Buch, Englisch, 370 Seiten, Format (B × H): 155 mm x 235 mm, Gewicht: 587 g
International Joint Conference 16th International Conference on Computational Intelligence in Security for Information Systems (CISIS 2023) 14th International Conference on EUropean Transnational Education (ICEUTE 2023)
1. Auflage 2023
ISBN: 978-3-031-42518-9
Verlag: Springer Nature Switzerland
Proceedings
Buch, Englisch, 370 Seiten, Format (B × H): 155 mm x 235 mm, Gewicht: 587 g
Reihe: Lecture Notes in Networks and Systems
ISBN: 978-3-031-42518-9
Verlag: Springer Nature Switzerland
This book of Lecture Notes in Networks and Systems contains accepted papers presented at the 16th International Conference on Computational Intelligence in Security for Information Systems (CISIS 2023) and the 14th International Conference on EUropean Transnational Education (ICEUTE 2023). These conferences were held in the beautiful city of Salamanca, Spain, in September 2023.
The aim of the CISIS 2023 conference is to offer a meeting opportunity for academic and industry-related researchers belonging to the various, vast communities of computational intelligence, information security, and data mining. The need for intelligent, flexible behavior by large, complex systems, especially in mission-critical domains, is intended to be the catalyst and the aggregation stimulus for the overall event.
The aim of ICEUTE 2023 conference is to offer a meeting point for people working on transnational education within Europe. It provides a stimulating and fruitful forum for presenting and discussing the latest works and advances on transnational education within European countries.
Zielgruppe
Research
Autoren/Hrsg.
Fachgebiete
- Mathematik | Informatik EDV | Informatik Angewandte Informatik Computeranwendungen in Wissenschaft & Technologie
- Technische Wissenschaften Technik Allgemein Computeranwendungen in der Technik
- Sozialwissenschaften Pädagogik Pädagogik
- Mathematik | Informatik EDV | Informatik Informatik Künstliche Intelligenz
Weitere Infos & Material
Finding and removing infected T -trees in IoT networks.- Intrusion Detection and Prevention in Industrial Internet of Things: A Study.- Critical analysis of global models for malware propagation on wireless sensor networks.- A novel method for failure detection based on real-time systems identification.- Accountability & explainability in robotics: a proof of concept for ROS 2- and Nav2-based mobile robots.- Reducing the security margin against a differential attack in the TinyJambu cryptosystem.- Analysis of extractive text summarization methods as a binary classification problem.- Systematic literature review of methods used for SQL injection detection based on intelligent algorithms.- Benchmarking Classifiers for DDoS Attack Detection in Industrial IoT Networks.- Impact of the Keep-Alive Parameter on SQL Injection Attack Detection in Network Flow Data.- QuantumSolver Composer: Automatic Quantum Transformation of Classical Circuits.