Full Description
This book presents a curated collection of peer-reviewed research papers from the 4th International Conference on Innovations in Data Analytics (ICIDA 2025), held at Eminent College of Management & Technology (ECMT), India, in collaboration with the International Knowledge Research Foundation, on 5-6 December 2025. The conference served as a dynamic platform for academicians, researchers, and industry professionals to exchange ideas and showcase advancements in the rapidly evolving domains of data analytics and intelligent systems.
In today's data-driven world, the integration of Data Mining, Machine Learning, and Information Security has become essential for extracting meaningful insights and ensuring the protection of sensitive information. This book highlights cutting-edge research that addresses contemporary challenges in handling large-scale data, developing intelligent computational models, and securing digital infrastructures.
This book encompasses a wide spectrum of topics, including Artificial Intelligence, Data Analytics, Internet of Things (IoT), Information Security, and emerging trends in computing and communication technologies. The book reflects both theoretical innovations and practical applications, offering valuable insights for researchers, practitioners, and students alike.
By bringing together high-quality work from diverse domains, this book aims to foster interdisciplinary research and contribute to the advancement of knowledge in data analytics and its allied fields.
Contents
Adversarial Attacks on CTI Machine Learning Models: Threat And Defence Under Legal Framework.- AI in Cybercrime Investigations: A Legal-Ethical Assessment of Modern Policing Tools.- Intrusion Detection and Scan Type Classification Using PCA-XGBoost on Time-Series Network Logs.- Multi-Level Protection Framework in Network Topologies.- Transforming 5G Era Impact on E-Commerce and Digital Marketing Strategies with Opportunities and Challenges.- A Review: Detection of Phishing Website Using Machine Learning Algorithms.- Cloud-Integrated Stealth Network Scanning for Vulnerability Assessment Using GoScan and ARP Tracking.- Towards Robust Intrusion Detection in Wireless Sensor Networks: Experimental Analysis Using WSN-BFSF Dataset.- Facial Recognition Based Secured Cloud Voting System Using YOLOv8 Model and DeepFace Framework.- Detection and Comparison of Cyber-Attacks using Modern Machine Learning Techniques.



