04059nam 2200505 450 991068648250332120230731000325.03-031-29097-610.1007/978-3-031-29097-8(CKB)5840000000241878(DE-He213)978-3-031-29097-8(MiAaPQ)EBC7236677(Au-PeEL)EBL7236677(PPN)26965805X(EXLCZ)99584000000024187820230731d2023 uy 0engurnn|008mamaatxtrdacontentcrdamediacrrdacarrierTenth International Conference on Applications and Techniques in Cyber Intelligence (ICATCI 2022)Volume 1 /Jemal H. Abawajy [and three others], editorsFirst edition.Cham, Switzerland :Springer,[2023]©20231 online resource (XXIII, 1024 p. 341 illus., 230 illus. in color.) Lecture Notes on Data Engineering and Communications Technologies Series ;Volume 1703-031-29096-8 Includes bibliographical references and index.TOPSIS Model Establishment in the Context of Internet Finance -- An Analysis of Internet Financial Risk Prevention Strategies from the Perspective of Network Security -- Prediction of Transaction Risk in Financial Market Based on Neural Network Model -- Intelligent Business Model Data Analysis Based on Particle Swarm Optimization -- Multi-dimensional Data Perception and Intelligent Analysis Framework Design of Management Information System -- Resource Transaction Management System Based on PageRank Algorithm -- Research on Intelligent Student Management Evaluation Information System Based on Data Mining Algorithm -- Purchasing Management System Based on Genetic Algorithm -- Credit Risk Prediction Model of Digital Rural Finance Based on PSO-SVM -- Cache High Availability Intelligent Stall Management System Based on Redis Sentinel Mechanism Architecture -- The Application of BIM Technology in the Construction of Project Construction Management Platform -- Innovation of Financing Mode for Small and Micro Enterprises on Digital Finance Technology Algorithm -- Coal Energy Management Estimation System Based on Artificial Intelligence Algorithm -- Establishment of Enterprise Management Information System Based on Big Data Information Technology -- Application Analysis of Intelligent Information Technology in Transaction Management System -- Design of Management Cloud Information System for Residential Buildings Based on High-Performance Computing and Face Recognition Technology -- Development of Student Management System Based on WeChat Public Platform -- Application of Artificial Intelligence Technology in Human Resource Delicacy Management System -- Application of Data Mining Technology (DMT) in Human Resources Assessment Management System.This book presents innovative ideas, cutting-edge findings, and novel techniques, methods, and applications in a broad range of cybersecurity and cyberthreat intelligence areas. As our society becomes smarter, there is a corresponding need to secure our cyberfuture. The book describes approaches and findings that are of interest to business professionals and governments seeking to secure our data and underpin infrastructures, as well as to individual users.Lecture notes on data engineering and communications technologies ;Volume 170.Cyber intelligence (Computer security)Cyber intelligence (Computer security)CongressesCyber intelligence (Computer security)Cyber intelligence (Computer security)005.8Abawajy Jemal H.1982-MiAaPQMiAaPQMiAaPQBOOK9910686482503321Tenth International Conference on Applications and Techniques in Cyber Intelligence (ICATCI 2022)3089389UNINA