Read more
This book presents the 16th ICGS3-24 conference which aims to understand the full impact of cyber-security, AI, deepfake, and quantum computing on humanity. Over the last two decades, technology relating to cyber-space (satellites, drones, UAVs), cyber-security, artificial intelligence, and generative AI has evolved rapidly. Today, criminals have identified rewards from online frauds; therefore, the risks and threats of cyber-attacks have increased too.
Detection of the threat is another strand to the strategy and will require dynamic risk management techniques, strong and up-to-date information governance standards, and frameworks with AI responsive approaches in order to successfully monitor and coordinate efforts between the parties.
Thus, the ability to minimize the threats from cyber is an important requirement. This will be a mission-critical aspect of the strategy with development of the right cyber-security skills, knowledge, and culture that are imperative for the implementation of the cyber-strategies. As a result, the requirement for how AI Demand will influence business change and thus influence organizations and governments is becoming important.
In an era of unprecedented volatile, political, and economic environment across the world, computer-based systems face ever more increasing challenges, disputes, and responsibilities while the Internet has created a global platform for the exchange of ideas, goods, and services; however, it has also created boundless opportunities for cyber-crime.
The ethical and legal implications of connecting the physical and digital worlds and presenting the reality of a truly interconnected society present the realization of the concept of smart societies.
Drawing on 15 years of successful events, the 16th ICGS3-24 conference aims to provide attendees with an information-packed agenda with representatives from across the industry and the globe. This Annual International Conference is an established platform in which security, safety, and sustainability issues can be examined from several global perspectives through dialogue between academics, students, government representatives, chief executives, security professionals, and research scientists from the UK and from around the globe.
List of contents
Critical Space Infrastructure and Cybersecurity Challenges in Outer Space: A Review of India s Space Security.- Outsourcing in NATO Cyberspace: a Warfighting Imperative.- Near Space instability. Geopolitical tensions, debris crisis, and cyberattacks.- Quantum e-voting system using QKD and enhanced quantum oracles.- AI makes political views more acceptable: Right or wrong.- Unlocking Effective Information Sharing Agreements in English Local Authorities.- AI-Driven Phishing: Techniques, Threats, and Defence Strategies.- Designing a Decentralized Ecosystem for 6G Smart Cities.- Exploring machine learning approaches for botnet detection in IoT Networks: A review.- Development of Cloud Apps security methods to comply with GDPR / HIPAA.- Differentially Private Spiking Neural Networks: Enhancing Privacy and Robustness in Social Robotics.- Image-Based Android Malware Detection Using Deep Learning.- The Threat Landscape of Connected Vehicles.- Programming Privacy - A Short Observational Study of Homomorphic Encryption Compilers for Bioinformatics Applications.- Making the Human the Strongest Link in an Integrated Cyber Physical Systems (CPS) Operational Stack Concept for Combined Security, Sustainability, Assurance, and Safety (S2AS).- Enhancing Cyberbullying Detection with RoBERTa: A Transformer-Based Approach.- Rethinking the human factor in information security. From an information-centric perspective to one based on organizational culture.- AI-Driven Risk Assessments: Advancing Cybersecurity and Sustainability.- Power of Social Media Meta Data: Enhancing Cyberbullying Detection.- Cybercrime as a Threat to the Commercial Banking Sectors in Bangladesh: A Critical Analysis.- Comprehensive Analysis of MSpy within covert operations.- Automated Penetration Testing using Generative Artificial.- Zero Trust Blockchain-based Digital Twin 6G AI-native Conceptual Framework Against Cyber Attacks for e-Healthcare.- A multimodal approach to biometric authentication.- The Role of EdTechs in The Commodification of Knowledge.- Preserving User Autonomy in Smart Home Data Collection: Solutions and Ethical Responsibilities.- Building a Human-Centric SOC: A New Framework for Success.- Comparative Analysis of Heart Rate (HR) and Heart Rate Variability (HRV) Signals for User Authentication Using a Machine Learning Approach.- Theoretical Insights into Leveraging Machine Learning for Dynamic Cyber Risk Assessment and Enhancing Cyber Situational Awareness in SMEs.- Safe Cyber Watch: Cyber Bully Alert & Parental Advisory System.