Zum Hauptinhalt springen
Nicht aus der Schweiz? Besuchen Sie lehmanns.de
Artificial Intelligence Based Smart and Secured Applications -

Artificial Intelligence Based Smart and Secured Applications

Third International Conference, ASCIS 2024, Rajkot, India, October 16–18, 2024, Revised Selected Papers, Part VI
Buch | Softcover
LIV, 478 Seiten
2025
Springer International Publishing (Verlag)
978-3-031-86304-2 (ISBN)
CHF 127,30 inkl. MwSt
  • Versand in 15-20 Tagen
  • Versandkostenfrei
  • Auch auf Rechnung
  • Artikel merken

The six-volume set, CCIS 2424 - 2429, constitutes the refereed proceedings of the Third International Conference on Advances in Smart Computing and Information Security, ASCIS 2024, held in Rajkot, Gujarat, India, in October 16 18, 2024.

The 138 full papers and 43 short papers presented in these six volumes were carefully reviewed and selected from 667 submissions.The papers presented in these six volumes are organized in the following topical sections:

Part I, II, III, IV: Artificial Intelligence & Machine Learning

Part V: Smart Computing; Network and Cloud Computing.

Part VI: Cyber Security; Computer Application for Sustainability.

.- Cyber Security.

.- Automation of Endpoint Security using Machine Learning.

.- Comparative Analysis of Vulnerability and Threats related to Blogging Platforms.

.- Cybersecurity Threats to Autonomous Vehicles: A Deep Learning Approach.

.- Advanced Threat Intelligence Systems for Early Warning of Cyber Hacking.

.- Reconciliation - Backdoor Access finding strategies with Legacy applications.

.- Enhancing Cyber Hacking Breach Classification through Integrated Preprocessing and feature Extraction Technique.

.- An Ensemble Method for Insider Threat Detection based On User Activities Analysis Using Bi-LSTM and GA Optimization.

.- Systemization of Knowledge: Privacy Preservation for Decentralized Non-Financial Applications.

.- Identifying Application-Level Distributed Denial-Of-Service (DDoS) Attacks With Machine Learning (ML).

.- Cybersecurity Threats and Trust Dynamics in Digital Payment Systems: An Analysis of Domestic Fraud and User Perspectives.

.- Enhanced Web Browser Forensics: Innovative Methodology for Evidence Collection and Analysis.

.- DDOS attack detection and prevention using MIEC method in SDN environment.

.- A lossless image, video and audio encryption method based hybrid chaotic map and DNA encryption.

.- Enhancing Cloud Security for Structured Data: An AES-GCM Based Format-Preserving Encryption Approach.

.- Hacktivism or Cyber Warfare? Decoding the Motivations Behind Cyber Attacks Targeting Israel.

.- Designing a Secure E-Voting System with Ganache: Challenges and Solutions.

.- Computer Application for Sustainability.

.- Consumer Usage Intention Factors for Mobile Food- Delivery Applications Using Task Technology Fit Approach.

.- Optimizing Query Execution Time in Relational Databases Using Cost-Based and Index Merge Strategies: A Case Study on E-Commerce Data.

.- Securing Sign-Up and Sign-In in the Indian Market: Fraud Prevention in CIAM for CRM - A Comprehensive Review and Future Directions.

.- MERN Stack Website For Government Officials.

.- Brain Tumor Diagnosis using Deep Learning: A Systematic Review and Meta- Analysis of MRI Image-Based Studies.

.- A STUDY ON EMPLOYEE ENGAGEMENT FACTORS OF INFORMATION & COMMUNICATION TECHNOLOGY (ICT) WORKFORCE.

.- A Simulated Manufacturing Study on Rope Size and Number of Splits on the Productivity while Applying the Simplified Drum-Buffer-Rope Methodology.

.- Effect of Technology Acceptance among Employees in the Second Half of their Working Life.

.- A Study on the Effects of Social Media Platforms on Graduate Students' Academic Achievement.

.- Enhancement of Forest Fire Assessment by KDCPMNN Approach in Sikkim, India Using Remote Sensing Images.

.- Decentralized Payment Gateway: Bridging DeFi with Metamask.

.- Impact of Social Media Marketing in the Cosmetic Industry to Cross the Chasm in India.

.- Ubiquitous Computing of Low-Cost Pollutant Sensors for Monitoring Pollutant Gases in the Construction Sector.

.- Envisioning the AI-Driven Future: A Delphi Study on the Transformative Role of Artificial Intelligence in Higher Education.

.- IoT Integration for Smart Agriculture: Prioritizing Key Factors using WASPAS Approach.

.- Transforming EHR Systems Using the HyperLedger Fabric Blockchain Framework.

Erscheinungsdatum
Reihe/Serie Communications in Computer and Information Science
Zusatzinfo LIV, 478 p. 213 illus., 141 illus. in color.
Verlagsort Cham
Sprache englisch
Maße 155 x 235 mm
Themenwelt Informatik Theorie / Studium Künstliche Intelligenz / Robotik
Schlagworte Artificial Intelligence • Attacks • Blockchain • cloud computing security • Computer Networks • cryptography • cyber security • Deep learning • Encryption • Image Processing Smart Computing • IOT • machine learning • Mitigation • Neural networks • Systems Security
ISBN-10 3-031-86304-6 / 3031863046
ISBN-13 978-3-031-86304-2 / 9783031863042
Zustand Neuware
Informationen gemäß Produktsicherheitsverordnung (GPSR)
Haben Sie eine Frage zum Produkt?
Mehr entdecken
aus dem Bereich
Künstliche Intelligenz, Macht und das größte Dilemma des 21. …

von Mustafa Suleyman; Michael Bhaskar

Buch | Softcover (2025)
C.H.Beck (Verlag)
CHF 25,20