Buch, Englisch, Band 2300, 454 Seiten, Format (B × H): 155 mm x 235 mm, Gewicht: 709 g
43rd IBIMA Conference, IBIMA-AI 2024, Madrid, Spain, June 26-27, 2024, Revised Selected Papers, Part-II
Buch, Englisch, Band 2300, 454 Seiten, Format (B × H): 155 mm x 235 mm, Gewicht: 709 g
Reihe: Communications in Computer and Information Science
ISBN: 978-3-031-79085-0
Verlag: Springer Nature Switzerland
The two-volume proceedings set CCIS 2299 and 2300, constitutes the refereed proceedings of the 43rd IBIMA Conference on Artificial intelligence and Machine Learning, IBIMA-AI 2024, held in Madrid, Spain, in June 26–27, 2024.
The 44 full papers and 18 short papers included in this book were carefully reviewed and selected from 119 submissions. They were organized in topical sections as follows:
Part I:Artificial Intelligence and Machine Learning; Information Systems and Communications Technologies.
Part II: Artificial Intelligence and Machine Learning ; Software Engineering; Computer Security and Privacy.
Zielgruppe
Research
Autoren/Hrsg.
Weitere Infos & Material
.- Software Engineering.
.- Access Control Mechanisms in Java Applications.
.- An evaluative study comparing the performance of RESTful Web APIs created with .NET and Java Spring Boot.
.- Implementation Of a Model for Employee Evaluation on The Base of Open-Source Tools: The Case of Libre Office Base.
.- Model based approach for building dynamic UI with SPA.
.- Scheduling User Acceptance Tests from A Process Perspective.
.- Software Development Process Analysis – Ishikawa Diagram – Case Study.
.- E-Learning Platform to Asynchrony/Leak Recognition and Elimination Using Simulation Model of Lung Mechanical Ventilation.
.- Computer Security and Privacy.
.- A Review of a Website Phishing Detection Taxonomy.
.- A Survey of Challenges in Dark Web Crawling: Technical, Security, and Ethical Perspective.
.- Blockchain-Based Access Control in Smart Manufacturing as An Industrial Application: A Systematic Literature Review.
.- Detection of Cryptographic Functions Within Binary Executable Ransomware Files.
.- Exploring Blockchain's Influence on Illicit Practices: A Comprehensive Analysis.
.- Performance Comparison of Programming Interfaces for Microservices Architecture.
.- Ransomware Defense Strategies Using Cyber Threat Intelligence: A Case Study of a Saudi Organization.
.- The Effectiveness of the Tools Used in Risk Management Regarding the Security of Local Military Networks.
.- Use of the System Event Register to Assess the Security Level of The IT System.




