PRIZES to win! PROMOTIONS

Close Notification

Your cart does not contain any items

Information and Cyber Security

23rd International Conference, ISSA 2024, Gqeberha, South Africa, December 2-3, 2024, Revised...

Hein Venter Mariki Eloff Jan Eloff Reinhardt Botha

$147.95   $118.08

Paperback

Not in-store but you can order this
How long will it take?

QTY:

English
Springer Nature Switzerland AG
16 November 2025
This book constitutes the refereed post-conference proceedings of the 23rd International Conference on Information Security, ISSA 2024, held in Gqeberha, South Africa, during December 2-3, 2024.

The 21 full papers presented were carefully reviewed and selected from 55 submissions. The papers focus on topics such as Cyber security; Information Security; Network Security; Computer Security; Digital Forensics; Botnets; Security in Cloud Computing; ChatBot security; Insider Threats; NIDS; GANs and Malware; Privacy; Cyber security Education; Cyber security & AI; Digital Forensics & AI.
Edited by:   , , , ,
Imprint:   Springer Nature Switzerland AG
Country of Publication:   Switzerland
Dimensions:   Height: 235mm,  Width: 155mm, 
ISBN:   9783032096593
ISBN 10:   3032096596
Series:   Communications in Computer and Information Science
Pages:   218
Publication Date:  
Audience:   College/higher education ,  Further / Higher Education
Format:   Paperback
Publisher's Status:   Active
.- A Rapid Review Cybersecurity Strategic Analysis Framework: The Case of Higher Education Institutions. .- Privacy and Legal Implications Regarding the Processing of Honeypot Data. .- Social Network Graphs in Email Forensics: Analysis of a Personal Email Dataset. .- Smoke Signals: Analysing and Decoding Quiet Quitting and Burnout Among Cybersecurity Professionals. .- Solving the Privacy and Security Challenge using ZKP: Its Positive Impact on the  Economy. .- Biometric authentication: Stress as a factor in keystroke dynamics. .- Profiling Prominent Ransomware Threat Actors. .- Trust Requirements and Mechanisms in Peer-to-Peer Energy Markets. .- Contextual Factors influencing the Cybersecurity Commitment of Government Institutions in Developing Countries. .- Digital Forensic Investigation and Linguistic Analysis of Cybercrime: A Systematic  Review. .- Conceptual Model for Taxation and Regulatory Governance among South African  Crypto Asset Holders. .- Countering mobile application threats through a structured threat modelling approach. .- Enhancing Forensic Readiness through an Integrated Approach to Fraud Risk Management throughout the Digital Transformation Lifecycle. .- Guidance for the Creation of Management and Cost Accounting Computerized Infor mation Systems: Assurance of Information Integrity and Flexibility. .- A chatbot LLM based access control mechanism. .- Factors influencing Sensitive Data Protection practices in South African public schools. .- Changes in Observed Internet Background Radiation Traffic in the 155/8 netblock. .- Using artificial intelligence techniques to standardize and automated generation of digital forensic reports. .- Exploring the Cybersecurity-Resilience Gap: An Analysis of Student Attitudes and Behaviors in Higher Education. .- A Decentralized E-voting System Using Blockchain. .- Lacking Balance? Assessing the Content and Coverage of Cyber Security Degrees.

See Also