- ホーム
- > 洋書
- > 英文書
- > Computer / General
Full Description
This book constitutes the proceedings of the first World Conference of Computer and Information Security, WCCIS 2024, which was held in Kuala Lumpur, Malaysia, during September 20-22, 2024.
The 14 full papers and 5 short papers were presented in this volume were carefully reviewed and selected from 58 submissions. They focus on Computer Modeling and Intelligent Information Technology; Network Information Security and Anomaly Detection.
Contents
.- Computer Modeling and Intelligent Information Technology.
.- Subgraph-based lightGBM to Detect Sybil Addresses Across Multiple Blockchain Platforms.
.- Knowledge Extraction for Commercial Aircraft Process Specification Based on LLM Generation Rules.
.- Robo-Advisors in Investment Management: Transforming Accessibility, Personalization, and Efficiency through Artificial Intelligence.
.- Wind speed prediction analysis based on machine learning in wind power generation.
.- Neural Network Visual System Oriented Image Quality Evaluation for Camera Modeling in Cooperative Automated Driving Simulation.
.- Research on the Application of Neural Networks in the Identification and Classification of Data Assets in Network Security Space.
.- A method of locating tropical cyclone center based on gaussian model.
.- Research on Virtualization-Based and Intelligently Guided Fuzzing Method for Industrial Control Systems Abstract.
.- Research and Practice of Dependency Parsing Based on Multiple Parser.
.- The Research on Traditional Chinese Medicine Identification Method Based on YOLOv8 Deep Learning Model.
.- Network Information Security and Anomaly Detection.
.- A malicious code propagation model based on IoT honeypot decoy technology.
.- A Framework Utilizing Deep Learning for Anomaly Detection in Propagation Model.
.- Network Malicious Attack Detection Based on Hierarchical Spatial Attention Mechanism.
.- Research on 5G Channel Reciprocity for Wireless Physical Layer Security.
.- Research on Network Anomaly Traffic Attack Detection.
.- Automated Locating and Isolating Attack Sources in Local Area Networks.
.- Network Security Protection Evaluation Method Based on Multi-source Information Fusion.
.- Intrusion Detection Based on the Combination of TMG-GAN and CNN-BILSTM-Attention.
.- A Blockchain-Based Secure Task Management Scheme for UAV Swarms.