001453714 000__ 04592cam\a2200565\i\4500 001453714 001__ 1453714 001453714 003__ OCoLC 001453714 005__ 20230314003441.0 001453714 006__ m\\\\\o\\d\\\\\\\\ 001453714 007__ cr\cn\nnnunnun 001453714 008__ 230112s2023\\\\sz\a\\\\o\\\\\000\0\eng\d 001453714 020__ $$a9783031201608$$q(electronic bk.) 001453714 020__ $$a3031201604$$q(electronic bk.) 001453714 020__ $$z9783031201592 001453714 020__ $$z3031201590 001453714 0247_ $$a10.1007/978-3-031-20160-8$$2doi 001453714 035__ $$aSP(OCoLC)1356877200 001453714 040__ $$aYDX$$beng$$erda$$epn$$cYDX$$dGW5XE$$dUKAHL 001453714 049__ $$aISEA 001453714 050_4 $$aQA76.9.A25 001453714 08204 $$a005.8$$223/eng/20230112 001453714 1112_ $$aICGS3 (Conference)$$n(14th :$$d2022 :$$cLondon, England). 001453714 24510 $$aCybersecurity in the age of smart societies :$$bproceedings of the 14th International Conference on Global Security, Safety and Sustainability, London, September 2022 /$$cHamid Jahankhani, editor. 001453714 264_1 $$aCham :$$bSpringer,$$c[2023] 001453714 264_4 $$c©2023 001453714 300__ $$a1 online resource (xi, 484 pages) :$$billustrations (chiefly color). 001453714 336__ $$atext$$btxt$$2rdacontent 001453714 337__ $$acomputer$$bc$$2rdamedia 001453714 338__ $$aonline resource$$bcr$$2rdacarrier 001453714 4901_ $$aAdvanced sciences and technologies for security applications,$$x2363-9466 001453714 500__ $$aInternational conference proceedings. 001453714 5050_ $$a1. Cyber Defence -- 2. Cyber Intelligence and Operation -- 3. Cyber Criminology -- 4. Ethics in Smart and AI driven societies -- 5. Information Systems Security Management -- 6. Digital Forensics investigation. 001453714 506__ $$aAccess limited to authorized users. 001453714 520__ $$aThis book provides an opportunity for researchers, scientists, government officials, strategist and operators and maintainers of large, complex and advanced systems and infrastructure to update their knowledge with the state of best practice in the challenging domains whilst networking with the leading representatives, researchers and solution providers. The ongoing pandemic has created a new level of threats which presents new challenges around privacy, data protection, malicious application, unprotected networks or networks with basic protection that are being used as a gateway to larger infrastructure with complicated architecture, and unintentional misuse such as those associated with algorithmic bias. All these have increased the number of attack vectors that can be used to attack such networks. Drawing on 13 years of successful events on information security, digital forensics and cyber-crime, the 14th ICGS3-22 conference aims to provide attendees with an information-packed agenda with representatives from across the industry and the globe. The challenges of complexity, rapid pace of change and risk/opportunity issues associated with modern products, systems, special events and infrastructures. In an era of unprecedented volatile, political and economic environment across the world, computer-based systems face ever more increasing challenges, disputes and responsibilities, and whilst the Internet has created a global platform for the exchange of ideas, goods and services, it has also created boundless opportunities for cyber-crime. This volume presents new materials and contribute to knowledge through the technological advances that are being made across artificial intelligence (AI), machine learning, blockchain and quantum computing. These technologies driven by a digital revolution are expected to be disruptive and provide major digital transformation in the way societies operate today. As result, although these advances provide social and economic benefits, but, also, provide new challenges that security industry need to raise their game to combat them. 001453714 588__ $$aOnline resource; title from PDF title page (SpringerLink, viewed January 12, 2023). 001453714 650_0 $$aComputer security$$vCongresses. 001453714 650_0 $$aData protection$$vCongresses. 001453714 650_0 $$aComputer networks$$xSecurity measures$$vCongresses. 001453714 650_0 $$aInternet$$xSecurity measures$$vCongresses. 001453714 655_7 $$aConference papers and proceedings.$$2lcgft 001453714 655_0 $$aElectronic books. 001453714 7001_ $$aJahankhani, Hamid,$$eeditor.$$1https://isni.org/isni/0000000046432731 001453714 77608 $$iPrint version: $$z3031201590$$z9783031201592$$w(OCoLC)1346536611 001453714 830_0 $$aAdvanced sciences and technologies for security applications.$$x2363-9466 001453714 852__ $$bebk 001453714 85640 $$3Springer Nature$$uhttps://univsouthin.idm.oclc.org/login?url=https://link.springer.com/10.1007/978-3-031-20160-8$$zOnline Access$$91397441.1 001453714 909CO $$ooai:library.usi.edu:1453714$$pGLOBAL_SET 001453714 980__ $$aBIB 001453714 980__ $$aEBOOK 001453714 982__ $$aEbook 001453714 983__ $$aOnline 001453714 994__ $$a92$$bISE