Artificial Intelligence Based Smart and Secured Applications : 4th International Conference, ASCIS 2025, Gujarat, India, September 11-13, 2025, Revised Selected Papers, Part IV (Communications in Computer and Information Science)

個数:
  • 予約

Artificial Intelligence Based Smart and Secured Applications : 4th International Conference, ASCIS 2025, Gujarat, India, September 11-13, 2025, Revised Selected Papers, Part IV (Communications in Computer and Information Science)

  • 現在予約受付中です。出版後の入荷・発送となります。
    重要:表示されている発売日は予定となり、発売が延期、中止、生産限定品で商品確保ができないなどの理由により、ご注文をお取消しさせていただく場合がございます。予めご了承ください。

    ●3Dセキュア導入とクレジットカードによるお支払いについて
  • 【入荷遅延について】
    世界情勢の影響により、海外からお取り寄せとなる洋書・洋古書の入荷が、表示している標準的な納期よりも遅延する場合がございます。
    おそれいりますが、あらかじめご了承くださいますようお願い申し上げます。
  • ◆画像の表紙や帯等は実物とは異なる場合があります。
  • ◆ウェブストアでの洋書販売価格は、弊社店舗等での販売価格とは異なります。
    また、洋書販売価格は、ご注文確定時点での日本円価格となります。
    ご注文確定後に、同じ洋書の販売価格が変動しても、それは反映されません。
  • 製本 Paperback:紙装版/ペーパーバック版
  • 商品コード 9783032178428

Full Description

This five-volume set CCIS 2819-2823 constitutes the refereed proceedings of the 4th International Conference on Advancements in Smart Computing and Information Security, ASCIS 2025, held in Rajkot, Gujarat, India, during September 11-13, 2025.

The 112 full papers and 25 short papers included in these volumes were carefully reviewed and selected from 579 submissions. They are organized into the following topical sections:

Part I, II, III: Artificial Intelligence & Machine Learning

Part IV: Cyber Security

Part V: Smart Computing

Contents

Cyber Security.- Taxonomy of Tools and Techniques for Cyber Forensic Investigations.-Extending Decentralized Payment Gateways: Cross-Chain Interoperability and Advanced Analytics with StarkNet.- Optimized Self-Adaptive Intrusion Detection System (SPIDS) for Enhanced Network Security.- Optimizing Intrusion Detection with Bayesian Optimization in Reactive Intrusion Detection Systems (BO-RIDS) for Enhanced Security Performance.- A Comparative Analysis of Data Mining Approaches for Phishing Email and Website Detection.- Secure EEG Report with Time- Lock Access and Blockchain: A Survey.- Survey on Secure File Integrity & Ownership System Using Blockchain & NFTs.- Survey on Effectiveness of File Integrity Checker in Ensuring Medical Records.- Survey on Cyber Threat Detection Using Honeypot, Isolation Forest & Threat.- Adversarial-Resilient Federated Q-Learning for Scalable Intrusion Detection in WSNs.- Graph Transformer with Explainable AI for Improved Cybersecurity by Detecting and Mitigating IoT Cyber Threats.- Steganography Image Security Using Enhanced Hyperactive Cryptography Model.- Smart Digital Payments: A Comprehensive Literature Review and Research Analysis.- Preserving Mental Health Data Privacy Using Federated Learning and Homomorphic Encryption.- Detecting Network Attacks Using Decision Tree Classifier.- Cyber Deception and Fake Data Injection System Using AI.- Advanced Command and Control Framework for Covert Operations.- Cybersecurity Challenges in IoT-Based Healthcare Monitoring Systems.- AI-Augmented Social Health Analytics: Extracting Mental and Physical Well-being Insights from Social Media and Networks.- Enhancing Bitcoin Address Unlikability: Addressing Gaps in the Evicting-Filling Attack and Proposing a Holistic Defense Framework.- Power Analysis Vulnerability Assessment and Comparative Analysis with Simulator for Arduino Uno.- Database Vulnerabilities and Cyber Resilience in Critical Infrastructure: A Case Study of the 2025 UNFI Cyberattack.- Bridging the Cybersecurity Gap An Intuitive Web Security Scanner for Developers and Novice.- Anomaly Detection in Linux Kernels: A Framework for SSH Intrusion Prevention.- Linux Kernel Hardening Against SSH Attacks: An Audit Log-Driven Approach.- CyberBait: Strengthening Network Deception via Realistic SSH Honeypots.

最近チェックした商品