Fr. 255.00

Contributions Presented at The International Conference on Computing, Communication, Cybersecurity & AI, July 10-11, 2025, Birmingham, UK - The C3AI 2025

English · Paperback / Softback

Will be released 25.03.2026

Description

Read more

This book offers an in-depth exploration of cutting-edge research across the interconnected fields of computing, communication, cybersecurity, and artificial intelligence. It serves as a comprehensive guide to the technologies shaping our digital world, providing both a profound understanding of these domains and practical strategies for addressing their challenges. The content is drawn from the International Conference on Computing, Communication, Cybersecurity and AI (C3AI 2025), held in Birmingham, UK, from July 10 to 11, 2025. The conference attracted 56 submissions from 15 countries. Of these, 40 high-calibre papers were rigorously selected through a meticulous review process, where each paper received three to four reviews to ensure quality and relevance. This book is an essential resource for readers seeking a thorough and timely review of the latest advancements and trends in computing, communication, cybersecurity, and artificial intelligence.

List of contents

Part 1: Cybersecurity track 1.- When cybersecurity becomes cyberbiosecurity: Understanding cyberbiosecurity, its principles, components, importance, and challenges.- Hacking the organism through digital technology: Exploring cyberbiosecurity vulnerabilities, threats, risks and their mitigations.- Dynamic defense strategies for optical communication networks: Mitigating adversarial attacks through multi-scale diagnostics.- Ethical and security implications of generative AI in E-government: A study of data protection, model security and responsible AI.- When generative AI gets hacked: A comprehensive classification of cyberattacks on Large Language Models (LLMs) and their mitigation techniques.- Part 2: AI Track 1.- AI-based fundus screening for automated severity prediction of diabetic retinopathy.- ADR: Interpretability-guided adversarial perturbation removal for 3D point clouds via geometric completion.- An AI-enabled wearable system for tactical sign language recognition and secure data transmission.- X-Swin: A robust hierarchical vision transformer with explainable attention mechanisms for dementia severity classification from structural MRI.- Agentic AI for emergency response and comparative analysis of SmolAgents, LangGraph, AutoGen, Agno AGI and CrewAI for crisis solution.- An AI study investigating the relationship between air quality and COVID-19.- Performance evaluation of female students through SAW-based multi-criteria evaluation and unsupervised clustering.- A novel machine learning techniques for crime report classification to identify Indian penal code sections.- Comparative analysis of Federated Learning (FL), Reinforcement Learning (RL) and Evolution Strategy (ES) in gaming environments.- Part 3: Communication Track 1.- Malware detection - A comparative analysis of RISC-V and ARM architectures.- Secure and energy efficient inference optimisation for consumer GPUs in edge computing environments.- Investigation of security challenges and analysis of evaluation tools for IoT devices.- Lightweight end-to-end message-level encryption in Apache Kafka using ChaCha20 stream Cipher.- An approach towards open-source security solutions for information systems: Profiling attacker's behavior and communication patterns post-compromise.- Towards a real-time webcam feed narrator using multimodal language models and speech synthesis.- Part 4: Computing Track 1.- Gamified learning analytics: Predicting student success in blended education environments through machine learning classification models.- Maali: An intelligent gardening companion for plant care management.- How can ChatGPT help humans improve their capabilities: Understanding the key capabilities of ChatGPT.- The AI engine of creation: Exploring the capabilities of AI Chatbots based on generative AI, large language models and large multimodal models.- AI App behaviour monitor development for children with ALNS.- Justification of a set of parameters for software source code analysis.- Forecasting economic trends with generative AI: A Python framework for policy analysis.- Academic influencer for eLearning systems sponsorship and collaboration platform.- Community detection using enhanced non-weighted fuzzy C-means approach in online social network.- Part 5: Cybersecurity Track 2.- When generative AI prompts bite back: Investigating different types of prompt injection attacks on Large Language Models (LLMs) and their prevention methods.- Weaponising generative AI through data poisoning: Analysing various data poisoning attacks on Large Language Models (LLMs) and their countermeasures.- Literal Genie problem of generative AI: Understanding cyberattacks on generative AI models in the context of Large Language Models (LLMs) and their defence strategies.- Insecure output handling in Large Language Models (LLMs) and approaches to enhance output security, including prevention of LLM-based web application attacks.- Towards real-time anomaly detection and quarantine framework for cybersecurity systems.- A comprehensive threat modeling framework for SaaS-based E-commerce platforms.- A lightweight machine learning framework for DDoS attack detection in SDN.- Intelligent detection system with a machine learning extension to Suricata.- Threat landscape of adversarial attacks on generative AI and Large Language Models (LLMs): Exploring different types of adversarial attacks, associated risks, and mitigation strategies.- Uncovering advanced persistent threats via fuzzy logic-based DNS analysis.- Ransomware detection for securing hybrid learning environments in educational institutions.

Summary

This book offers an in-depth exploration of cutting-edge research across the interconnected fields of computing, communication, cybersecurity, and artificial intelligence. It serves as a comprehensive guide to the technologies shaping our digital world, providing both a profound understanding of these domains and practical strategies for addressing their challenges. The content is drawn from the International Conference on Computing, Communication, Cybersecurity and AI (C3AI 2025), held in Birmingham, UK, from July 10 to 11, 2025. The conference attracted 56 submissions from 15 countries. Of these, 40 high-calibre papers were rigorously selected through a meticulous review process, where each paper received three to four reviews to ensure quality and relevance. This book is an essential resource for readers seeking a thorough and timely review of the latest advancements and trends in computing, communication, cybersecurity, and artificial intelligence.

Product details

Assisted by Paul Grace (Editor), Paul Jenkins (Editor), Nitin Naik (Editor), Shaligram Prajapat (Editor), Shaligram Prajapat et al (Editor)
Publisher Springer International Publishing
 
Languages English
Product format Paperback / Softback
Release 25.03.2026
 
EAN 9783032167903
ISBN 978-3-032-16790-3
Illustrations Approx. 350 p.
Series Lecture Notes in Networks and Systems
Subjects Natural sciences, medicine, IT, technology > Technology > General, dictionaries

Artificial Intelligence, Communication, Cybersecurity, Computing, Artificial Intelligence (AI), Computational Intelligence, C3AI 2025

Customer reviews

No reviews have been written for this item yet. Write the first review and be helpful to other users when they decide on a purchase.

Write a review

Thumbs up or thumbs down? Write your own review.

For messages to CeDe.ch please use the contact form.

The input fields marked * are obligatory

By submitting this form you agree to our data privacy statement.