19th International Conference on Cyber Warfare and Security

19th International Conference on Cyber Warfare and Security
Author :
Publisher : Academic Conferences and publishing limited
Total Pages : 634
Release :
ISBN-10 : 9781914587979
ISBN-13 : 1914587979
Rating : 4/5 (79 Downloads)

Synopsis 19th International Conference on Cyber Warfare and Security by : Prof Brett van Niekerk

These proceedings represent the work of contributors to the 19th International Conference on Cyber Warfare and Security (ICCWS 2024), hosted University of Johannesburg, South Africa on 26-27 March 2024. The Conference Chair was Dr. Jaco du Toit, University of Johannesburg, South Africa, and the Program Chair was Prof Brett van Niekerk, from Durban University of Technology. South Africa. ICCWS is a well-established event on the academic research calendar and now in its 19th year, the key aim remains the opportunity for participants to share ideas and meet the people who hold them. The scope of papers will ensure an interesting two days. The subjects covered this year illustrate the wide range of topics that fall into this important and ever-growing area of research.

Blockchain Applications in Cryptocurrency for Technological Evolution

Blockchain Applications in Cryptocurrency for Technological Evolution
Author :
Publisher : IGI Global
Total Pages : 336
Release :
ISBN-10 : 9781668462492
ISBN-13 : 1668462494
Rating : 4/5 (92 Downloads)

Synopsis Blockchain Applications in Cryptocurrency for Technological Evolution by : Taghipour, Atour

The development of information technology in supply chains has shown that this digital revolution can be a source of performance for enterprises and governments. Among these technologies is blockchain. The application of blockchains in cryptocurrency reduces information security risks and eliminates several processing and transaction fees and allows countries with volatile currencies to have a more stable currency. Blockchain Applications in Cryptocurrency for Technological Evolution features a collection of contributions related to the application of blockchain technology in cryptocurrency. It further explains the ways in which these applications have affected the industry. Covering topics such as crypto mining attacks, data processing architecture, and purchase power, this premier reference source is an excellent resource for business leaders and executives, IT managers, logistics specialists, students and faculty of higher education, librarians, researchers, and academicians.

HCI for Cybersecurity, Privacy and Trust

HCI for Cybersecurity, Privacy and Trust
Author :
Publisher : Springer Nature
Total Pages : 267
Release :
ISBN-10 : 9783031613821
ISBN-13 : 3031613821
Rating : 4/5 (21 Downloads)

Synopsis HCI for Cybersecurity, Privacy and Trust by : Abbas Moallem

ICCWS 2018 13th International Conference on Cyber Warfare and Security

ICCWS 2018 13th International Conference on Cyber Warfare and Security
Author :
Publisher : Academic Conferences and publishing limited
Total Pages : 707
Release :
ISBN-10 : 9781911218739
ISBN-13 : 1911218735
Rating : 4/5 (39 Downloads)

Synopsis ICCWS 2018 13th International Conference on Cyber Warfare and Security by : Dr. Louise Leenen

These proceedings represent the work of researchers participating in the 13th International Conference on Cyber Warfare and Security (ICCWS 2018) which is being hosted this year by the National Defense University in Washington DC, USA on 8-9 March 2018.

Cybersecurity for Decision Makers

Cybersecurity for Decision Makers
Author :
Publisher : CRC Press
Total Pages : 511
Release :
ISBN-10 : 9781000909630
ISBN-13 : 1000909638
Rating : 4/5 (30 Downloads)

Synopsis Cybersecurity for Decision Makers by : Narasimha Rao Vajjhala

This book is aimed at managerial decision makers, practitioners in any field, and the academic community. The chapter authors have integrated theory with evidence-based practice to go beyond merely explaining cybersecurity topics. To accomplish this, the editors drew upon the combined cognitive intelligence of 46 scholars from 11 countries to present the state of the art in cybersecurity. Managers and leaders at all levels in organizations around the globe will find the explanations and suggestions useful for understanding cybersecurity risks as well as formulating strategies to mitigate future problems. Employees will find the examples and caveats both interesting as well as practical for everyday activities at the workplace and in their personal lives. Cybersecurity practitioners in computer science, programming, or espionage will find the literature and statistics fascinating and more than likely a confirmation of their own findings and assumptions. Government policymakers will find the book valuable to inform their new agenda of protecting citizens and infrastructure in any country around the world. Academic scholars, professors, instructors, and students will find the theories, models, frameworks, and discussions relevant and supportive to teaching as well as research.