Safe, Secure, Ethical, Responsible Technologies and Emerging Applications
Second EAI International Conference, SAFER-TEA 2024, Dubai, United Arab Emirates, December 9-10, 2024, Proceedings
Herausgegeben:Fachkha, Claude; Fung, Benjamin C. M.; Tchakounté, Franklin
Safe, Secure, Ethical, Responsible Technologies and Emerging Applications
Second EAI International Conference, SAFER-TEA 2024, Dubai, United Arab Emirates, December 9-10, 2024, Proceedings
Herausgegeben:Fachkha, Claude; Fung, Benjamin C. M.; Tchakounté, Franklin
- Broschiertes Buch
- Merkliste
- Auf die Merkliste
- Bewerten Bewerten
- Teilen
- Produkt teilen
- Produkterinnerung
- Produkterinnerung
This book constitutes the refereed proceedings of the Second EAI International Conference on Safe, Secure, Ethical, Responsible Technologies and Emerging Applications, SAFER-TEA 2024, held in Dubai, United Arab Emirates, during December 9 10, 2024.
The 17 full papers included in this book were carefully reviewed and selected from 50 submissions. They were organized in topical sections as follows: Networking and Security; Artificial Intelligence risks and regulations; Technologies and Social Impact; and Investigations.
Andere Kunden interessierten sich auch für
Safe, Secure, Ethical, Responsible Technologies and Emerging Applications68,99 €
Cyber Security, Cryptology, and Machine Learning50,99 €
Security and Trust Management49,99 €
Security Protocols XXV38,99 €
Critical Information Infrastructures Security38,99 €
Deep Sciences for Computing and Communications68,99 €
Deep Sciences for Computing and Communications68,99 €-
-
-
This book constitutes the refereed proceedings of the Second EAI International Conference on Safe, Secure, Ethical, Responsible Technologies and Emerging Applications, SAFER-TEA 2024, held in Dubai, United Arab Emirates, during December 9 10, 2024.
The 17 full papers included in this book were carefully reviewed and selected from 50 submissions. They were organized in topical sections as follows: Networking and Security; Artificial Intelligence risks and regulations; Technologies and Social Impact; and Investigations.
The 17 full papers included in this book were carefully reviewed and selected from 50 submissions. They were organized in topical sections as follows: Networking and Security; Artificial Intelligence risks and regulations; Technologies and Social Impact; and Investigations.
Produktdetails
- Produktdetails
- Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Enginee
- Verlag: Springer / Springer Nature Switzerland / Springer, Berlin
- Artikelnr. des Verlages: 978-3-032-05831-7
- Seitenzahl: 328
- Erscheinungstermin: 2. Oktober 2025
- Englisch
- Abmessung: 235mm x 155mm x 18mm
- Gewicht: 499g
- ISBN-13: 9783032058317
- ISBN-10: 3032058317
- Artikelnr.: 75154284
- Herstellerkennzeichnung
- Springer-Verlag GmbH
- Tiergartenstr. 17
- 69121 Heidelberg
- ProductSafety@springernature.com
- Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Enginee
- Verlag: Springer / Springer Nature Switzerland / Springer, Berlin
- Artikelnr. des Verlages: 978-3-032-05831-7
- Seitenzahl: 328
- Erscheinungstermin: 2. Oktober 2025
- Englisch
- Abmessung: 235mm x 155mm x 18mm
- Gewicht: 499g
- ISBN-13: 9783032058317
- ISBN-10: 3032058317
- Artikelnr.: 75154284
- Herstellerkennzeichnung
- Springer-Verlag GmbH
- Tiergartenstr. 17
- 69121 Heidelberg
- ProductSafety@springernature.com
.- Networking and Security.
.- AI and Security in Remote Sensing: An Overview of Data and Learning Attacks and Mitigation Measures.
.- Emerging Cyber-Security Techniques for Unmanned Aerial Vehicles.
.- Estimating the Carbon Footprint of Cyberattacks: The Ransomware Case.
.- An Analysis of Effects of Spatial Features on Time and Origin Based Scheduling Decisions.
.- Artificial Intelligence risks and regulations.
.- SafeText: A Unified Approach for Detecting and Mitigating Toxicity and Bias in Textual Data.
.- Towards Trust Requirements as Basis to Model Explainable AI Computations.
.- Navigating Legal Frontiers in the Metaverse: Evaluating UAE s Legislative Frameworks and Stakeholder Perspectives.
.- Time Series Forecasting using LSTM model as sequential ensemble method.
.- Technologies and Social Impact.
.- From Chaos to Clarity: Improving Disaster Databases for Effective Management.
.- Factors Hindering Indigenous Fulani Women from Benefiting from Islamic Banks Financial Inclusion Program in Northern Nigeria.
.- A Dissection of Factors Influencing Face Recognition Technologies.
.- Integrating AI and Social Responsibility in Portfolio Optimization: A Study with Evolutionary Algorithms.
.- The Financial Toll of Social Media Usage: An Investigative Study.
.- The Impact of Drawing Memory on Cognitive Development in Children with Autism Spectrum Disorder.
.- Investigations.
.- A Review about Blockchain-Based Decentralized Identity Management for Citizen Identification.
.- A Survey on the Development of Machine Learning and Artificial Intelligence Techniques in Digital Forensics.
.- A Comprehensive Review of Online Gaming: Trends, Impacts, and Future Opportunities.
.- AI and Security in Remote Sensing: An Overview of Data and Learning Attacks and Mitigation Measures.
.- Emerging Cyber-Security Techniques for Unmanned Aerial Vehicles.
.- Estimating the Carbon Footprint of Cyberattacks: The Ransomware Case.
.- An Analysis of Effects of Spatial Features on Time and Origin Based Scheduling Decisions.
.- Artificial Intelligence risks and regulations.
.- SafeText: A Unified Approach for Detecting and Mitigating Toxicity and Bias in Textual Data.
.- Towards Trust Requirements as Basis to Model Explainable AI Computations.
.- Navigating Legal Frontiers in the Metaverse: Evaluating UAE s Legislative Frameworks and Stakeholder Perspectives.
.- Time Series Forecasting using LSTM model as sequential ensemble method.
.- Technologies and Social Impact.
.- From Chaos to Clarity: Improving Disaster Databases for Effective Management.
.- Factors Hindering Indigenous Fulani Women from Benefiting from Islamic Banks Financial Inclusion Program in Northern Nigeria.
.- A Dissection of Factors Influencing Face Recognition Technologies.
.- Integrating AI and Social Responsibility in Portfolio Optimization: A Study with Evolutionary Algorithms.
.- The Financial Toll of Social Media Usage: An Investigative Study.
.- The Impact of Drawing Memory on Cognitive Development in Children with Autism Spectrum Disorder.
.- Investigations.
.- A Review about Blockchain-Based Decentralized Identity Management for Citizen Identification.
.- A Survey on the Development of Machine Learning and Artificial Intelligence Techniques in Digital Forensics.
.- A Comprehensive Review of Online Gaming: Trends, Impacts, and Future Opportunities.
.- Networking and Security.
.- AI and Security in Remote Sensing: An Overview of Data and Learning Attacks and Mitigation Measures.
.- Emerging Cyber-Security Techniques for Unmanned Aerial Vehicles.
.- Estimating the Carbon Footprint of Cyberattacks: The Ransomware Case.
.- An Analysis of Effects of Spatial Features on Time and Origin Based Scheduling Decisions.
.- Artificial Intelligence risks and regulations.
.- SafeText: A Unified Approach for Detecting and Mitigating Toxicity and Bias in Textual Data.
.- Towards Trust Requirements as Basis to Model Explainable AI Computations.
.- Navigating Legal Frontiers in the Metaverse: Evaluating UAE s Legislative Frameworks and Stakeholder Perspectives.
.- Time Series Forecasting using LSTM model as sequential ensemble method.
.- Technologies and Social Impact.
.- From Chaos to Clarity: Improving Disaster Databases for Effective Management.
.- Factors Hindering Indigenous Fulani Women from Benefiting from Islamic Banks Financial Inclusion Program in Northern Nigeria.
.- A Dissection of Factors Influencing Face Recognition Technologies.
.- Integrating AI and Social Responsibility in Portfolio Optimization: A Study with Evolutionary Algorithms.
.- The Financial Toll of Social Media Usage: An Investigative Study.
.- The Impact of Drawing Memory on Cognitive Development in Children with Autism Spectrum Disorder.
.- Investigations.
.- A Review about Blockchain-Based Decentralized Identity Management for Citizen Identification.
.- A Survey on the Development of Machine Learning and Artificial Intelligence Techniques in Digital Forensics.
.- A Comprehensive Review of Online Gaming: Trends, Impacts, and Future Opportunities.
.- AI and Security in Remote Sensing: An Overview of Data and Learning Attacks and Mitigation Measures.
.- Emerging Cyber-Security Techniques for Unmanned Aerial Vehicles.
.- Estimating the Carbon Footprint of Cyberattacks: The Ransomware Case.
.- An Analysis of Effects of Spatial Features on Time and Origin Based Scheduling Decisions.
.- Artificial Intelligence risks and regulations.
.- SafeText: A Unified Approach for Detecting and Mitigating Toxicity and Bias in Textual Data.
.- Towards Trust Requirements as Basis to Model Explainable AI Computations.
.- Navigating Legal Frontiers in the Metaverse: Evaluating UAE s Legislative Frameworks and Stakeholder Perspectives.
.- Time Series Forecasting using LSTM model as sequential ensemble method.
.- Technologies and Social Impact.
.- From Chaos to Clarity: Improving Disaster Databases for Effective Management.
.- Factors Hindering Indigenous Fulani Women from Benefiting from Islamic Banks Financial Inclusion Program in Northern Nigeria.
.- A Dissection of Factors Influencing Face Recognition Technologies.
.- Integrating AI and Social Responsibility in Portfolio Optimization: A Study with Evolutionary Algorithms.
.- The Financial Toll of Social Media Usage: An Investigative Study.
.- The Impact of Drawing Memory on Cognitive Development in Children with Autism Spectrum Disorder.
.- Investigations.
.- A Review about Blockchain-Based Decentralized Identity Management for Citizen Identification.
.- A Survey on the Development of Machine Learning and Artificial Intelligence Techniques in Digital Forensics.
.- A Comprehensive Review of Online Gaming: Trends, Impacts, and Future Opportunities.







