Fr. 124.00

Cybersecurity and Artificial Intelligence Strategies - Second International Conference, CAIS 2025, Baghdad, Iraq, September 17-18, 2025, Proceedings

Inglese · Tascabile

Spedizione di solito entro 6 a 7 settimane

Descrizione

Ulteriori informazioni

This book constitutes the post-conference proceedings of the Second International Conference on Cybersecurity and Artificial Intelligence Strategies, CAIS 2025 held in Baghdad, Iraq during September 17-18, 2025.
The 23 full papers included in this book were carefully reviewed and selected from 101 submissions. The papers are organized in these topical sections: Security and Privacy; Applied Computing and Computing Methodologies.

Sommario

.- Security and Privacy.
.- An Improved DBSCAN Clustering Algorithm for Bot Detection on Twitter.
.- Anomaly Detection in Blockchain Transactions Using Supervised Machine Learning.
.- Artificial Intelligence Strategies for Advancing Cybersecurity and Intrusion Detection Systems (IDs).
.- BERT-Enhanced Dual-Attention RNN for Short Text Spam Detection.
.- Effective Knowledge Graph Representation for Cybersecurity Using AI-Based X Data and Named Entity Relation Technique .
.- Enhancement of Cybersecurity in AI Services Using Hybrid Homomorphic Encryption.
.- Innovative Neural Network Architecture for Progressive Windows Malware Detection via Adaptive Feature Fusion and Multi-Stage Learning .
.- LiteStegNet: A Lightweight Deep Learning Framework for Video Steganography in IoT-Based Systems.
.- Secure and Workload-Aware Virtual Machine Migration: Enhancing Performance, Energy Efficiency, and Cyber Resilience in Cloud Data Centres.
.- AI-Powered Malware Analysis in Military Cybersecurity: A Deep Learning Approach.
.- Applied Computing.
.- A Modern Software Engineering Approach to UML Class Diagram Evaluation.
.- Advancement in E-marketing Strategy using Support Vector Machine and Apriori Algorithm.
.- Advancing Real-Time Facial Expression Recognition: A Deep Learning-Based Video Stream Analysis.
.- An Enhanced Deep Learning Approach for Writer Identification and Verification Using Corner Detection.
.- Deep Learning Techniques for Predicting Transcription Factor Binding Sites (TFBSs) from DNA Sequencing Data.
.- Dual-Phase Sensor Deployment Using Pelican Optimization Algorithm: A Case Study on Air Pollution Monitoring Baghdad City.
.- Hand Gesture Classification on Custom Abductees-Rescue Dataset using an Optimized LSTM.
.- WLDRD: Dynamic Weighted Load Balancing with Adaptive Request Distribution in Distributed Systems.
.- Computing Methodologies.
.- Design and Implementation of a Handshaking Algorithm for Enhanced Protection of High-Tension Towers in Iraq.
.- DiploNet: A Deep Learning Semantic Segmentation Model for Glaucoma Diagnosis.
.- Summarizing Research Papers with Transformer Models.
.- LESS is more: Guiding LLMs for Formal Requirement and Test Case Generation.
.- Traffic equilibria prediction using inverse reinforcement learning.

Riassunto

This book constitutes the post-conference proceedings of the Second International Conference on Cybersecurity and Artificial Intelligence Strategies, CAIS 2025 held in Baghdad, Iraq during September 17-18, 2025.
The 23 full papers included in this book were carefully reviewed and selected from 101 submissions. The papers are organized in these topical sections: Security and Privacy; Applied Computing and Computing Methodologies.

Dettagli sul prodotto

Con la collaborazione di Haider Hadi Abbas (Editore), Safaa O. Al-Mamory (Editore), Abeer Salim Jamil (Editore), Mahmoud Shuker Mahmoud (Editore), Ali Makki Sagheer (Editore), George S. Oreku (Editore), Ali Makki Sagheer (Editore), Abeer Salim Jamil et al (Editore), Kewei Sha (Editore)
Editore Springer, Berlin
 
Lingue Inglese
Formato Tascabile
Pubblicazione 03.11.2025
 
EAN 9783032072436
ISBN 978-3-0-3207243-6
Pagine 396
Dimensioni 155 mm x 22 mm x 235 mm
Peso 622 g
Illustrazioni XV, 396 p. 145 illus., 115 illus. in color.
Serie Communications in Computer and Information Science
Categorie Scienze naturali, medicina, informatica, tecnica > Informatica, EDP > Informatica

Netzwerksicherheit, Classification, recognition, Data and Information Security, Information systems, Intrusion Detection System, Applied computing, security and privacy, Computing methodologies, Malware detection

Recensioni dei clienti

Per questo articolo non c'è ancora nessuna recensione. Scrivi la prima recensione e aiuta gli altri utenti a scegliere.

Scrivi una recensione

Top o flop? Scrivi la tua recensione.

Per i messaggi a CeDe.ch si prega di utilizzare il modulo di contatto.

I campi contrassegnati da * sono obbligatori.

Inviando questo modulo si accetta la nostra dichiarazione protezione dati.