| |
|
|
|
|
|
|
|
|
1. |
Record Nr. |
UNINA9911046550103321 |
|
|
Autore |
Bhateja Vikrant |
|
|
Titolo |
Information System Design: Communication Networks and Internet of Things : Proceedings of Ninth International Conference on Information System Design and Intelligent Applications (ISDIA 2025), Volume 2 / / edited by Vikrant Bhateja, Zeenath Reza Khan, Milan Simic, Dilip Kumar Sharma |
|
|
|
|
|
|
|
Pubbl/distr/stampa |
|
|
Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2026 |
|
|
|
|
|
|
|
ISBN |
|
|
|
|
|
|
Edizione |
[1st ed. 2026.] |
|
|
|
|
|
Descrizione fisica |
|
1 online resource (706 pages) |
|
|
|
|
|
|
Collana |
|
Lecture Notes in Networks and Systems, , 2367-3389 ; ; 1538 |
|
|
|
|
|
|
Disciplina |
|
|
|
|
|
|
Soggetti |
|
Computational intelligence |
Artificial intelligence |
Telecommunication |
Computational Intelligence |
Artificial Intelligence |
Communications Engineering, Networks |
|
|
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
Nota di contenuto |
|
Image Encryption with a Hybrid Chaotic Map for Improved Security -- Detecting Cybersecurity Threats Using Convolutional Neural Networks and Machine Learning -- Emerging cyber threats in the quantum era: from neural hacking to space communication vulnerabilities -- Enhancing network efficiency and optimization : A graph-theoretic approach -- Network Forensics: Techniques, Challenges, and Incident Response -- A Systematic Review of Cloud Security: Architectures, Adoption Challenges, and Emerging Trends -- An Improved Model for Deep Dive Phishing Detection -- BiD-Phish: Bilingual Deep Learning method for Phishing Email Detection for English and Arabic Using CNN and Particle Swarm Optimization -- Steganography techniques in medical images, a systematic review -- Intrusion Detection in VANETs: A Comparative Study of Machine Learning and Deep Learning Models -- YouTube Video Categorization for Targeted Advertise-ment Recommendations using Machine Learning -- Using Machine Learning |
|
|
|
|
|
|
|
|
|
|
|
Algorithms for Anomalies Detection in Modern Wireless Communication Systems -- Botnet Detection and Classification from Network Traffic Byte Streams using Deep Learning -- Leveraging Users’ Point of “Interest” For User Adaptive Video Summarization. |
|
|
|
|
|
|
Sommario/riassunto |
|
This book presents a collection of high-quality, peer-reviewed research papers from 9th International Conference on Information System Design and Intelligent Applications (ISDIA 2025), held in Dubai, UAE, from 3–4 January 2025. It covers a wide range of topics in computer science and information technology, including data mining and data warehousing, high-performance computing, parallel and distributed computing, computational intelligence, soft computing, big data, cloud computing, grid computing, cognitive computing, and information security. |
|
|
|
|
|
|
|
| |