This book presents the 16th ICGS3-24 conference which aims to understand the full impact of cyber-security, AI, deepfake, and quantum computing on humanity. Over the last two decades, technology relating to cyber-space (satellites, drones, UAVs), cyber-security, artificial intelligence, and generative AI has evolved rapidly. Today, criminals have identified rewards from online frauds; therefore, the risks and threats of cyber-attacks have increased too. Detection of the threat is another strand to the strategy and will require dynamic risk management techniques, strong and up-to-date information governance standards, and frameworks with AI responsive approaches in order to successfully monitor and coordinate efforts between the parties. Thus, the ability to minimize the threats from cyber is an important requirement. This will be a mission-critical aspect of the strategy with development of the right cyber-security skills, knowledge, and culture that are imperative for the implementation of the cyber-strategies. As a result, the requirement for how AI Demand will influence business change and thus influence organizations and governments is becoming important. In an era of unprecedented volatile, political, and economic environment across the world, computer-based systems face ever more increasing challenges, disputes, and responsibilities while the Internet has created a global platform for the exchange of ideas, goods, and services; however, it has also created boundless opportunities for cyber-crime. The ethical and legal implications of connecting the physical and digital worlds and presenting the reality of a truly interconnected society present the realization of the concept of smart societies. Drawing on 15 years of successful events, the 16th ICGS3-24 conference aims to provide attendees with an information-packed agenda with representatives from across the industry and the globe. This Annual International Conference is an established platform in which security, safety, and sustainability issues can be examined from several global perspectives through dialogue between academics, students, government representatives, chief executives, security professionals, and research scientists from the UK and from around the globe.
Les mer
Critical Space Infrastructure and Cybersecurity Challenges in Outer Space: A Review of India’s Space Security.- Outsourcing in NATO Cyberspace: a Warfighting Imperative.- Near Space instability. Geopolitical tensions, debris crisis, and cyberattacks.- Quantum e-voting system using QKD and enhanced quantum oracles.- AI makes political views more acceptable: Right or wrong.- Unlocking Effective Information Sharing Agreements in English Local Authorities.- AI-Driven Phishing: Techniques, Threats, and Defence Strategies.- Designing a Decentralized Ecosystem for 6G Smart Cities.- Exploring machine learning approaches for botnet detection in IoT Networks: A review.- Development of Cloud Apps security methods to comply with GDPR / HIPAA.- Differentially Private Spiking Neural Networks: Enhancing Privacy and Robustness in Social Robotics.- Image-Based Android Malware Detection Using Deep Learning.- The Threat Landscape of Connected Vehicles.- Programming Privacy - A Short Observational Study of Homomorphic Encryption Compilers for Bioinformatics Applications.- Making the Human the Strongest Link in an Integrated Cyber Physical Systems (CPS) Operational Stack Concept for Combined Security, Sustainability, Assurance, and Safety (S2AS).- Enhancing Cyberbullying Detection with RoBERTa: A Transformer-Based Approach.- Rethinking the human factor in information security. From an information-centric perspective to one based on organizational culture.- AI-Driven Risk Assessments: Advancing Cybersecurity and Sustainability.- Power of Social Media Meta Data: Enhancing Cyberbullying Detection.- Cybercrime as a Threat to the Commercial Banking Sectors in Bangladesh: A Critical Analysis.- Comprehensive Analysis of MSpy within covert operations.- Automated Penetration Testing using Generative Artificial.- Zero Trust Blockchain-based Digital Twin 6G AI-native Conceptual Framework Against Cyber Attacks for e-Healthcare.- A multimodal approach to biometric authentication.- The Role of EdTechs in The Commodification of Knowledge.- Preserving User Autonomy in Smart Home Data Collection: Solutions and Ethical Responsibilities.- Building a Human-Centric SOC: A New Framework for Success.- Comparative Analysis of Heart Rate (HR) and Heart Rate Variability (HRV) Signals for User Authentication Using a Machine Learning Approach.- Theoretical Insights into Leveraging Machine Learning for Dynamic Cyber Risk Assessment and Enhancing Cyber Situational Awareness in SMEs.- Safe Cyber Watch: Cyber Bully Alert & Parental Advisory System.
Les mer
This book presents the 16th ICGS3-24 conference which aims to understand the full impact of cyber-security, AI, deepfake, and quantum computing on humanity. Over the last two decades, technology relating to cyber-space (satellites, drones, UAVs), cyber-security, artificial intelligence, and generative AI has evolved rapidly. Today, criminals have identified rewards from online frauds; therefore, the risks and threats of cyber-attacks have increased too. Detection of the threat is another strand to the strategy and will require dynamic risk management techniques, strong and up-to-date information governance standards, and frameworks with AI responsive approaches in order to successfully monitor and coordinate efforts between the parties. Thus, the ability to minimize the threats from cyber is an important requirement. This will be a mission-critical aspect of the strategy with development of the right cyber-security skills, knowledge, and culture that are imperative for the implementation of the cyber-strategies. As a result, the requirement for how AI Demand will influence business change and thus influence organizations and governments is becoming important. In an era of unprecedented volatile, political, and economic environment across the world, computer-based systems face ever more increasing challenges, disputes, and responsibilities while the Internet has created a global platform for the exchange of ideas, goods, and services; however, it has also created boundless opportunities for cyber-crime. The ethical and legal implications of connecting the physical and digital worlds and presenting the reality of a truly interconnected society present the realization of the concept of smart societies. Drawing on 15 years of successful events, the 16th ICGS3-24 conference aims to provide attendees with an information-packed agenda with representatives from across the industry and the globe. This Annual International Conference is an established platform in which security, safety, and sustainability issues can be examined from several global perspectives through dialogue between academics, students, government representatives, chief executives, security professionals, and research scientists from the UK and from around the globe.
Les mer
Aims to understand the full impact of cyber security, AI, deepfake and quantum computing on humanity Focuses on 21st-century complexity, rapid change, and risk/opportunity issues in lifestyle, systems, and infrastructure Examines security, safety, and sustainbaiblity issues from several global perspectives
Les mer
GPSR Compliance The European Union's (EU) General Product Safety Regulation (GPSR) is a set of rules that requires consumer products to be safe and our obligations to ensure this. If you have any concerns about our products you can contact us on ProductSafety@springernature.com. In case Publisher is established outside the EU, the EU authorized representative is: Springer Nature Customer Service Center GmbH Europaplatz 3 69115 Heidelberg, Germany ProductSafety@springernature.com
Les mer

Produktdetaljer

ISBN
9783031820304
Publisert
2025-04-18
Utgiver
Vendor
Springer International Publishing AG
Høyde
235 mm
Bredde
155 mm
Aldersnivå
Research, P, UP, 06, 05
Språk
Product language
Engelsk
Format
Product format
Innbundet

Biographical note

Hamid Jahankhani’s principal research area for a number of years has been in the field of cybersecurity, information security and digital forensics. In partnership with the key industrial sectors, he has examined and established several innovative research projects that are of direct relevance to the needs of UK and European information security, digital forensics industries, Critical National Infrastructure and law enforcement agencies.

Professor Jahankhani is Editor-in-Chief of the International Journal of Electronic Security and Digital Forensics, International Journal of Electronic democracy, both published by Inderscience, and General Chair of the annual International Conference on Global Security, Safety and Sustainability (ICGS3). Hamid has edited and contributed to over 20 books and has over 150 conference and journal publications together with various BBC radio interviews. Hamid has supervised to completion of 13 Ph.D. and professional doctorate degree students and overseen 67 Ph.D. students progressing. In summer 2017, Hamid was trained as GCHQ “cyberist” to train the next generation of cybersecurity experts through GCHQ CyberFirst initiative. Recently, Hamid trained over 100 frontline police officers in three of the largest London Boroughs.

Dr Biju Issac is an Associate Professor and Head of Subject (Networks and Cyber Security) at Northumbria University, Newcastle upon Tyne, UK. He is the Director of the Academic Centre of Excellence in Cyber Security Research (ACE-CSR). The NCSC and the Engineering and Physical Sciences Research Council (EPSRC) jointly recognise ACE-CSR. He has done PhD in Networking and Mobile Communication, having finished Bachelor of Engineering (BE) in Electronics and Communication Engineering and Master of Computer Applications (MCA). He is a Chartered Engineer (CEng), Senior IEEE member, Senior Fellow of HEA and EPSRC Associate Peer Review College member. He is the Editor in Chief (EiC) of the International Journal of Information and Computer Security. His research interests are Cyber Security, Networks, Data Security, Applied AI/Machine learning (Text and Image), Hate Speech/Fake News detection, Robotics and Automation and Technology in Education. He has authored more than 100 peer-reviewed research papers, and some in prominent journals and conferences. He has worked in funded research projects for Lockheed Martin Space, UK Defence and Security (through Alan Turing Institute) and others.