Information System Design: Communication Networks and Internet of Things
Proceedings of Ninth International Conference on Information System Design and Intelligent Applications (ISDIA 2025), Volume 2 Herausgegeben:Bhateja, Vikrant; Reza Khan, Zeenath; Simic, Milan; Sharma, Dilip Kumar
Information System Design: Communication Networks and Internet of Things
Proceedings of Ninth International Conference on Information System Design and Intelligent Applications (ISDIA 2025), Volume 2 Herausgegeben:Bhateja, Vikrant; Reza Khan, Zeenath; Simic, Milan; Sharma, Dilip Kumar
This book presents a collection of high-quality, peer-reviewed research papers from 9th International Conference on Information System Design and Intelligent Applications (ISDIA 2025), held in Dubai, UAE, from 3 4 January 2025. It covers a wide range of topics in computer science and information technology, including data mining and data warehousing, high-performance computing, parallel and distributed computing, computational intelligence, soft computing, big data, cloud computing, grid computing, cognitive computing, and information security.
This book presents a collection of high-quality, peer-reviewed research papers from 9th International Conference on Information System Design and Intelligent Applications (ISDIA 2025), held in Dubai, UAE, from 3 4 January 2025. It covers a wide range of topics in computer science and information technology, including data mining and data warehousing, high-performance computing, parallel and distributed computing, computational intelligence, soft computing, big data, cloud computing, grid computing, cognitive computing, and information security.
Die Herstellerinformationen sind derzeit nicht verfügbar.
Inhaltsangabe
Image Encryption with a Hybrid Chaotic Map for Improved Security.- Detecting Cybersecurity Threats Using Convolutional Neural Networks and Machine Learning.- Emerging cyber threats in the quantum era: from neural hacking to space communication vulnerabilities.- Enhancing network efficiency and optimization : A graph-theoretic approach.- Network Forensics: Techniques, Challenges, and Incident Response.- A Systematic Review of Cloud Security: Architectures, Adoption Challenges, and Emerging Trends.- An Improved Model for Deep Dive Phishing Detection.- BiD-Phish: Bilingual Deep Learning method for Phishing Email Detection for English and Arabic Using CNN and Particle Swarm Optimization.- Steganography techniques in medical images, a systematic review.- Intrusion Detection in VANETs: A Comparative Study of Machine Learning and Deep Learning Models.- YouTube Video Categorization for Targeted Advertise-ment Recommendations using Machine Learning.- Using Machine Learning Algorithms for Anomalies Detection in Modern Wireless Communication Systems.- Botnet Detection and Classification from Network Traffic Byte Streams using Deep Learning.- Leveraging Users Point of Interest For User Adaptive Video Summarization.
Image Encryption with a Hybrid Chaotic Map for Improved Security.- Detecting Cybersecurity Threats Using Convolutional Neural Networks and Machine Learning.- Emerging cyber threats in the quantum era: from neural hacking to space communication vulnerabilities.- Enhancing network efficiency and optimization : A graph-theoretic approach.- Network Forensics: Techniques, Challenges, and Incident Response.- A Systematic Review of Cloud Security: Architectures, Adoption Challenges, and Emerging Trends.- An Improved Model for Deep Dive Phishing Detection.- BiD-Phish: Bilingual Deep Learning method for Phishing Email Detection for English and Arabic Using CNN and Particle Swarm Optimization.- Steganography techniques in medical images, a systematic review.- Intrusion Detection in VANETs: A Comparative Study of Machine Learning and Deep Learning Models.- YouTube Video Categorization for Targeted Advertise-ment Recommendations using Machine Learning.- Using Machine Learning Algorithms for Anomalies Detection in Modern Wireless Communication Systems.- Botnet Detection and Classification from Network Traffic Byte Streams using Deep Learning.- Leveraging Users Point of Interest For User Adaptive Video Summarization.
Es gelten unsere Allgemeinen Geschäftsbedingungen: www.buecher.de/agb
Impressum
www.buecher.de ist ein Internetauftritt der buecher.de internetstores GmbH
Geschäftsführung: Monica Sawhney | Roland Kölbl | Günter Hilger
Sitz der Gesellschaft: Batheyer Straße 115 - 117, 58099 Hagen
Postanschrift: Bürgermeister-Wegele-Str. 12, 86167 Augsburg
Amtsgericht Hagen HRB 13257
Steuernummer: 321/5800/1497
USt-IdNr: DE450055826