Artificial intelligence and Machine Learning -

Artificial intelligence and Machine Learning

43rd IBIMA Conference, IBIMA-AI 2024, Madrid, Spain, June 26–27, 2024, Revised Selected Papers, Part-II

Khalid S. Soliman (Herausgeber)

Buch | Softcover
XIII, 517 Seiten
2025
Springer International Publishing (Verlag)
978-3-031-79085-0 (ISBN)
96,29 inkl. MwSt

The two-volume proceedings set CCIS 2299 and 2300, constitutes the refereed proceedings of the 43rd IBIMA Conference on Artificial intelligence and Machine Learning, IBIMA-AI 2024, held in Madrid, Spain, in June 26-27, 2024.

The 44 full papers and 18 short papers included in this book were carefully reviewed and selected from 119 submissions. They were organized in topical sections as follows:

Part I:Artificial Intelligence and Machine Learning; Information Systems and Communications Technologies.

Part II: Artificial Intelligence and Machine Learning ; Software Engineering; Computer Security and Privacy.

.- Software Engineering.

.- Access Control Mechanisms in Java Applications.

.- An evaluative study comparing the performance of RESTful Web APIs created with .NET and Java Spring Boot.

.- Implementation Of a Model for Employee Evaluation on The Base of Open-Source Tools: The Case of Libre Office Base.

.- Model based approach for building dynamic UI with SPA.

.- Scheduling User Acceptance Tests from A Process Perspective.

.- Software Development Process Analysis - Ishikawa Diagram - Case Study.

.- E-Learning Platform to Asynchrony/Leak Recognition and Elimination Using Simulation Model of Lung Mechanical Ventilation.

.- Computer Security and Privacy.

.- A Review of a Website Phishing Detection Taxonomy.

.- A Survey of Challenges in Dark Web Crawling: Technical, Security, and Ethical Perspective.

.- Blockchain-Based Access Control in Smart Manufacturing as An Industrial Application: A Systematic Literature Review.

.- Detection of Cryptographic Functions Within Binary Executable Ransomware Files.

.- Exploring Blockchain's Influence on Illicit Practices: A Comprehensive Analysis.

.- Performance Comparison of Programming Interfaces for Microservices Architecture.

.- Ransomware Defense Strategies Using Cyber Threat Intelligence: A Case Study of a Saudi Organization.

.- The Effectiveness of the Tools Used in Risk Management Regarding the Security of Local Military Networks.

.- Use of the System Event Register to Assess the Security Level of The IT System.

Erscheint lt. Verlag 5.2.2025
Reihe/Serie Communications in Computer and Information Science
Zusatzinfo XIII, 517 p. 217 illus.
Verlagsort Cham
Sprache englisch
Maße 155 x 235 mm
Themenwelt Informatik Theorie / Studium Künstliche Intelligenz / Robotik
Schlagworte Access Control • Artificial Intelligence • Blockchain • cryptography • cybersecurity • data privacy • DeepFake Detection • Genetic algorithms • Graph Representation • java spring boot • Large Language Models • machine learning • Natural Language Processing • phishing detection • query expansion • Recommendation Systems • software development • Software engineering • Usability Testing • Virtual Reality
ISBN-10 3-031-79085-5 / 3031790855
ISBN-13 978-3-031-79085-0 / 9783031790850
Zustand Neuware
Haben Sie eine Frage zum Produkt?
Mehr entdecken
aus dem Bereich
Eine kurze Geschichte der Informationsnetzwerke von der Steinzeit bis …

von Yuval Noah Harari

Buch | Hardcover (2024)
Penguin (Verlag)
28,00