LEADER 04592nam 22006495 450 001 9910548184703321 005 20250421110151.0 010 $a3-030-96908-8 024 7 $a10.1007/978-3-030-96908-0 035 $a(MiAaPQ)EBC6896991 035 $a(Au-PeEL)EBL6896991 035 $a(CKB)21325689900041 035 $a(PPN)260829056 035 $a(DE-He213)978-3-030-96908-0 035 $a(EXLCZ)9921325689900041 100 $a20220226d2022 u| 0 101 0 $aeng 135 $aurcnu|||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aCyber Security Intelligence and Analytics $eThe 4th International Conference on Cyber Security Intelligence and Analytics (CSIA 2022), Volume 1 /$fedited by Zheng Xu, Saed Alrabaee, Octavio Loyola-González, Xiaolu Zhang, Niken Dwi Wahyu Cahyani, Nurul Hidayah Ab Rahman 205 $a1st ed. 2022. 210 1$aCham :$cSpringer International Publishing :$cImprint: Springer,$d2022. 215 $a1 online resource (1080 pages) 225 1 $aLecture Notes on Data Engineering and Communications Technologies,$x2367-4520 ;$v123 311 08$aPrint version: Xu, Zheng Cyber Security Intelligence and Analytics Cham : Springer International Publishing AG,c2022 9783030969073 320 $aIncludes bibliographical references and index. 327 $aIntelligent Archives Warehouse Management Based on New Information Technology -- Design and Algorithm of File Management System Based on RFID -- Design of Information System for Accounting File Management Based on Computer Technology -- Substation Cable Laying Schedule Based on GIM 3D Model -- Social Service Management System Based on Logistic Regression Algorithm -- Timing System of Track and Field Competition Based on Data Analysis Algorithm -- Financial Software Perception Function Based on Big Data Intelligent Technology -- Effective Combination of Intelligent Information Technology and Labor Education Data Analysis Algorithms -- Chinese Language and Literature Relational Database Mining Based on Association Rules Algorithm -- Internet Financial News Text Classification Algorithm Based on Blockchain Technology -- Measurement and Change Analysis of Trade Implied Carbon Based on Input-Output Method and SDA Method under Modern Information Technology -- The Application of Big Data in Network Security and Intelligence Analysis -- Macroeconomic Forecast Based on Neural Network Algorithm and Genetic Algorithm -- Intelligent Optical Distribution Technology in Power Communication Transmission -- Intelligent Puncture Equipment in Sampling of Gynecological Tumors -- Design of Environmental Art Optimization System Based on Improved Particle Swarm Optimization Algorithm -- Software-assisted Japanese Phonetic Teaching Based on Phonetic Visualization. 330 $aThis book presents the outcomes of the 2022 4th International Conference on Cyber Security Intelligence and Analytics (CSIA 2022), an international conference dedicated to promoting novel theoretical and applied research advances in the interdisciplinary field of cyber-security, particularly focusing on threat intelligence, analytics, and countering cyber-crime. The conference provides a forum for presenting and discussing innovative ideas, cutting-edge research findings and novel techniques, methods and applications on all aspects of cyber-security intelligence and analytics. Due to COVID-19, authors, keynote speakers and PC committees will attend the conference online. 410 0$aLecture Notes on Data Engineering and Communications Technologies,$x2367-4520 ;$v123 606 $aComputational intelligence 606 $aEngineering$xData processing 606 $aCooperating objects (Computer systems) 606 $aData protection 606 $aComputational Intelligence 606 $aData Engineering 606 $aCyber-Physical Systems 606 $aData and Information Security 615 0$aComputational intelligence. 615 0$aEngineering$xData processing. 615 0$aCooperating objects (Computer systems) 615 0$aData protection. 615 14$aComputational Intelligence. 615 24$aData Engineering. 615 24$aCyber-Physical Systems. 615 24$aData and Information Security. 676 $a005.8 676 $a005.8 702 $aXu$b Zheng$c(Of Shanghai da xue) 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910548184703321 996 $aCyber security intelligence and analytics$91895724 997 $aUNINA