutes the refereed post-conference proceedings of the 23rd International Conference on Information Security, ISSA 2024, held in Gqeberha, South Africa, during December 2-3, 2024.
The 21 full papers presented were carefully reviewed and selected from 55 submissions. The papers focus on topics such as Cyber security; Information Security; Network Security; Computer Security; Digital Forensics; Botnets; Security in Cloud Computing; ChatBot security; Insider Threats; NIDS; GANs and Malware; Privacy; Cyber security Education; Cyber security & AI; Digital Forensics & AI.
Inhaltsverzeichnis
. - A Rapid Review Cybersecurity Strategic Analysis Framework: The Case of Higher Education Institutions.
. - Privacy and Legal Implications Regarding the Processing of Honeypot Data.
. - Social Network Graphs in Email Forensics: Analysis of a Personal Email Dataset.
. - Smoke Signals: Analysing and Decoding Quiet Quitting and Burnout Among Cybersecurity Professionals.
. - Solving the Privacy and Security Challenge using ZKP: Its Positive Impact on the
Economy.
. - Biometric authentication: Stress as a factor in keystroke dynamics.
. - Profiling Prominent Ransomware Threat Actors.
. - Trust Requirements and Mechanisms in Peer-to-Peer Energy Markets.
. - Contextual Factors influencing the Cybersecurity Commitment of Government Institutions in Developing Countries.
. - Digital Forensic Investigation and Linguistic Analysis of Cybercrime: A Systematic
Review.
. - Conceptual Model for Taxation and Regulatory Governance among South African
Crypto Asset Holders.
. - Countering mobile application threats through a structured threat modelling approach.
. - Enhancing Forensic Readiness through an Integrated Approach to Fraud Risk Management throughout the Digital Transformation Lifecycle.
. - Guidance for the Creation of Management and Cost Accounting Computerized Infor mation Systems: Assurance of Information Integrity and Flexibility.
. - A chatbot LLM based access control mechanism.
. - Factors influencing Sensitive Data Protection practices in South African public schools.
. - Changes in Observed Internet Background Radiation Traffic in the 155/8 netblock.
. - Using artificial intelligence techniques to standardize and automated generation of digital forensic reports.
. - Exploring the Cybersecurity-Resilience Gap: An Analysis of Student Attitudes and Behaviors in Higher Education.
. - A Decentralized E-voting System Using Blockchain.
. - Lacking Balance? Assessing the Content and Coverage of Cyber Security Degrees.
Es wurden noch keine Bewertungen abgegeben. Schreiben Sie die erste Bewertung zu "Information and Cyber Security" und helfen Sie damit anderen bei der Kaufentscheidung.