LEADER 04630nam 22006495 450 001 9910720062103321 005 20251113185709.0 010 $a9783031317750$b(electronic bk.) 010 $z9783031317743 024 7 $a10.1007/978-3-031-31775-0 035 $a(MiAaPQ)EBC7243103 035 $a(Au-PeEL)EBL7243103 035 $a(DE-He213)978-3-031-31775-0 035 $a(OCoLC)1378107142 035 $a(PPN)269658068 035 $a(CKB)26540748600041 035 $a(EXLCZ)9926540748600041 100 $a20230429d2023 u| 0 101 0 $aeng 135 $aurcnu|||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aCyber Security Intelligence and Analytics $eThe 5th International Conference on Cyber Security Intelligence and Analytics (CSIA 2023), Volume 2 /$fedited by Zheng Xu, Saed Alrabaee, Octavio Loyola-González, Niken Dwi Wahyu Cahyani, Nurul Hidayah Ab Rahman 205 $a1st ed. 2023. 210 1$aCham :$cSpringer Nature Switzerland :$cImprint: Springer,$d2023. 215 $a1 online resource (599 pages) 225 1 $aLecture Notes on Data Engineering and Communications Technologies,$x2367-4520 ;$v173 311 08$aPrint version: Xu, Zheng Cyber Security Intelligence and Analytics Cham : Springer,c2023 9783031317743 320 $aIncludes bibliographical references and index. 327 $aEcological Balance Construction and Optimization Strategy Based on Intelligent Optimization Algorithm -- The Design of Virtual Reality Systems for Metaverse Scenarios -- Design and Development of Health Data Platform for Home-Based Elderly Care Based on AAL -- Logistics Distribution Optimization System of Cross-border e-Commerce Platform based on Bayes-BP Algorithm -- Application of FCM Clustering Algorithm in Digital Library Management System -- Logistics Distribution Path Planning and Design based on Ant Colony Optimization Algorithm -- The Development of Power Grid Digital Infrastructure Based on Fuzzy Comprehensive Evaluation -- Virtual Reality Technology in Indoor Environment Art Design -- Application of Digital Virtual Art in 3D Film Animation Design Effect -- Digital Media Art and Visual Communication Design Method Under Computer Technology -- Instrumentation Automation Control System Based on HSV Space and Genetic Algorithm -- Biological Tissue Detection System Based on Improved Optimization Algorithm -- Application of Computer Network Security Technology in Software Development -- The Application of Financial Technology in the Intelligent Management of Credit Risk under the Background of Big Data -- Measurement and Prediction of Carbon Sequestration Capacity Based on Random Forest Algorithm. 330 $aThis book provides the proceedings of the 5th International Conference on Cyber Security Intelligence and Analytics. The 5th International Conference on Cyber Security Intelligence and Analytics (CSIA 2023) is an international conference dedicated to promoting novel theoretical and applied research advances in the interdisciplinary agenda of cyber security, particularly focusing on threat intelligence and analytics and countering cybercrime. Cyber security experts, including those in data analytics, incident response and digital forensics, need to be able to rapidly detect, analyze and defend against a diverse range of cyber threats in near real-time conditions. We are organizing the CSIA 2023 at Radisson Blu Shanghai Pudong Jinqiao Hotel. It will feature a technical program of refereed papers selected by the international program committee, keynote address. 410 0$aLecture Notes on Data Engineering and Communications Technologies,$x2367-4520 ;$v173 606 $aComputational intelligence 606 $aEngineering$xData processing 606 $aCooperating objects (Computer systems) 606 $aData protection 606 $aComputational Intelligence 606 $aData Engineering 606 $aCyber-Physical Systems 606 $aData and Information Security 615 0$aComputational intelligence. 615 0$aEngineering$xData processing. 615 0$aCooperating objects (Computer systems) 615 0$aData protection. 615 14$aComputational Intelligence. 615 24$aData Engineering. 615 24$aCyber-Physical Systems. 615 24$aData and Information Security. 676 $a005.8 702 $aXu$b Zheng$c(Of Shanghai da xue) 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 912 $a9910720062103321 996 $aCyber security intelligence and analytics$91895724 997 $aUNINA LEADER 03738nam 22006615 450 001 9910743688603321 005 20251225203800.0 010 $a9783031424410 010 $a3031424417 024 7 $a10.1007/978-3-031-42441-0 035 $a(MiAaPQ)EBC30723343 035 $a(Au-PeEL)EBL30723343 035 $a(DE-He213)978-3-031-42441-0 035 $a(PPN)27226038X 035 $a(CKB)28104032100041 035 $a(OCoLC)1396167243 035 $a(EXLCZ)9928104032100041 100 $a20230829d2023 u| 0 101 0 $aeng 135 $aurcnu|||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aFundamentals of Software Engineering $e10th International Conference, FSEN 2023, Tehran, Iran, May 4-5, 2023, Revised Selected Papers /$fedited by Hossein Hojjat, Erika Ábrahám 205 $a1st ed. 2023. 210 1$aCham :$cSpringer Nature Switzerland :$cImprint: Springer,$d2023. 215 $a1 online resource (168 pages) 225 1 $aLecture Notes in Computer Science,$x1611-3349 ;$v14155 311 08$aPrint version: Hojjat, Hossein Fundamentals of Software Engineering Cham : Springer,c2023 9783031424403 327 $aStructured specification of paraconsistent transition systems -- Towards a Basic Theory for Partial Differentiation in the Prototype Verification System -- Case studies of development of verified programs with Dafny for accessibility assessment -- TPGen: A Self-Stabilizing GPU-Based Method for Test and Prime Paths Generation -- An Optimised Complete Strategy for Testing Symbolic Finite State Machines -- Afra: An Eclipse-Based Tool with Extensible Architecture for Modeling and Model Checking of Rebeca Family Models -- Interaction-based Offline Runtime Verification of Distributed Systems -- Genetic Algorithm for Program Synthesis -- Property-Based Conjecturing for Automated Induction in Isabelle/HOL -- Verification of the busy-forbidden protocol -- kProp: Multi-Neuron Relaxation Method for Neural Network Robustness Verification. 330 $aThis book constitutes the thoroughly refereed post-conference proceedings of the 10th International Conference on Fundamentals of Software Engineering, FSEN 2023, held Tehran, Iran in May 4-5, 2023. The 9 full papers and 2 short papers presented in this volume were carefully reviewed and selected from 19 submissions. The topics of interest in FSEN span over all aspects of formal methods, especially those related to advancing the application of formal methods in the software industry and promoting their integration with practical engineering techniques. The papers are organized in topical sections on coordination, logic, networks, parallel computation, and testing. 410 0$aLecture Notes in Computer Science,$x1611-3349 ;$v14155 606 $aSoftware engineering 606 $aMicroprogramming 606 $aComputer networks 606 $aComputer science 606 $aSoftware Engineering 606 $aControl Structures and Microprogramming 606 $aComputer Communication Networks 606 $aTheory of Computation 615 0$aSoftware engineering. 615 0$aMicroprogramming. 615 0$aComputer networks. 615 0$aComputer science. 615 14$aSoftware Engineering. 615 24$aControl Structures and Microprogramming. 615 24$aComputer Communication Networks. 615 24$aTheory of Computation. 676 $a005.1 700 $aHojjat$b Hossein$0905425 701 $aA?braha?m$b Erika$00 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910743688603321 996 $aFundamentals of Software Engineering$93552029 997 $aUNINA