Cybersecurity and Artificial Intelligence Strategies (eBook, PDF)
Second International Conference, CAIS 2025, Baghdad, Iraq, September 17-18, 2025, Proceedings
Redaktion: Al-Mamory, Safaa O.; Oreku, George S.; Sha, Kewei; Abbas, Haider Hadi; Mahmoud, Mahmoud Shuker; Jamil, Abeer Salim; Sagheer, Ali Makki
72,95 €
72,95 €
inkl. MwSt.
Sofort per Download lieferbar
36 °P sammeln
72,95 €
Als Download kaufen
72,95 €
inkl. MwSt.
Sofort per Download lieferbar
36 °P sammeln
Jetzt verschenken
Alle Infos zum eBook verschenken
72,95 €
inkl. MwSt.
Sofort per Download lieferbar
Alle Infos zum eBook verschenken
36 °P sammeln
Cybersecurity and Artificial Intelligence Strategies (eBook, PDF)
Second International Conference, CAIS 2025, Baghdad, Iraq, September 17-18, 2025, Proceedings
Redaktion: Al-Mamory, Safaa O.; Oreku, George S.; Sha, Kewei; Abbas, Haider Hadi; Mahmoud, Mahmoud Shuker; Jamil, Abeer Salim; Sagheer, Ali Makki
- Format: PDF
- Merkliste
- Auf die Merkliste
- Bewerten Bewerten
- Teilen
- Produkt teilen
- Produkterinnerung
- Produkterinnerung

Bitte loggen Sie sich zunächst in Ihr Kundenkonto ein oder registrieren Sie sich bei
bücher.de, um das eBook-Abo tolino select nutzen zu können.
Hier können Sie sich einloggen
Hier können Sie sich einloggen
Sie sind bereits eingeloggt. Klicken Sie auf 2. tolino select Abo, um fortzufahren.

Bitte loggen Sie sich zunächst in Ihr Kundenkonto ein oder registrieren Sie sich bei bücher.de, um das eBook-Abo tolino select nutzen zu können.
This book constitutes the post-conference proceedings of the Second International Conference on Cybersecurity and Artificial Intelligence Strategies, CAIS 2025 held in Baghdad, Iraq during September 17-18, 2025.
The 23 full papers included in this book were carefully reviewed and selected from 101 submissions. The papers are organized in these topical sections: Security and Privacy; Applied Computing and Computing Methodologies.
- Geräte: PC
- ohne Kopierschutz
- eBook Hilfe
- Größe: 50.51MB
Andere Kunden interessierten sich auch für
ICT for Global Innovations and Solutions (eBook, PDF)128,95 €
Cyber Security, Cryptology, and Machine Learning (eBook, PDF)59,95 €
Jayaraman KalaimaniSAP Project Management Pitfalls (eBook, PDF)43,95 €
Trust Management XI (eBook, PDF)40,95 €
Versatile Cybersecurity (eBook, PDF)128,95 €
Samer Al-KhateebDeviance in Social Media and Social Cyber Forensics (eBook, PDF)48,95 €
Critical Infrastructure Security and Resilience (eBook, PDF)112,95 €-
-
-
This book constitutes the post-conference proceedings of the Second International Conference on Cybersecurity and Artificial Intelligence Strategies, CAIS 2025 held in Baghdad, Iraq during September 17-18, 2025.
The 23 full papers included in this book were carefully reviewed and selected from 101 submissions. The papers are organized in these topical sections: Security and Privacy; Applied Computing and Computing Methodologies.
The 23 full papers included in this book were carefully reviewed and selected from 101 submissions. The papers are organized in these topical sections: Security and Privacy; Applied Computing and Computing Methodologies.
Dieser Download kann aus rechtlichen Gründen nur mit Rechnungsadresse in A, B, BG, CY, CZ, D, DK, EW, E, FIN, F, GR, HR, H, IRL, I, LT, L, LR, M, NL, PL, P, R, S, SLO, SK ausgeliefert werden.
Produktdetails
- Produktdetails
- Verlag: Springer Nature Switzerland
- Seitenzahl: 396
- Erscheinungstermin: 8. November 2025
- Englisch
- ISBN-13: 9783032072443
- Artikelnr.: 75849608
- Verlag: Springer Nature Switzerland
- Seitenzahl: 396
- Erscheinungstermin: 8. November 2025
- Englisch
- ISBN-13: 9783032072443
- Artikelnr.: 75849608
- Herstellerkennzeichnung Die Herstellerinformationen sind derzeit nicht verfügbar.
.- Security and Privacy.
.- An Improved DBSCAN Clustering Algorithm for Bot Detection on Twitter.
.- Anomaly Detection in Blockchain Transactions Using Supervised Machine Learning.
.- Artificial Intelligence Strategies for Advancing Cybersecurity and Intrusion Detection Systems (IDs).
.- BERT-Enhanced Dual-Attention RNN for Short Text Spam Detection.
.- Effective Knowledge Graph Representation for Cybersecurity Using AI-Based X Data and Named Entity Relation Technique .
.- Enhancement of Cybersecurity in AI Services Using Hybrid Homomorphic Encryption.
.- Innovative Neural Network Architecture for Progressive Windows Malware Detection via Adaptive Feature Fusion and Multi-Stage Learning .
.- LiteStegNet: A Lightweight Deep Learning Framework for Video Steganography in IoT-Based Systems.
.- Secure and Workload-Aware Virtual Machine Migration: Enhancing Performance, Energy Efficiency, and Cyber Resilience in Cloud Data Centres.
.- AI-Powered Malware Analysis in Military Cybersecurity: A Deep Learning Approach.
.- Applied Computing.
.- A Modern Software Engineering Approach to UML Class Diagram Evaluation.
.- Advancement in E-marketing Strategy using Support Vector Machine and Apriori Algorithm.
.- Advancing Real-Time Facial Expression Recognition: A Deep Learning-Based Video Stream Analysis.
.- An Enhanced Deep Learning Approach for Writer Identification and Verification Using Corner Detection.
.- Deep Learning Techniques for Predicting Transcription Factor Binding Sites (TFBSs) from DNA Sequencing Data.
.- Dual-Phase Sensor Deployment Using Pelican Optimization Algorithm: A Case Study on Air Pollution Monitoring Baghdad City.
.- Hand Gesture Classification on Custom Abductees-Rescue Dataset using an Optimized LSTM.
.- WLDRD: Dynamic Weighted Load Balancing with Adaptive Request Distribution in Distributed Systems.
.- Computing Methodologies.
.- Design and Implementation of a Handshaking Algorithm for Enhanced Protection of High-Tension Towers in Iraq.
.- DiploNet: A Deep Learning Semantic Segmentation Model for Glaucoma Diagnosis.
.- Summarizing Research Papers with Transformer Models.
.- LESS is more: Guiding LLMs for Formal Requirement and Test Case Generation.
.- Traffic equilibria prediction using inverse reinforcement learning.
.- An Improved DBSCAN Clustering Algorithm for Bot Detection on Twitter.
.- Anomaly Detection in Blockchain Transactions Using Supervised Machine Learning.
.- Artificial Intelligence Strategies for Advancing Cybersecurity and Intrusion Detection Systems (IDs).
.- BERT-Enhanced Dual-Attention RNN for Short Text Spam Detection.
.- Effective Knowledge Graph Representation for Cybersecurity Using AI-Based X Data and Named Entity Relation Technique .
.- Enhancement of Cybersecurity in AI Services Using Hybrid Homomorphic Encryption.
.- Innovative Neural Network Architecture for Progressive Windows Malware Detection via Adaptive Feature Fusion and Multi-Stage Learning .
.- LiteStegNet: A Lightweight Deep Learning Framework for Video Steganography in IoT-Based Systems.
.- Secure and Workload-Aware Virtual Machine Migration: Enhancing Performance, Energy Efficiency, and Cyber Resilience in Cloud Data Centres.
.- AI-Powered Malware Analysis in Military Cybersecurity: A Deep Learning Approach.
.- Applied Computing.
.- A Modern Software Engineering Approach to UML Class Diagram Evaluation.
.- Advancement in E-marketing Strategy using Support Vector Machine and Apriori Algorithm.
.- Advancing Real-Time Facial Expression Recognition: A Deep Learning-Based Video Stream Analysis.
.- An Enhanced Deep Learning Approach for Writer Identification and Verification Using Corner Detection.
.- Deep Learning Techniques for Predicting Transcription Factor Binding Sites (TFBSs) from DNA Sequencing Data.
.- Dual-Phase Sensor Deployment Using Pelican Optimization Algorithm: A Case Study on Air Pollution Monitoring Baghdad City.
.- Hand Gesture Classification on Custom Abductees-Rescue Dataset using an Optimized LSTM.
.- WLDRD: Dynamic Weighted Load Balancing with Adaptive Request Distribution in Distributed Systems.
.- Computing Methodologies.
.- Design and Implementation of a Handshaking Algorithm for Enhanced Protection of High-Tension Towers in Iraq.
.- DiploNet: A Deep Learning Semantic Segmentation Model for Glaucoma Diagnosis.
.- Summarizing Research Papers with Transformer Models.
.- LESS is more: Guiding LLMs for Formal Requirement and Test Case Generation.
.- Traffic equilibria prediction using inverse reinforcement learning.
.- Security and Privacy.
.- An Improved DBSCAN Clustering Algorithm for Bot Detection on Twitter.
.- Anomaly Detection in Blockchain Transactions Using Supervised Machine Learning.
.- Artificial Intelligence Strategies for Advancing Cybersecurity and Intrusion Detection Systems (IDs).
.- BERT-Enhanced Dual-Attention RNN for Short Text Spam Detection.
.- Effective Knowledge Graph Representation for Cybersecurity Using AI-Based X Data and Named Entity Relation Technique .
.- Enhancement of Cybersecurity in AI Services Using Hybrid Homomorphic Encryption.
.- Innovative Neural Network Architecture for Progressive Windows Malware Detection via Adaptive Feature Fusion and Multi-Stage Learning .
.- LiteStegNet: A Lightweight Deep Learning Framework for Video Steganography in IoT-Based Systems.
.- Secure and Workload-Aware Virtual Machine Migration: Enhancing Performance, Energy Efficiency, and Cyber Resilience in Cloud Data Centres.
.- AI-Powered Malware Analysis in Military Cybersecurity: A Deep Learning Approach.
.- Applied Computing.
.- A Modern Software Engineering Approach to UML Class Diagram Evaluation.
.- Advancement in E-marketing Strategy using Support Vector Machine and Apriori Algorithm.
.- Advancing Real-Time Facial Expression Recognition: A Deep Learning-Based Video Stream Analysis.
.- An Enhanced Deep Learning Approach for Writer Identification and Verification Using Corner Detection.
.- Deep Learning Techniques for Predicting Transcription Factor Binding Sites (TFBSs) from DNA Sequencing Data.
.- Dual-Phase Sensor Deployment Using Pelican Optimization Algorithm: A Case Study on Air Pollution Monitoring Baghdad City.
.- Hand Gesture Classification on Custom Abductees-Rescue Dataset using an Optimized LSTM.
.- WLDRD: Dynamic Weighted Load Balancing with Adaptive Request Distribution in Distributed Systems.
.- Computing Methodologies.
.- Design and Implementation of a Handshaking Algorithm for Enhanced Protection of High-Tension Towers in Iraq.
.- DiploNet: A Deep Learning Semantic Segmentation Model for Glaucoma Diagnosis.
.- Summarizing Research Papers with Transformer Models.
.- LESS is more: Guiding LLMs for Formal Requirement and Test Case Generation.
.- Traffic equilibria prediction using inverse reinforcement learning.
.- An Improved DBSCAN Clustering Algorithm for Bot Detection on Twitter.
.- Anomaly Detection in Blockchain Transactions Using Supervised Machine Learning.
.- Artificial Intelligence Strategies for Advancing Cybersecurity and Intrusion Detection Systems (IDs).
.- BERT-Enhanced Dual-Attention RNN for Short Text Spam Detection.
.- Effective Knowledge Graph Representation for Cybersecurity Using AI-Based X Data and Named Entity Relation Technique .
.- Enhancement of Cybersecurity in AI Services Using Hybrid Homomorphic Encryption.
.- Innovative Neural Network Architecture for Progressive Windows Malware Detection via Adaptive Feature Fusion and Multi-Stage Learning .
.- LiteStegNet: A Lightweight Deep Learning Framework for Video Steganography in IoT-Based Systems.
.- Secure and Workload-Aware Virtual Machine Migration: Enhancing Performance, Energy Efficiency, and Cyber Resilience in Cloud Data Centres.
.- AI-Powered Malware Analysis in Military Cybersecurity: A Deep Learning Approach.
.- Applied Computing.
.- A Modern Software Engineering Approach to UML Class Diagram Evaluation.
.- Advancement in E-marketing Strategy using Support Vector Machine and Apriori Algorithm.
.- Advancing Real-Time Facial Expression Recognition: A Deep Learning-Based Video Stream Analysis.
.- An Enhanced Deep Learning Approach for Writer Identification and Verification Using Corner Detection.
.- Deep Learning Techniques for Predicting Transcription Factor Binding Sites (TFBSs) from DNA Sequencing Data.
.- Dual-Phase Sensor Deployment Using Pelican Optimization Algorithm: A Case Study on Air Pollution Monitoring Baghdad City.
.- Hand Gesture Classification on Custom Abductees-Rescue Dataset using an Optimized LSTM.
.- WLDRD: Dynamic Weighted Load Balancing with Adaptive Request Distribution in Distributed Systems.
.- Computing Methodologies.
.- Design and Implementation of a Handshaking Algorithm for Enhanced Protection of High-Tension Towers in Iraq.
.- DiploNet: A Deep Learning Semantic Segmentation Model for Glaucoma Diagnosis.
.- Summarizing Research Papers with Transformer Models.
.- LESS is more: Guiding LLMs for Formal Requirement and Test Case Generation.
.- Traffic equilibria prediction using inverse reinforcement learning.







