Cybersecurity and Artificial Intelligence Strategies : Second International Conference, CAIS 2025, Baghdad, Iraq, September 17-18, 2025, Proceedings (Communications in Computer and Information Science)

個数:
  • ポイントキャンペーン

Cybersecurity and Artificial Intelligence Strategies : Second International Conference, CAIS 2025, Baghdad, Iraq, September 17-18, 2025, Proceedings (Communications in Computer and Information Science)

  • 提携先の海外書籍取次会社に在庫がございます。通常3週間で発送いたします。
    重要ご説明事項
    1. 納期遅延や、ご入手不能となる場合が若干ございます。
    2. 複数冊ご注文の場合は、ご注文数量が揃ってからまとめて発送いたします。
    3. 美品のご指定は承りかねます。

    ●3Dセキュア導入とクレジットカードによるお支払いについて
  • 【入荷遅延について】
    世界情勢の影響により、海外からお取り寄せとなる洋書・洋古書の入荷が、表示している標準的な納期よりも遅延する場合がございます。
    おそれいりますが、あらかじめご了承くださいますようお願い申し上げます。
  • ◆画像の表紙や帯等は実物とは異なる場合があります。
  • ◆ウェブストアでの洋書販売価格は、弊社店舗等での販売価格とは異なります。
    また、洋書販売価格は、ご注文確定時点での日本円価格となります。
    ご注文確定後に、同じ洋書の販売価格が変動しても、それは反映されません。
  • 製本 Paperback:紙装版/ペーパーバック版/ページ数 396 p.
  • 言語 ENG
  • 商品コード 9783032072436

Description

This book constitutes the post-conference proceedings of the Second International Conference on Cybersecurity and Artificial Intelligence Strategies, CAIS 2025 held in Baghdad, Iraq during September 17-18, 2025.

The 23 full papers included in this book were carefully reviewed and selected from 101 submissions. The papers are organized in these topical sections: Security and Privacy; Applied Computing and Computing Methodologies.

.- Security and Privacy.
.- An Improved DBSCAN Clustering Algorithm for Bot Detection on Twitter.
.- Anomaly Detection in Blockchain Transactions Using Supervised Machine Learning.
.- Artificial Intelligence Strategies for Advancing Cybersecurity and Intrusion Detection Systems (IDs).
.- BERT-Enhanced Dual-Attention RNN for Short Text Spam Detection.
.- Effective Knowledge Graph Representation for Cybersecurity Using AI-Based X Data and Named Entity Relation Technique .
.- Enhancement of Cybersecurity in AI Services Using Hybrid Homomorphic Encryption.
.- Innovative Neural Network Architecture for Progressive Windows Malware Detection via Adaptive Feature Fusion and Multi-Stage Learning .
.- LiteStegNet: A Lightweight Deep Learning Framework for Video Steganography in IoT-Based Systems.
.- Secure and Workload-Aware Virtual Machine Migration: Enhancing Performance, Energy Efficiency, and Cyber Resilience in Cloud Data Centres.
.- AI-Powered Malware Analysis in Military Cybersecurity: A Deep Learning Approach.
.- Applied Computing.
.- A Modern Software Engineering Approach to UML Class Diagram Evaluation.
.- Advancement in E-marketing Strategy using Support Vector Machine and Apriori Algorithm.
.- Advancing Real-Time Facial Expression Recognition: A Deep Learning-Based Video Stream Analysis.
.- An Enhanced Deep Learning Approach for Writer Identification and Verification Using Corner Detection.
.- Deep Learning Techniques for Predicting Transcription Factor Binding Sites (TFBSs) from DNA Sequencing Data.
.- Dual-Phase Sensor Deployment Using Pelican Optimization Algorithm: A Case Study on Air Pollution Monitoring Baghdad City.
.- Hand Gesture Classification on Custom Abductees-Rescue Dataset using an Optimized LSTM.
.- WLDRD: Dynamic Weighted Load Balancing with Adaptive Request Distribution in Distributed Systems.
.- Computing Methodologies.
.- Design and Implementation of a Handshaking Algorithm for Enhanced Protection of High-Tension Towers in Iraq.
.- DiploNet: A Deep Learning Semantic Segmentation Model for Glaucoma Diagnosis.
.- Summarizing Research Papers with Transformer Models.
.- LESS is more: Guiding LLMs for Formal Requirement and Test Case Generation.
.- Traffic equilibria prediction using inverse reinforcement learning.


最近チェックした商品