Computer and Information Security : First World Conference, WCCIS 2024, Kuala Lumpur, Malaysia, September 20-22, 2024, Proceedings (Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering)

個数:
  • 予約

Computer and Information Security : First World Conference, WCCIS 2024, Kuala Lumpur, Malaysia, September 20-22, 2024, Proceedings (Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering)

  • 現在予約受付中です。出版後の入荷・発送となります。
    重要:表示されている発売日は予定となり、発売が延期、中止、生産限定品で商品確保ができないなどの理由により、ご注文をお取消しさせていただく場合がございます。予めご了承ください。

    ●3Dセキュア導入とクレジットカードによるお支払いについて
  • 【入荷遅延について】
    世界情勢の影響により、海外からお取り寄せとなる洋書・洋古書の入荷が、表示している標準的な納期よりも遅延する場合がございます。
    おそれいりますが、あらかじめご了承くださいますようお願い申し上げます。
  • ◆画像の表紙や帯等は実物とは異なる場合があります。
  • ◆ウェブストアでの洋書販売価格は、弊社店舗等での販売価格とは異なります。
    また、洋書販売価格は、ご注文確定時点での日本円価格となります。
    ご注文確定後に、同じ洋書の販売価格が変動しても、それは反映されません。
  • 製本 Paperback:紙装版/ペーパーバック版/ページ数 250 p.
  • 言語 ENG
  • 商品コード 9783031969430

Full Description

This book constitutes the proceedings of the first World Conference of Computer and Information Security, WCCIS 2024, which was held in Kuala Lumpur, Malaysia, during September 20-22, 2024.

The 14 full papers and 5 short papers were presented in this volume were carefully reviewed and selected from 58 submissions. They focus on Computer Modeling and Intelligent Information Technology; Network Information Security and Anomaly Detection.

Contents

.- Computer Modeling and Intelligent Information Technology.

.-  Subgraph-based lightGBM to Detect Sybil Addresses Across Multiple Blockchain Platforms.

.- Knowledge Extraction for Commercial Aircraft Process Specification Based on LLM Generation Rules.

.-  Robo-Advisors in Investment Management: Transforming Accessibility, Personalization, and Efficiency through Artificial Intelligence.

.- Wind speed prediction analysis based on machine learning in wind power generation.

.-  Neural Network Visual System Oriented Image Quality Evaluation for Camera Modeling in Cooperative Automated Driving Simulation.

.- Research on the Application of Neural Networks in the Identification and Classification of Data Assets in Network Security Space.

.-  A method of locating tropical cyclone center based on gaussian model.

.- Research on Virtualization-Based and Intelligently Guided Fuzzing Method for Industrial Control Systems Abstract.

.- Research and Practice of Dependency Parsing Based on Multiple Parser.

.-  The Research on Traditional Chinese Medicine Identification Method Based on YOLOv8 Deep Learning Model.

.- Network Information Security and Anomaly Detection.

.- A malicious code propagation model based on IoT honeypot decoy technology.

.- A Framework Utilizing Deep Learning for Anomaly Detection in Propagation Model.

.-  Network Malicious Attack Detection Based on Hierarchical Spatial Attention Mechanism.

.-  Research on 5G Channel Reciprocity for Wireless Physical Layer Security.

.- Research on Network Anomaly Traffic Attack Detection.

.- Automated Locating and Isolating Attack Sources in Local Area Networks.

.-  Network Security Protection Evaluation Method Based on Multi-source Information Fusion.

.-  Intrusion Detection Based on the Combination of TMG-GAN and CNN-BILSTM-Attention.

.-  A Blockchain-Based Secure Task Management Scheme for UAV Swarms.

最近チェックした商品