Fr. 207.00

AISMA-2025: International Workshop on Advanced Information Security Management and Applications

English · Paperback / Softback

Shipping usually within 6 to 7 weeks

Description

Read more

This book is based on the best papers accepted for presentation during the AISMA-2025: International Workshop on Advanced in Information Security Management and Applications.
This book includes research on information security problems and solutions in the field of security awareness, blockchain and cryptography, data analysis, authentication and key distribution, security incidents. The scope of research methods in information security management presents original research, including mathematical models and software implementations, related to the following topics: describing security incidents, blockchain technology, machine learning-based approaches in wireless sensor networks, phishing attack response scenarios, biometric authentication, information security audit procedures, depersonalization process.
In addition, some papers focus on dynamics risks infrastructural genesis at critical information infrastructure facilities. Finally, this book gives insights into some problems in forecasting the development of information security events. This book intends for readership specializing in the field of information security management and applications, information security methods and features.

Summary

This book is based on the best papers accepted for presentation during the AISMA-2025: International Workshop on Advanced in Information Security Management and Applications.
This book includes research on information security problems and solutions in the field of security awareness, blockchain and cryptography, data analysis, authentication and key distribution, security incidents. The scope of research methods in information security management presents original research, including mathematical models and software implementations, related to the following topics: describing security incidents, blockchain technology, machine learning-based approaches in wireless sensor networks, phishing attack response scenarios, biometric authentication, information security audit procedures, depersonalization process.
In addition, some papers focus on dynamics risks infrastructural genesis at critical information infrastructure facilities. Finally, this book gives insights into some problems in forecasting the development of information security events. This book intends for readership specializing in the field of information security management and applications, information security methods and features.

Customer reviews

No reviews have been written for this item yet. Write the first review and be helpful to other users when they decide on a purchase.

Write a review

Thumbs up or thumbs down? Write your own review.

For messages to CeDe.ch please use the contact form.

The input fields marked * are obligatory

By submitting this form you agree to our data privacy statement.