Cybersecurity Challenges in the Age of AI, Space Communications and Cyborgs : Proceedings of the 15th International Conference on Global Security, Safety and Sustainability, London, October 2023 — 1st ed. 2024. (English)
- New search for: Jahankhani, Hamid
2024
-
ISBN:
- Book / Electronic Resource
-
Title:Cybersecurity Challenges in the Age of AI, Space Communications and Cyborgs : Proceedings of the 15th International Conference on Global Security, Safety and Sustainability, London, October 2023
-
Contributors:Jahankhani, Hamid ( editor )
-
Published in:
-
Edition:1st ed. 2024.
-
Publisher:
- New search for: Springer Nature Switzerland
-
Place of publication:Cham
-
Publication date:2024
-
Size:1 Online-Ressource(XI, 431 p. 143 illus., 116 illus. in color.)
-
Remarks:Campusweiter Zugriff (Universität Hannover) - Vervielfältigungen (z.B. Kopien, Downloads) sind nur von einzelnen Kapiteln oder Seiten und nur zum eigenen wissenschaftlichen Gebrauch erlaubt. Keine Weitergabe an Dritte. Kein systematisches Downloaden durch Robots.
-
ISBN:
-
DOI:
-
Type of media:Book
-
Type of material:Electronic Resource
-
Language:English
- New search for: 006.3
- Further information on Dewey Decimal Classification
-
Keywords:
-
Classification:
DDC: 006.3 -
Source:
Table of contents eBook
The tables of contents are generated automatically and are based on the data records of the individual contributions available in the index of the TIB portal. The display of the Tables of Contents may therefore be incomplete.
- 1
-
Strengthening Security Mechanisms of Satellites and UAVs Against Possible Attacks from Quantum ComputersHussien, Osama A. A. M. / Arachchige, Isuru S. W. / Jahankhani, Hamid et al. | 2024
- 2
-
Evaluating the Security of Open-Source Linux Operating Systems for Unmanned Aerial VehiclesPatil, Darshan / Pournouri, Sina et al. | 2024
- 3
-
A Proposed Permissioned Blockchain Consensus Algorithm: Consensus Algorithm Genetically Enhanced (CAGE)Mitchell, Ian / Maka, Kamil et al. | 2024
- 4
-
Data Hiding in Anti-forensics—Exploit Delivery Through Digital SteganographyGashi, Hans / Zargari, Shahrzad / Jalali Ghazaani, Setareh et al. | 2024
- 5
-
Impact Versus Frequency on Cybersecurity Breach Trends in the Business and Medical Industry to Identify Human ErrorKahanda, Galathara / Rider, Sasha / Mukhopadhyay, Sayantini et al. | 2024
- 6
-
Identifying Daesh-Related Propaganda Using OSINT and Clustering AnalysisMe, Gianluigi / Mucci, Maria Felicita et al. | 2024
- 7
-
Cyberbullying Detection in Twitter Using Deep Learning Model TechniquesSeetharaman, Anu Ranjana / Jahankhani, Hamid et al. | 2024
- 8
-
A Signcryption Approach to Address Security and Privacy Issues in Online Gaming PlatformsUnal, Mahmut Ahmet / Islam, Tasmina et al. | 2024
- 9
-
ChildSecurity: A Web-Based Game to Raise Awareness of Cybersecurity and Privacy in ChildrenZou, Yang / Islam, Tasmina et al. | 2024
- 10
-
Subverting Biometric Security Using 3D Printed Biometrics CharacteristicsTait, Bobby L. et al. | 2024
- 11
-
Image Band-Distributive PCA Based Face Recognition TechniqueNdu, Henry / Sheikh-Akbari, Akbar / Mporas, Iosif / Deng, Jiamei et al. | 2024
- 12
-
RAFA Model. Rethinking Cyber Risk Management in OrganizationsCano M, Jeimy J. et al. | 2024
- 13
-
AI and Ethics: Embedding Good Aspects of AIBowen, Gordon / Bowen, Deidre / Bamford, Lisa et al. | 2024
- 14
-
Cyber Security-Related Awareness in Bangladesh: Relevant Challenges and StrategiesKudrat-E-Khuda et al. | 2024
- 15
-
Credit Card Fraud Detection Using Machine LearningManickam, Berlin Srojila / Jahankhani, Hamid et al. | 2024
- 16
-
The Role of Trust and Ethics in IT Administration and Its Impact on an OrganisationGeorge, Bijay Sunny / Islam, Tasmina et al. | 2024
- 17
-
How Explainable Artificial Intelligence (XAI) Models Can Be Used Within Intrusion Detection Systems (IDS) to Enhance an Analyst's Trust and UnderstandingShand, Chelsea / Fong, Rose / Butt, Usman et al. | 2024
- 18
-
Could Adam Smith Live in a Smart City?Toft, Ian / Islam, Tasmina et al. | 2024
- 19
-
An Analysis of Blockchain Adoption in Zimbabwean Mining Land Title Management (MLTM) Using NVivoKilpin, David V. / Sainidis, Eustathios / Jahankhani, Hamid / Brown, Guy et al. | 2024
- 20
-
Cybersecurity at the Core: A Study on IT Experts’ Policy AdherenceAli, Rao Faizan / Jahankhani, Hamid / Hassan, Bilal et al. | 2024
- 21
-
Metaverse Application Forensics: Unravelling the Virtual TruthHannan Bin Azhar, M. A. / Rush-Gadsby, Oliver et al. | 2024
- 22
-
Cloud-Based Secure Electronic Medical Data Sharing System Using Blockchain Technology (Simulation of a Ransomware Attack with OWASP)Ngomsi, Rodrigue / Jahankhani, Hamid et al. | 2024