LEADER 03777nam 22007455 450 001 9910919816903321 005 20251113173805.0 010 $a9789819748921 010 $a9819748925 024 7 $a10.1007/978-981-97-4892-1 035 $a(MiAaPQ)EBC31862081 035 $a(Au-PeEL)EBL31862081 035 $a(CKB)37083978600041 035 $a(OCoLC)1493058616 035 $a(DE-He213)978-981-97-4892-1 035 $a(EXLCZ)9937083978600041 100 $a20241227d2024 u| 0 101 0 $aeng 135 $aurcnu|||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aCyber Security and Intelligent Systems $eProceedings of Eighth International Conference on Information System Design and Intelligent Applications (ISDIA 2024), Volume 1 /$fedited by Vikrant Bhateja, Hong Lin, Milan Simic, Muhammad Attique Khan, Harish Garg 205 $a1st ed. 2024. 210 1$aSingapore :$cSpringer Nature Singapore :$cImprint: Springer,$d2024. 215 $a1 online resource (545 pages) 225 1 $aLecture Notes in Networks and Systems,$x2367-3389 ;$v1056 311 08$a9789819748914 311 08$a9819748917 327 $aChapter 1:Leveraging Tech toward Keeping Ahead of Cyber Threats and Alleviating Security Analysts' Alert Fatigue -- Chapter 2:AI-oriented Cybersecurity: Security Intelligence -- chapter 3: Analyzing Research Trends in Cybersecurity Involve-ment of Women: A Bibliometric Approach -- Chapter 4 :Operational Architecture of National QKD Backbone -- Chapter 5:Examinations of Offline Signature Forgery Detection from Classical to Deep Learning Techniques -- Chapter 6:Continuous Buying Process Management -Securities Sales and its Impact on the Company's Financial State -- Chapter 7: Advancing Quantum Federated Learning for Enhanced Privacy in Collaborative Machine Learning Environments. 330 $aThis book presents a collection of high-quality, peer-reviewed research papers from the 8th International Conference on Information System Design and Intelligent Applications (ISDIA 2024), held in Dubai, UAE, from 3-4 January 2024. It covers a wide range of topics in computer science and information technology, including data mining and data warehousing, high-performance computing, parallel and distributed computing, computational intelligence, soft computing, big data, cloud computing, grid computing, cognitive computing, and information security. 410 0$aLecture Notes in Networks and Systems,$x2367-3389 ;$v1056 606 $aComputational intelligence 606 $aMachine learning 606 $aData protection 606 $aTelecommunication 606 $aCooperating objects (Computer systems) 606 $aComputational Intelligence 606 $aMachine Learning 606 $aData and Information Security 606 $aCommunications Engineering, Networks 606 $aCyber-Physical Systems 615 0$aComputational intelligence. 615 0$aMachine learning. 615 0$aData protection. 615 0$aTelecommunication. 615 0$aCooperating objects (Computer systems) 615 14$aComputational Intelligence. 615 24$aMachine Learning. 615 24$aData and Information Security. 615 24$aCommunications Engineering, Networks. 615 24$aCyber-Physical Systems. 676 $a003 700 $aBhateja$b Vikrant$0866314 701 $aLin$b Hong$0939903 701 $aSimic$b Milan$01776905 701 $aAttique Khan$b Muhammad$01781620 701 $aGarg$b Harish$01781621 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910919816903321 996 $aCyber Security and Intelligent Systems$94306460 997 $aUNINA