000 | 04528nam a22005775i 4500 | ||
---|---|---|---|
001 | 978-3-031-20160-8 | ||
003 | DE-He213 | ||
005 | 20240207153532.0 | ||
007 | cr nn 008mamaa | ||
008 | 230102s2023 sz | s |||| 0|eng d | ||
020 |
_a9783031201608 _9978-3-031-20160-8 |
||
050 | 4 | _aQ334-342 | |
050 | 4 | _aTA347.A78 | |
072 | 7 |
_aUYQ _2bicssc |
|
072 | 7 |
_aCOM004000 _2bisacsh |
|
072 | 7 |
_aUYQ _2thema |
|
082 | 0 | 4 |
_a006.3 _223 |
245 | 1 | 0 |
_aCybersecurity in the Age of Smart Societies _h[electronic resource] : _bProceedings of the 14th International Conference on Global Security, Safety and Sustainability, London, September 2022 / _cedited by Hamid Jahankhani. |
250 | _a1st ed. 2023. | ||
264 | 1 |
_aCham : _bSpringer International Publishing : _bImprint: Springer, _c2023. |
|
300 |
_aXI, 484 p. 123 illus., 109 illus. in color. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
490 | 1 |
_aAdvanced Sciences and Technologies for Security Applications, _x2363-9466 |
|
500 | _aAcceso multiusuario | ||
505 | 0 | _a1. Cyber Defence -- 2. Cyber Intelligence and Operation -- 3. Cyber Criminology -- 4. Ethics in Smart and AI driven societies -- 5. Information Systems Security Management -- 6. Digital Forensics investigation. | |
520 | _aThis book provides an opportunity for researchers, scientists, government officials, strategist and operators and maintainers of large, complex and advanced systems and infrastructure to update their knowledge with the state of best practice in the challenging domains whilst networking with the leading representatives, researchers and solution providers. The ongoing pandemic has created a new level of threats which presents new challenges around privacy, data protection, malicious application, unprotected networks or networks with basic protection that are being used as a gateway to larger infrastructure with complicated architecture, and unintentional misuse such as those associated with algorithmic bias. All these have increased the number of attack vectors that can be used to attack such networks. Drawing on 13 years of successful events on information security, digital forensics and cyber-crime, the 14th ICGS3-22 conference aims to provide attendees with an information-packed agenda with representatives from across the industry and the globe. The challenges of complexity, rapid pace of change and risk/opportunity issues associated with modern products, systems, special events and infrastructures. In an era of unprecedented volatile, political and economic environment across the world, computer-based systems face ever more increasing challenges, disputes and responsibilities, and whilst the Internet has created a global platform for the exchange of ideas, goods and services, it has also created boundless opportunities for cyber-crime. This volume presents new materials and contribute to knowledge through the technological advances that are being made across artificial intelligence (AI), machine learning, blockchain and quantum computing. These technologies driven by a digital revolution are expected to be disruptive and provide major digital transformation in the way societies operate today. As result, although these advances provide social and economic benefits, but, also, provide new challenges that security industry need to raise their game to combat them. | ||
541 |
_fUABC ; _cPerpetuidad |
||
650 | 0 | _aArtificial intelligence. | |
650 | 0 | _aComputer crimes. | |
650 | 0 | _aSecurity systems. | |
650 | 1 | 4 | _aArtificial Intelligence. |
650 | 2 | 4 | _aCybercrime. |
650 | 2 | 4 | _aSecurity Science and Technology. |
700 | 1 |
_aJahankhani, Hamid. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt |
|
710 | 2 | _aSpringerLink (Online service) | |
773 | 0 | _tSpringer Nature eBook | |
776 | 0 | 8 |
_iPrinted edition: _z9783031201592 |
776 | 0 | 8 |
_iPrinted edition: _z9783031201615 |
776 | 0 | 8 |
_iPrinted edition: _z9783031201622 |
830 | 0 |
_aAdvanced Sciences and Technologies for Security Applications, _x2363-9466 |
|
856 | 4 | 0 |
_zLibro electrónico _uhttp://libcon.rec.uabc.mx:2048/login?url=https://doi.org/10.1007/978-3-031-20160-8 |
912 | _aZDB-2-SCS | ||
912 | _aZDB-2-SXCS | ||
942 | _cLIBRO_ELEC | ||
999 |
_c261143 _d261142 |