Full Description
The two-volume proceedings set CCIS 2299 and 2300, constitutes the refereed proceedings of the 43rd IBIMA Conference on Artificial intelligence and Machine Learning, IBIMA-AI 2024, held in Madrid, Spain, in June 26-27, 2024.
The 44 full papers and 18 short papers included in this book were carefully reviewed and selected from 119 submissions. They were organized in topical sections as follows:
Part I:Artificial Intelligence and Machine Learning; Information Systems and Communications Technologies.
Part II: Artificial Intelligence and Machine Learning ; Software Engineering; Computer Security and Privacy.
Contents
.- Software Engineering.
.- Access Control Mechanisms in Java Applications.
.- An evaluative study comparing the performance of RESTful Web APIs created with .NET and Java Spring Boot.
.- Implementation Of a Model for Employee Evaluation on The Base of Open-Source Tools: The Case of Libre Office Base.
.- Model based approach for building dynamic UI with SPA.
.- Scheduling User Acceptance Tests from A Process Perspective.
.- Software Development Process Analysis - Ishikawa Diagram - Case Study.
.- E-Learning Platform to Asynchrony/Leak Recognition and Elimination Using Simulation Model of Lung Mechanical Ventilation.
.- Computer Security and Privacy.
.- A Review of a Website Phishing Detection Taxonomy.
.- A Survey of Challenges in Dark Web Crawling: Technical, Security, and Ethical Perspective.
.- Blockchain-Based Access Control in Smart Manufacturing as An Industrial Application: A Systematic Literature Review.
.- Detection of Cryptographic Functions Within Binary Executable Ransomware Files.
.- Exploring Blockchain's Influence on Illicit Practices: A Comprehensive Analysis.
.- Performance Comparison of Programming Interfaces for Microservices Architecture.
.- Ransomware Defense Strategies Using Cyber Threat Intelligence: A Case Study of a Saudi Organization.
.- The Effectiveness of the Tools Used in Risk Management Regarding the Security of Local Military Networks.
.- Use of the System Event Register to Assess the Security Level of The IT System.