Impact Versus Frequency on Cybersecurity Breach Trends in the Business and Medical Industry to Identify Human Error (Englisch)
- Neue Suche nach: Kahanda, Galathara
- Neue Suche nach: Rider, Sasha
- Neue Suche nach: Mukhopadhyay, Sayantini
- Neue Suche nach: Jahankhani, Hamid
- Neue Suche nach: Kahanda, Galathara
- Neue Suche nach: Rider, Sasha
- Neue Suche nach: Mukhopadhyay, Sayantini
In:
Cybersecurity Challenges in the Age of AI, Space Communications and Cyborgs
: Proceedings of the 15th International Conference on Global Security, Safety and Sustainability, London, October 2023
;
Kapitel: 5
;
77-96
;
2024
- Aufsatz/Kapitel (Buch) / Elektronische Ressource
-
Titel:Impact Versus Frequency on Cybersecurity Breach Trends in the Business and Medical Industry to Identify Human Error
-
Weitere Titelangaben:Adv. Sciences, Technologies
-
Beteiligte:Jahankhani, Hamid ( Herausgeber:in ) / Kahanda, Galathara ( Autor:in ) / Rider, Sasha ( Autor:in ) / Mukhopadhyay, Sayantini ( Autor:in )
-
Kongress:International Conference on Global Security, Safety, and Sustainability ; 2023 ; London, United Kingdom
-
Erschienen in:Cybersecurity Challenges in the Age of AI, Space Communications and Cyborgs : Proceedings of the 15th International Conference on Global Security, Safety and Sustainability, London, October 2023 ; Kapitel: 5 ; 77-96
-
Verlag:
- Neue Suche nach: Springer Nature Switzerland
-
Erscheinungsort:Cham
-
Erscheinungsdatum:20.02.2024
-
Format / Umfang:20 pages
-
ISBN:
-
ISSN:
-
DOI:
-
Medientyp:Aufsatz/Kapitel (Buch)
-
Format:Elektronische Ressource
-
Sprache:Englisch
-
Schlagwörter:
-
Datenquelle:
Inhaltsverzeichnis E-Book
Die Inhaltsverzeichnisse werden automatisch erzeugt und basieren auf den im Index des TIB-Portals verfügbaren Einzelnachweisen der enthaltenen Beiträge. Die Anzeige der Inhaltsverzeichnisse kann daher unvollständig oder lückenhaft sein.
- 1
-
Strengthening Security Mechanisms of Satellites and UAVs Against Possible Attacks from Quantum ComputersHussien, Osama A. A. M. / Arachchige, Isuru S. W. / Jahankhani, Hamid et al. | 2024
- 2
-
Evaluating the Security of Open-Source Linux Operating Systems for Unmanned Aerial VehiclesPatil, Darshan / Pournouri, Sina et al. | 2024
- 3
-
A Proposed Permissioned Blockchain Consensus Algorithm: Consensus Algorithm Genetically Enhanced (CAGE)Mitchell, Ian / Maka, Kamil et al. | 2024
- 4
-
Data Hiding in Anti-forensics—Exploit Delivery Through Digital SteganographyGashi, Hans / Zargari, Shahrzad / Jalali Ghazaani, Setareh et al. | 2024
- 5
-
Impact Versus Frequency on Cybersecurity Breach Trends in the Business and Medical Industry to Identify Human ErrorKahanda, Galathara / Rider, Sasha / Mukhopadhyay, Sayantini et al. | 2024
- 6
-
Identifying Daesh-Related Propaganda Using OSINT and Clustering AnalysisMe, Gianluigi / Mucci, Maria Felicita et al. | 2024
- 7
-
Cyberbullying Detection in Twitter Using Deep Learning Model TechniquesSeetharaman, Anu Ranjana / Jahankhani, Hamid et al. | 2024
- 8
-
A Signcryption Approach to Address Security and Privacy Issues in Online Gaming PlatformsUnal, Mahmut Ahmet / Islam, Tasmina et al. | 2024
- 9
-
ChildSecurity: A Web-Based Game to Raise Awareness of Cybersecurity and Privacy in ChildrenZou, Yang / Islam, Tasmina et al. | 2024
- 10
-
Subverting Biometric Security Using 3D Printed Biometrics CharacteristicsTait, Bobby L. et al. | 2024
- 11
-
Image Band-Distributive PCA Based Face Recognition TechniqueNdu, Henry / Sheikh-Akbari, Akbar / Mporas, Iosif / Deng, Jiamei et al. | 2024
- 12
-
RAFA Model. Rethinking Cyber Risk Management in OrganizationsCano M, Jeimy J. et al. | 2024
- 13
-
AI and Ethics: Embedding Good Aspects of AIBowen, Gordon / Bowen, Deidre / Bamford, Lisa et al. | 2024
- 14
-
Cyber Security-Related Awareness in Bangladesh: Relevant Challenges and StrategiesKudrat-E-Khuda et al. | 2024
- 15
-
Credit Card Fraud Detection Using Machine LearningManickam, Berlin Srojila / Jahankhani, Hamid et al. | 2024
- 16
-
The Role of Trust and Ethics in IT Administration and Its Impact on an OrganisationGeorge, Bijay Sunny / Islam, Tasmina et al. | 2024
- 17
-
How Explainable Artificial Intelligence (XAI) Models Can Be Used Within Intrusion Detection Systems (IDS) to Enhance an Analyst's Trust and UnderstandingShand, Chelsea / Fong, Rose / Butt, Usman et al. | 2024
- 18
-
Could Adam Smith Live in a Smart City?Toft, Ian / Islam, Tasmina et al. | 2024
- 19
-
An Analysis of Blockchain Adoption in Zimbabwean Mining Land Title Management (MLTM) Using NVivoKilpin, David V. / Sainidis, Eustathios / Jahankhani, Hamid / Brown, Guy et al. | 2024
- 20
-
Cybersecurity at the Core: A Study on IT Experts’ Policy AdherenceAli, Rao Faizan / Jahankhani, Hamid / Hassan, Bilal et al. | 2024
- 21
-
Metaverse Application Forensics: Unravelling the Virtual TruthHannan Bin Azhar, M. A. / Rush-Gadsby, Oliver et al. | 2024
- 22
-
Cloud-Based Secure Electronic Medical Data Sharing System Using Blockchain Technology (Simulation of a Ransomware Attack with OWASP)Ngomsi, Rodrigue / Jahankhani, Hamid et al. | 2024