LEADER 05012nam 22006615 450 001 9911047715803321 005 20251225180441.0 010 $a3-032-13075-1 024 7 $a10.1007/978-3-032-13075-4 035 $a(MiAaPQ)EBC32433288 035 $a(Au-PeEL)EBL32433288 035 $a(CKB)43920025800041 035 $a(DE-He213)978-3-032-13075-4 035 $a(EXLCZ)9943920025800041 100 $a20251202d2026 u| 0 101 0 $aeng 135 $aurcnu|||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aAdvancing Innovative Cybersecurity Solutions and Approaches to Protect Digital Ecosystems $eFirst IFIP TC 9, TC 11 International Conference in Cybersecurity, IFIP-UNIVEN-CSIR ICC 2025, Tshwane, South Africa, December 11?12, 2025, Proceedings /$fedited by Jabu Mtsweni, Modimowabarwa Kanyane, Jackie Phahlamohlaka, Willard Munyoka, Kerry-Lynn Thomson, Lynn Futcher, Joey Jansen van Vuuren 205 $a1st ed. 2026. 210 1$aCham :$cSpringer Nature Switzerland :$cImprint: Springer,$d2026. 215 $a1 online resource (373 pages) 225 1 $aIFIP Advances in Information and Communication Technology,$x1868-422X ;$v777 311 08$a3-032-13074-3 327 $a -- Security in Emerging & Advanced Technologies (AI/ML & Blockchain). -- Security Risks in Large Language Models and General Mitigation Strategies. -- AI-Blockchain Synergy for Next-Generation Cybersecurity Adaptive, Ethical, and Efficient Architectures. -- From Regex to Transformers: A Hybrid Framework for Cyber Threat Indicator Extraction from Unstructured Text . -- Towards facial expression analysis for enhanced threat detection in surveillance. -- Securing Agricultural Sustainability: Integrating Digital Twins and Blockchain for Smart Farming. -- Cybersecurity Governance, Policy, and National Strategies. -- African Cyber Power: Establishing a Strategic Rationale for Offensive Cyber Power Capabilities. The Case of South Africa. -- Addressing Evolving Cybersecurity Threats from Industrial Internet of Things (IIoT) Adoption Through Improved Cybersecurity Governance. -- Digital Literacy and the challenge for NIST compliance in developing countries. -- Privacy by design for GDPR Compliance Assessment. -- Cybersecurity Education, Training, and Human Factors. -- Identifying Gaps in the Evaluation of Security Education, Training and Awareness (SETA) Programs: A Systematic Literature Review. -- Teaching Cybersecurity through Practice: Approaches and Insights. -- The Influence of Cybersecurity Fatigue on Students? Compliance with Cybersecurity Measures. -- Beyond Smoke Signals: A Conceptual Model Positioning Burnout and Quiet Quitting in Cybersecurity Professionals. -- Security Architectures, Models, and Authentication Mechanisms. -- Multidimensional Review of Cybersecurity Vulnerabilities in E-Government Systems: The Case of South Africa. -- Managing Risks and Improving Cyber Resilience ? Assessing Mobile Application Security using a Reference Model. -- Enhancing Digital Wallet Security: A Systematic Comparison of Passwordless and Risk-Based Authentication Approaches. -- Diagnosability of Attack Trees. 330 $aThis book constitutes the proceedings of the First IFIP TC 9, TC 11 International Cybersecurity Conference, IFIP-UNIVEN-CSIR ICC 2025, held in Tshwane, South Africa, in December 2025. The 17 full papers included in the proceedings were carefully reviewed and selected from 43 submissions. They were organized in topical sections as follows: Security in Emerging and Advanced Technologies (AI/ML and Blockchain); Cybersecurity Governance, Policy, and National Strategies; Cybersecurity Education, Training, and Human Factors; Security Architectures, Models, and Authentication Mechanisms. . 410 0$aIFIP Advances in Information and Communication Technology,$x1868-422X ;$v777 606 $aData protection 606 $aSecurity systems 606 $aArtificial intelligence 606 $aTechnology$xSociological aspects 606 $aMachine learning 606 $aData and Information Security 606 $aSecurity Science and Technology 606 $aArtificial Intelligence 606 $aEmerging Technologies 606 $aMachine Learning 615 0$aData protection. 615 0$aSecurity systems. 615 0$aArtificial intelligence. 615 0$aTechnology$xSociological aspects. 615 0$aMachine learning. 615 14$aData and Information Security. 615 24$aSecurity Science and Technology. 615 24$aArtificial Intelligence. 615 24$aEmerging Technologies. 615 24$aMachine Learning. 676 $a005.8 700 $aMtsweni$b Jabu$01870088 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9911047715803321 996 $aAdvancing Innovative Cybersecurity Solutions and Approaches to Protect Digital Ecosystems$94478417 997 $aUNINA