Proceedings of the 3rd International Conference on Emerging Trends & Innovation (3rd ICETI) : DE (Information Systems Engineering and Management)

個数:
  • 予約
  • ポイントキャンペーン

Proceedings of the 3rd International Conference on Emerging Trends & Innovation (3rd ICETI) : DE (Information Systems Engineering and Management)

  • 現在予約受付中です。出版後の入荷・発送となります。
    重要:表示されている発売日は予定となり、発売が延期、中止、生産限定品で商品確保ができないなどの理由により、ご注文をお取消しさせていただく場合がございます。予めご了承ください。

    ●3Dセキュア導入とクレジットカードによるお支払いについて
  • 【入荷遅延について】
    世界情勢の影響により、海外からお取り寄せとなる洋書・洋古書の入荷が、表示している標準的な納期よりも遅延する場合がございます。
    おそれいりますが、あらかじめご了承くださいますようお願い申し上げます。
  • ◆画像の表紙や帯等は実物とは異なる場合があります。
  • ◆ウェブストアでの洋書販売価格は、弊社店舗等での販売価格とは異なります。
    また、洋書販売価格は、ご注文確定時点での日本円価格となります。
    ご注文確定後に、同じ洋書の販売価格が変動しても、それは反映されません。
  • 製本 Hardcover:ハードカバー版
  • 商品コード 9783032224255

Description

This book brings together forward-looking research and practical innovations that address real-world technological and societal challenges. It offers readers actionable insights, modern solutions, and interdisciplinary perspectives that support smarter decision-making, sustainable development, and digital transformation.

The contributions highlight emerging trends across artificial intelligence, cybersecurity, data science, intelligent systems, healthcare technologies, and sustainable computing. Each chapter presents applied methodologies, experimental findings, and practical frameworks that can be directly adapted by researchers, practitioners, and industry professionals. 

By connecting academic research with real implementation challenges, the book serves as a valuable reference for those seeking to translate ideas into impact. It supports collaboration between disciplines and promotes innovation that responds to global needs. Designed for researchers, engineers, and advanced students, this collection reflects the spirit of knowledge exchange and international cooperation fostered through the 3rd International Conference on Emerging Trends & Innovation (ICETI 2025).

Enhancing Cybersecurity with AI-Based Threat Classification.- An Adaptive Model for Unmasking Zero-Day Threats using Federated Learning.- Deep Architectural Classification for Heart Disease Prediction.- Multi-Dataset Comparative Analysis of Genetic Algorithms for Intrusion Detection in UAV Networks.- Enhancing Breast Cancer Classification: A Comparative Analysis of Five Hybrid Deep Learning and Machine Learning Architectures on Tabular Data.- A Lightweight Continuous Authentication Protocol for Smart Home Environment Under A Zero Trust Architecture.- Unveiling Covert AI: Reverse Engineering Android Apps to Expose Behavioral Tracking.- The Clipboard Conspiracy: How Android Apps Can Steal Your Data Unseen.- Prediction of Vulnerabilities in Banking sector using Machine Learning.- The Reverse Engineer s Toolkit: A Comprehensive Overview of Essential Tools and Techniques.- Lightweight Intrusion Detection System for UAV-Based Search and Rescue Operations Using Machine and Deep Learning Models.- Disaster-Aware IoT Connectivity using FANET Routing Protocol.- Differential Privacy-Enabled Horizontal Federated Learning for Anti-Money Laundering Detection in Financial Transactions.- A Hybrid Stacked Ensemble of Deep Learning and Machine Learning Models for High-Accuracy Diabetes Prediction.- YOLO-Based Object Detection and Recognition Using Webots Simulation.- Harris' Hawks Optimization for Enhanced Clustering in Medical Diagnosis.- Performance Benchmarking of ROBOTa Optimized Machine and Deep Learning Models for UAV IDS.- A Comparative Study on Optimized Models for Intrusion Detection using CICIDS2017.- Anomaly based Intrusion Detection System for UAVs Network.- Lightweight Intrusion Detection System for UAV-Based Search and Rescue Operations Using Machine and Deep Learning Models.- Disaster-Aware IoT Connectivity using FANET Routing Protocol.- Differential Privacy-Enabled Horizontal Federated Learning for Anti-Money Laundering Detection in Financial Transactions.- A Hybrid Stacked Ensemble of Deep Learning and Machine Learning Models for High-Accuracy Diabetes Prediction.- YOLO-Based Object Detection and Recognition Using Webots Simulation.- Harris' Hawks Optimization for Enhanced Clustering in Medical Diagnosis.- Performance Benchmarking of ROBOTa Optimized Machine and Deep Learning Models for UAV IDS.- A Comparative Study on Optimized Models for Intrusion Detection using CICIDS2017.- Anomaly based Intrusion Detection System for UAVs Network.


最近チェックした商品