05012nam 22006615 450 991104771580332120251225180441.03-032-13075-110.1007/978-3-032-13075-4(MiAaPQ)EBC32433288(Au-PeEL)EBL32433288(CKB)43920025800041(DE-He213)978-3-032-13075-4(EXLCZ)994392002580004120251202d2026 u| 0engurcnu||||||||txtrdacontentcrdamediacrrdacarrierAdvancing Innovative Cybersecurity Solutions and Approaches to Protect Digital Ecosystems First IFIP TC 9, TC 11 International Conference in Cybersecurity, IFIP-UNIVEN-CSIR ICC 2025, Tshwane, South Africa, December 11–12, 2025, Proceedings /edited by Jabu Mtsweni, Modimowabarwa Kanyane, Jackie Phahlamohlaka, Willard Munyoka, Kerry-Lynn Thomson, Lynn Futcher, Joey Jansen van Vuuren1st ed. 2026.Cham :Springer Nature Switzerland :Imprint: Springer,2026.1 online resource (373 pages)IFIP Advances in Information and Communication Technology,1868-422X ;7773-032-13074-3 -- Security in Emerging & Advanced Technologies (AI/ML & Blockchain). -- Security Risks in Large Language Models and General Mitigation Strategies. -- AI-Blockchain Synergy for Next-Generation Cybersecurity Adaptive, Ethical, and Efficient Architectures. -- From Regex to Transformers: A Hybrid Framework for Cyber Threat Indicator Extraction from Unstructured Text . -- Towards facial expression analysis for enhanced threat detection in surveillance. -- Securing Agricultural Sustainability: Integrating Digital Twins and Blockchain for Smart Farming. -- Cybersecurity Governance, Policy, and National Strategies. -- African Cyber Power: Establishing a Strategic Rationale for Offensive Cyber Power Capabilities. The Case of South Africa. -- Addressing Evolving Cybersecurity Threats from Industrial Internet of Things (IIoT) Adoption Through Improved Cybersecurity Governance. -- Digital Literacy and the challenge for NIST compliance in developing countries. -- Privacy by design for GDPR Compliance Assessment. -- Cybersecurity Education, Training, and Human Factors. -- Identifying Gaps in the Evaluation of Security Education, Training and Awareness (SETA) Programs: A Systematic Literature Review. -- Teaching Cybersecurity through Practice: Approaches and Insights. -- The Influence of Cybersecurity Fatigue on Students’ Compliance with Cybersecurity Measures. -- Beyond Smoke Signals: A Conceptual Model Positioning Burnout and Quiet Quitting in Cybersecurity Professionals. -- Security Architectures, Models, and Authentication Mechanisms. -- Multidimensional Review of Cybersecurity Vulnerabilities in E-Government Systems: The Case of South Africa. -- Managing Risks and Improving Cyber Resilience – Assessing Mobile Application Security using a Reference Model. -- Enhancing Digital Wallet Security: A Systematic Comparison of Passwordless and Risk-Based Authentication Approaches. -- Diagnosability of Attack Trees.This book constitutes the proceedings of the First IFIP TC 9, TC 11 International Cybersecurity Conference, IFIP-UNIVEN-CSIR ICC 2025, held in Tshwane, South Africa, in December 2025. The 17 full papers included in the proceedings were carefully reviewed and selected from 43 submissions. They were organized in topical sections as follows: Security in Emerging and Advanced Technologies (AI/ML and Blockchain); Cybersecurity Governance, Policy, and National Strategies; Cybersecurity Education, Training, and Human Factors; Security Architectures, Models, and Authentication Mechanisms. .IFIP Advances in Information and Communication Technology,1868-422X ;777Data protectionSecurity systemsArtificial intelligenceTechnologySociological aspectsMachine learningData and Information SecuritySecurity Science and TechnologyArtificial IntelligenceEmerging TechnologiesMachine LearningData protection.Security systems.Artificial intelligence.TechnologySociological aspects.Machine learning.Data and Information Security.Security Science and Technology.Artificial Intelligence.Emerging Technologies.Machine Learning.005.8Mtsweni Jabu1870088MiAaPQMiAaPQMiAaPQBOOK9911047715803321Advancing Innovative Cybersecurity Solutions and Approaches to Protect Digital Ecosystems4478417UNINA