LEADER 00893oam 2200301zu 450 001 996199928503316 005 20210807000229.0 035 $a(CKB)1000000000021889 035 $a(SSID)ssj0000558815 035 $a(PQKBManifestationID)12208262 035 $a(PQKBTitleCode)TC0000558815 035 $a(PQKBWorkID)10565666 035 $a(PQKB)11373815 035 $a(EXLCZ)991000000000021889 100 $a20160829d2004 uy 101 0 $aeng 181 $ctxt 182 $cc 183 $acr 200 10$aSoftware Engineering and Formal Methods 210 31$a[Place of publication not identified]$cIEEE Computer Society Press$d2004 300 $aBibliographic Level Mode of Issuance: Monograph 311 $a0-7695-2222-X 801 0$bPQKB 906 $aPROCEEDING 912 $a996199928503316 996 $aSoftware Engineering and Formal Methods$92077897 997 $aUNISA LEADER 04688nam 22006375 450 001 9911047797403321 005 20251001130602.0 010 $a3-032-05832-5 024 7 $a10.1007/978-3-032-05832-4 035 $a(CKB)41521067800041 035 $a(MiAaPQ)EBC32323207 035 $a(Au-PeEL)EBL32323207 035 $a(DE-He213)978-3-032-05832-4 035 $a(EXLCZ)9941521067800041 100 $a20251001d2026 u| 0 101 0 $aeng 135 $aur||||||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aSafe, Secure, Ethical, Responsible Technologies and Emerging Applications $eSecond EAI International Conference, SAFER-TEA 2024, Dubai, United Arab Emirates, December 9?10, 2024, Proceedings /$fedited by Claude Fachkha, Benjamin C. M. Fung, Franklin Tchakounté 205 $a1st ed. 2026. 210 1$aCham :$cSpringer Nature Switzerland :$cImprint: Springer,$d2026. 215 $a1 online resource (432 pages) 225 1 $aLecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering,$x1867-822X ;$v654 311 08$a3-032-05831-7 327 $a -- Networking and Security. -- AI and Security in Remote Sensing: An Overview of Data and Learning Attacks and Mitigation Measures. -- Emerging Cyber-Security Techniques for Unmanned Aerial Vehicles. -- Estimating the Carbon Footprint of Cyberattacks: The Ransomware Case. -- An Analysis of Effects of Spatial Features on Time and Origin Based Scheduling Decisions. -- Artificial Intelligence risks and regulations. -- SafeText: A Unified Approach for Detecting and Mitigating Toxicity and Bias in Textual Data. -- Towards Trust Requirements as Basis to Model Explainable AI Computations. -- Navigating Legal Frontiers in the Metaverse: Evaluating UAE?s Legislative Frameworks and Stakeholder Perspectives. -- Time Series Forecasting using LSTM model as sequential ensemble method. -- Technologies and Social Impact. -- From Chaos to Clarity: Improving Disaster Databases for Effective Management. -- Factors Hindering Indigenous Fulani Women from Benefiting from Islamic Banks? Financial Inclusion Program in Northern Nigeria. -- A Dissection of Factors Influencing Face Recognition Technologies. -- Integrating AI and Social Responsibility in Portfolio Optimization: A Study with Evolutionary Algorithms. -- The Financial Toll of Social Media Usage: An Investigative Study. -- The Impact of Drawing Memory on Cognitive Development in Children with Autism Spectrum Disorder. -- Investigations. -- A Review about Blockchain-Based Decentralized Identity Management for Citizen Identification. -- A Survey on the Development of Machine Learning and Artificial Intelligence Techniques in Digital Forensics. -- A Comprehensive Review of Online Gaming: Trends, Impacts, and Future Opportunities. 330 $aThis book constitutes the refereed proceedings of the Second EAI International Conference on Safe, Secure, Ethical, Responsible Technologies and Emerging Applications, SAFER-TEA 2024, held in Dubai, United Arab Emirates, during December 9?10, 2024. The 17 full papers included in this book were carefully reviewed and selected from 50 submissions. They were organized in topical sections as follows: Networking and Security; Artificial Intelligence risks and regulations; Technologies and Social Impact; and Investigations. 410 0$aLecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering,$x1867-822X ;$v654 606 $aComputer networks$xSecurity measures 606 $aApplication software 606 $aData protection 606 $aComputer networks 606 $aMobile and Network Security 606 $aComputer and Information Systems Applications 606 $aData and Information Security 606 $aComputer Communication Networks 615 0$aComputer networks$xSecurity measures. 615 0$aApplication software. 615 0$aData protection. 615 0$aComputer networks. 615 14$aMobile and Network Security. 615 24$aComputer and Information Systems Applications. 615 24$aData and Information Security. 615 24$aComputer Communication Networks. 676 $a005.8 700 $aFachkha$b Claude$01864373 701 $aFung$b Benjamin C. M$01253246 701 $aTchakounté$b Franklin$01765396 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9911047797403321 996 $aSafe, Secure, Ethical, Responsible Technologies and Emerging Applications$94471189 997 $aUNINA