Fr. 117.00

Artificial Intelligence Based Smart and Secured Applications - Third International Conference, ASCIS 2024, Rajkot, India, October 16-18, 2024, Revised Selected Papers, Part VI

English · Paperback / Softback

Shipping usually within 6 to 7 weeks

Description

Read more

The six-volume set, CCIS 2424 - 2429, constitutes the refereed proceedings of the Third International Conference on Advances in Smart Computing and Information Security, ASCIS 2024, held in Rajkot, Gujarat, India, in October 16 18, 2024.
The 138 full papers and 43 short papers presented in these six volumes were carefully reviewed and selected from 667 submissions.The papers presented in these six volumes are organized in the following topical sections:
Part I, II, III, IV: Artificial Intelligence & Machine Learning
Part V: Smart Computing; Network and Cloud Computing.
Part VI: Cyber Security; Computer Application for Sustainability.

List of contents

.- Cyber Security.
.- Automation of Endpoint Security using Machine Learning.
.- Comparative Analysis of Vulnerability and Threats related to Blogging Platforms.
.- Cybersecurity Threats to Autonomous Vehicles: A Deep Learning Approach.
.- Advanced Threat Intelligence Systems for Early Warning of Cyber Hacking.
.- Reconciliation - Backdoor Access finding strategies with Legacy applications.
.- Enhancing Cyber Hacking Breach Classification through Integrated Preprocessing and feature Extraction Technique.
.- An Ensemble Method for Insider Threat Detection based On User Activities Analysis Using Bi-LSTM and GA Optimization.
.- Systemization of Knowledge: Privacy Preservation for Decentralized Non-Financial Applications.
.- Identifying Application-Level Distributed Denial-Of-Service (DDoS) Attacks With Machine Learning (ML).
.- Cybersecurity Threats and Trust Dynamics in Digital Payment Systems: An Analysis of Domestic Fraud and User Perspectives.
.- Enhanced Web Browser Forensics: Innovative Methodology for Evidence Collection and Analysis.
.- DDOS attack detection and prevention using MIEC method in SDN environment.
.- A lossless image, video and audio encryption method based hybrid chaotic map and DNA encryption.
.- Enhancing Cloud Security for Structured Data: An AES-GCM Based Format-Preserving Encryption Approach.
.- Hacktivism or Cyber Warfare? Decoding the Motivations Behind Cyber Attacks Targeting Israel.
.- Designing a Secure E-Voting System with Ganache: Challenges and Solutions.
.- Computer Application for Sustainability.
.- Consumer Usage Intention Factors for Mobile Food- Delivery Applications Using Task Technology Fit Approach.
.- Optimizing Query Execution Time in Relational Databases Using Cost-Based and Index Merge Strategies: A Case Study on E-Commerce Data.
.- Securing Sign-Up and Sign-In in the Indian Market: Fraud Prevention in CIAM for CRM - A Comprehensive Review and Future Directions.
.- MERN Stack Website For Government Officials.
.- Brain Tumor Diagnosis using Deep Learning: A Systematic Review and Meta- Analysis of MRI Image-Based Studies.
.- A STUDY ON EMPLOYEE ENGAGEMENT FACTORS OF INFORMATION & COMMUNICATION TECHNOLOGY (ICT) WORKFORCE.
.- A Simulated Manufacturing Study on Rope Size and Number of Splits on the Productivity while Applying the Simplified Drum-Buffer-Rope Methodology.
.- Effect of Technology Acceptance among Employees in the Second Half of their Working Life.
.- A Study on the Effects of Social Media Platforms on Graduate Students' Academic Achievement.
.- Enhancement of Forest Fire Assessment by KDCPMNN Approach in Sikkim, India Using Remote Sensing Images.
.- Decentralized Payment Gateway: Bridging DeFi with Metamask.
.- Impact of Social Media Marketing in the Cosmetic Industry to Cross the Chasm in India.
.- Ubiquitous Computing of Low-Cost Pollutant Sensors for Monitoring Pollutant Gases in the Construction Sector.
.- Envisioning the AI-Driven Future: A Delphi Study on the Transformative Role of Artificial Intelligence in Higher Education.
.- IoT Integration for Smart Agriculture: Prioritizing Key Factors using WASPAS Approach.
.- Transforming EHR Systems Using the HyperLedger Fabric Blockchain Framework.

Product details

Assisted by Sunil Bajeja (Editor), Divyakant Meva (Editor), Divyakant Meva et al (Editor), Pankaj Mudholkar (Editor), Kalpesh Popat (Editor), Sridaran Rajagopal (Editor)
Publisher Springer, Berlin
 
Original title (ASCIS 2024, Part V) Advancements in Smart Computing and Information Security
Languages English
Product format Paperback / Softback
Released 22.05.2025
 
EAN 9783031863042
ISBN 978-3-0-3186304-2
No. of pages 478
Illustrations LIV, 478 p. 213 illus., 141 illus. in color.
Series Communications in Computer and Information Science
Subjects Natural sciences, medicine, IT, technology > IT, data processing > IT

machine learning, Artificial Intelligence, Deep Learning, angewandte informatik, iot, Informationstechnik (IT), allgemeine Themen, Blockchain, Neural Networks, cryptography, cyber security, Computer and Information Systems Applications, Computing Milieux, Computer Application in Administrative Data Processing, computer networks, Encryption, Mitigation, systems security, Cloud Computing Security, Attacks, Image Processing Smart Computing

Customer reviews

No reviews have been written for this item yet. Write the first review and be helpful to other users when they decide on a purchase.

Write a review

Thumbs up or thumbs down? Write your own review.

For messages to CeDe.ch please use the contact form.

The input fields marked * are obligatory

By submitting this form you agree to our data privacy statement.