This book highlights advances in Cyber Security, Cyber Situational Awareness (Cyber SA), Artificial Intelligence (AI) and Social Media. It brings together original discussions, ideas, concepts and outcomes from research and innovation from multidisciplinary experts. It offers topical, timely and emerging original innovations and research results in cyber situational awareness, security analytics, cyber physical systems, blockchain technologies, machine learning, social media and wearables, protection of online digital service, cyber incident response, containment, control, and countermeasures (CIRC3). The theme of Cyber Science 2022 is Ethical and Responsible use of AI. Includes original contributions advancing research in Artificial Intelligence, Machine Learning, Blockchain, Cyber Security, Social Media, Cyber Incident Response & Cyber Insurance.
Chapters “Municipal Cybersecurity—A Neglected Research Area? A Survey of Current Research’, ‘The Transnational Dimensionof Cybersecurity: The NIS Directive and its Jurisdictional Challenges’ and ‘Refining the Mandatory Cybersecurity Incident Reporting under the NIS Directive 2.0: Event Types and Reporting Processes” are available open access under a Creative Commons Attribution 4.0 International License via link.springer.com.
Tabella dei contenuti
Practical Cyber Threat Intelligence in the UK Energy Sector.- A Free and Community-driven Critical Infrastructure Ransomware Dataset.- Criteria for Realistic and Expedient Scenarios for Tabletop Exercises on Cyber Attacks Against Industrial Control Systems in the Petroleum Industry.- Exploring the Need for a CERT for the Norwegian Construction Sector.- Holistic Approach of Integrated Navigation Equipment for Cybersecurity at Sea.
Circa l’autore
Authors and Co-authors to the Cyber Science conference are experts, academic, researchers and practitioners in cyber security, situational awareness, cyber threat intelligence, blockchain, machine learning, artificial intelligence, and social media.
Authors and co-authors who contributed to this book are listed in the table of content of the book.