Artificial intelligence and Machine Learning
Springer International Publishing (Verlag)
978-3-031-79085-0 (ISBN)
- Noch nicht erschienen - erscheint am 05.02.2025
- Versandkostenfrei innerhalb Deutschlands
- Auch auf Rechnung
- Verfügbarkeit in der Filiale vor Ort prüfen
- Artikel merken
The two-volume proceedings set CCIS 2299 and 2300, constitutes the refereed proceedings of the 43rd IBIMA Conference on Artificial intelligence and Machine Learning, IBIMA-AI 2024, held in Madrid, Spain, in June 26-27, 2024.
The 44 full papers and 18 short papers included in this book were carefully reviewed and selected from 119 submissions. They were organized in topical sections as follows:
Part I:Artificial Intelligence and Machine Learning; Information Systems and Communications Technologies.
Part II: Artificial Intelligence and Machine Learning ; Software Engineering; Computer Security and Privacy.
.- Software Engineering.
.- Access Control Mechanisms in Java Applications.
.- An evaluative study comparing the performance of RESTful Web APIs created with .NET and Java Spring Boot.
.- Implementation Of a Model for Employee Evaluation on The Base of Open-Source Tools: The Case of Libre Office Base.
.- Model based approach for building dynamic UI with SPA.
.- Scheduling User Acceptance Tests from A Process Perspective.
.- Software Development Process Analysis - Ishikawa Diagram - Case Study.
.- E-Learning Platform to Asynchrony/Leak Recognition and Elimination Using Simulation Model of Lung Mechanical Ventilation.
.- Computer Security and Privacy.
.- A Review of a Website Phishing Detection Taxonomy.
.- A Survey of Challenges in Dark Web Crawling: Technical, Security, and Ethical Perspective.
.- Blockchain-Based Access Control in Smart Manufacturing as An Industrial Application: A Systematic Literature Review.
.- Detection of Cryptographic Functions Within Binary Executable Ransomware Files.
.- Exploring Blockchain's Influence on Illicit Practices: A Comprehensive Analysis.
.- Performance Comparison of Programming Interfaces for Microservices Architecture.
.- Ransomware Defense Strategies Using Cyber Threat Intelligence: A Case Study of a Saudi Organization.
.- The Effectiveness of the Tools Used in Risk Management Regarding the Security of Local Military Networks.
.- Use of the System Event Register to Assess the Security Level of The IT System.
Erscheint lt. Verlag | 5.2.2025 |
---|---|
Reihe/Serie | Communications in Computer and Information Science |
Zusatzinfo | XIII, 517 p. 217 illus. |
Verlagsort | Cham |
Sprache | englisch |
Maße | 155 x 235 mm |
Themenwelt | Informatik ► Theorie / Studium ► Künstliche Intelligenz / Robotik |
Schlagworte | Access Control • Artificial Intelligence • Blockchain • cryptography • cybersecurity • data privacy • DeepFake Detection • Genetic algorithms • Graph Representation • java spring boot • Large Language Models • machine learning • Natural Language Processing • phishing detection • query expansion • Recommendation Systems • software development • Software engineering • Usability Testing • Virtual Reality |
ISBN-10 | 3-031-79085-5 / 3031790855 |
ISBN-13 | 978-3-031-79085-0 / 9783031790850 |
Zustand | Neuware |
Haben Sie eine Frage zum Produkt? |
aus dem Bereich