Fr. 206.00

AISMA-2025: International Workshop on Advanced Information Security Management and Applications

Englisch, Deutsch · Taschenbuch

Erscheint am 05.11.2025

Beschreibung

Mehr lesen

This book is based on the best papers accepted for presentation during the AISMA-2025: International Workshop on Advanced in Information Security Management and Applications.
This book includes research on information security problems and solutions in the field of security awareness, blockchain and cryptography, data analysis, authentication and key distribution, security incidents. The scope of research methods in information security management presents original research, including mathematical models and software implementations, related to the following topics: describing security incidents, blockchain technology, machine learning-based approaches in wireless sensor networks, phishing attack response scenarios, biometric authentication, information security audit procedures, depersonalization process.
In addition, some papers focus on dynamics risks infrastructural genesis at critical information infrastructure facilities. Finally, this book gives insights into some problems in forecasting the development of information security events. This book intends for readership specializing in the field of information security management and applications, information security methods and features.

Zusammenfassung

This book is based on the best papers accepted for presentation during the AISMA-2025: International Workshop on Advanced in Information Security Management and Applications.
This book includes research on information security problems and solutions in the field of security awareness, blockchain and cryptography, data analysis, authentication and key distribution, security incidents. The scope of research methods in information security management presents original research, including mathematical models and software implementations, related to the following topics: describing security incidents, blockchain technology, machine learning-based approaches in wireless sensor networks, phishing attack response scenarios, biometric authentication, information security audit procedures, depersonalization process.
In addition, some papers focus on dynamics risks infrastructural genesis at critical information infrastructure facilities. Finally, this book gives insights into some problems in forecasting the development of information security events. This book intends for readership specializing in the field of information security management and applications, information security methods and features.

Kundenrezensionen

Zu diesem Artikel wurden noch keine Rezensionen verfasst. Schreibe die erste Bewertung und sei anderen Benutzern bei der Kaufentscheidung behilflich.

Schreibe eine Rezension

Top oder Flop? Schreibe deine eigene Rezension.

Für Mitteilungen an CeDe.ch kannst du das Kontaktformular benutzen.

Die mit * markierten Eingabefelder müssen zwingend ausgefüllt werden.

Mit dem Absenden dieses Formulars erklärst du dich mit unseren Datenschutzbestimmungen einverstanden.