Full Description
This book gathers peer-reviewed contributions from the Third International Conference on Artificial Intelligence and Smart Applications (AISA'25), addressing key challenges related to secure and sustainable digital systems.
The selected papers focus on cybersecurity, digitalization processes, digital governance, and software engineering. Topics include secure system design, cyber-risk management, data protection, software architectures, governance frameworks, and digital transformation strategies in both public and private sectors.
By combining technical, organizational, and managerial perspectives, this book provides valuable insights into the development of reliable, secure, and well-governed digital systems. It serves as a reference for researchers, practitioners, decision-makers, and professionals involved in cybersecurity, software engineering, and digital transformation initiatives.
Contents
An Enhanced Elliptic Curve Cryptography-Based Approach for Color Image Encryption.- Mechanisms for hardening SSH access on a Linux server.- New Variant of Hill Encryption Scheme using a Chaotic Control Vector.- Machine Learning Approaches for Intrusion Detection in IoT Systems: Taxonomy and Challenges.- Weighted Core Attack Graph for Honeypot Allocation Against Lateral Movement in Advanced Persistent Threats.- Dynamic Chaotic Hill Cipher for Secure Image Encryption in Z/212Z.- Secure Agentic Reinforcement Learning for LLM-Driven SaaS Systems.- A Comparative Study of Supervised and Semi-Supervised Machine Learning for Intrusion Detection in BLE Enabled IoMT Systems.- Web Tracking Protection Methods: A Systematic Review with Cross-Platform Experimental Validation.



