Cybersecurity and Artificial Intelligence Strategies : Second International Conference, CAIS 2025, Baghdad, Iraq, September 17-18, 2025, Proceedings (Communications in Computer and Information Science)

個数:
  • 予約

Cybersecurity and Artificial Intelligence Strategies : Second International Conference, CAIS 2025, Baghdad, Iraq, September 17-18, 2025, Proceedings (Communications in Computer and Information Science)

  • 現在予約受付中です。出版後の入荷・発送となります。
    重要:表示されている発売日は予定となり、発売が延期、中止、生産限定品で商品確保ができないなどの理由により、ご注文をお取消しさせていただく場合がございます。予めご了承ください。

    ●3Dセキュア導入とクレジットカードによるお支払いについて
  • 【入荷遅延について】
    世界情勢の影響により、海外からお取り寄せとなる洋書・洋古書の入荷が、表示している標準的な納期よりも遅延する場合がございます。
    おそれいりますが、あらかじめご了承くださいますようお願い申し上げます。
  • ◆画像の表紙や帯等は実物とは異なる場合があります。
  • ◆ウェブストアでの洋書販売価格は、弊社店舗等での販売価格とは異なります。
    また、洋書販売価格は、ご注文確定時点での日本円価格となります。
    ご注文確定後に、同じ洋書の販売価格が変動しても、それは反映されません。
  • 製本 Paperback:紙装版/ペーパーバック版/ページ数 412 p.
  • 言語 ENG
  • 商品コード 9783032072436

Full Description

This book constitutes the post-conference proceedings of the Second International Conference on Cybersecurity and Artificial Intelligence Strategies, CAIS 2025 held in Baghdad, Iraq during September 17-18, 2025.

The 23 full papers included in this book were carefully reviewed and selected from 101 submissions. The papers are organized in these topical sections: Security and Privacy; Applied Computing and Computing Methodologies.

Contents

.- Security and Privacy.
.- An Improved DBSCAN Clustering Algorithm for Bot Detection on Twitter.
.- Anomaly Detection in Blockchain Transactions Using Supervised Machine Learning.
.- Artificial Intelligence Strategies for Advancing Cybersecurity and Intrusion Detection Systems (IDs).
.- BERT-Enhanced Dual-Attention RNN for Short Text Spam Detection.
.- Effective Knowledge Graph Representation for Cybersecurity Using AI-Based X Data and Named Entity Relation Technique .
.- Enhancement of Cybersecurity in AI Services Using Hybrid Homomorphic Encryption.
.- Innovative Neural Network Architecture for Progressive Windows Malware Detection via Adaptive Feature Fusion and Multi-Stage Learning .
.- LiteStegNet: A Lightweight Deep Learning Framework for Video Steganography in IoT-Based Systems.
.- Secure and Workload-Aware Virtual Machine Migration: Enhancing Performance, Energy Efficiency, and Cyber Resilience in Cloud Data Centres.
.- AI-Powered Malware Analysis in Military Cybersecurity: A Deep Learning Approach.
.- Applied Computing.
.- A Modern Software Engineering Approach to UML Class Diagram Evaluation.
.- Advancement in E-marketing Strategy using Support Vector Machine and Apriori Algorithm.
.- Advancing Real-Time Facial Expression Recognition: A Deep Learning-Based Video Stream Analysis.
.- An Enhanced Deep Learning Approach for Writer Identification and Verification Using Corner Detection.
.- Deep Learning Techniques for Predicting Transcription Factor Binding Sites (TFBSs) from DNA Sequencing Data.
.- Dual-Phase Sensor Deployment Using Pelican Optimization Algorithm: A Case Study on Air Pollution Monitoring Baghdad City.
.- Hand Gesture Classification on Custom Abductees-Rescue Dataset using an Optimized LSTM.
.- WLDRD: Dynamic Weighted Load Balancing with Adaptive Request Distribution in Distributed Systems.
.- Computing Methodologies.
.- Design and Implementation of a Handshaking Algorithm for Enhanced Protection of High-Tension Towers in Iraq.
.- DiploNet: A Deep Learning Semantic Segmentation Model for Glaucoma Diagnosis.
.- Summarizing Research Papers with Transformer Models.
.- LESS is more: Guiding LLMs for Formal Requirement and Test Case Generation.
.- Traffic equilibria prediction using inverse reinforcement learning.

最近チェックした商品