Atjaunināt sīkdatņu piekrišanu

E-grāmata: International Joint Conferences: 17th International Conference on Computational Intelligence in Security for Information Systems (CISIS 2024) and 15th International Conference on European Transnational Education (ICEUTE 2024)

  • Formāts - EPUB+DRM
  • Cena: 166,55 €*
  • * ši ir gala cena, t.i., netiek piemērotas nekādas papildus atlaides
  • Ielikt grozā
  • Pievienot vēlmju sarakstam
  • Šī e-grāmata paredzēta tikai personīgai lietošanai. E-grāmatas nav iespējams atgriezt un nauda par iegādātajām e-grāmatām netiek atmaksāta.

DRM restrictions

  • Kopēšana (kopēt/ievietot):

    nav atļauts

  • Drukāšana:

    nav atļauts

  • Lietošana:

    Digitālo tiesību pārvaldība (Digital Rights Management (DRM))
    Izdevējs ir piegādājis šo grāmatu šifrētā veidā, kas nozīmē, ka jums ir jāinstalē bezmaksas programmatūra, lai to atbloķētu un lasītu. Lai lasītu šo e-grāmatu, jums ir jāizveido Adobe ID. Vairāk informācijas šeit. E-grāmatu var lasīt un lejupielādēt līdz 6 ierīcēm (vienam lietotājam ar vienu un to pašu Adobe ID).

    Nepieciešamā programmatūra
    Lai lasītu šo e-grāmatu mobilajā ierīcē (tālrunī vai planšetdatorā), jums būs jāinstalē šī bezmaksas lietotne: PocketBook Reader (iOS / Android)

    Lai lejupielādētu un lasītu šo e-grāmatu datorā vai Mac datorā, jums ir nepieciešamid Adobe Digital Editions (šī ir bezmaksas lietotne, kas īpaši izstrādāta e-grāmatām. Tā nav tas pats, kas Adobe Reader, kas, iespējams, jau ir jūsu datorā.)

    Jūs nevarat lasīt šo e-grāmatu, izmantojot Amazon Kindle.

This volume of Lecture Notes in Networks and Systems contains accepted papers presented at the 17th International Conference on Computational Intelligence in Security for Information Systems (CISIS 2024) and the 15th International Conference on EUropean Transnational Education (ICEUTE 2024), which were held in the beautiful city of Salamanca, Spain, in October 2024.





The aim of the CISIS 2024 conference is to offer a meeting opportunity for academic and industry-related researchers belonging to the various vast communities of Computational Intelligence, Information Security, and Data Mining. The need for intelligent, flexible behavior by large, complex systems, especially in mission-critical domains, is intended to be the catalyst and the aggregation stimulus for the overall event.





After peer review, the CISIS 2024 International Program Committee selected 24 papers for publication in these conference proceedings. In this edition, one special session was organized: Artificial Intelligence for Protecting the Internet of Things.





The aim of ICEUTE 2024 conference is to offer a stimulating and fruitful meeting point for people working on transnational education within Europe. It provides an exciting forum for presenting and discussing the latest works and advances in transnational education within European countries. In the case of ICEUTE 2024, the International Program Committee selected nine papers, which are also published in these conference proceedings.





The selection of papers was extremely rigorous to maintain the high quality of the conferences. We deeply appreciate the hard work and dedication of the members of the Program Committees during the reviewing process. Their contributions are integral to the creation of a high-standard conference; the CISIS and ICEUTE conferences would not exist without their help.

.- Part I CISIS Applications.

.
Chapter 1 Blockchain-based random selection among a private number of candidates.

.
Chapter 2 A timeline and analysis of recent Bitcoin money-laundering detection methods.

.
Chapter 3 An approach based on LLMs for forensic threat detection in autonomous systems.

.
Chapter 4 Smart water meter network anomaly and failure detection system.

.
Chapter 5 Design and Implementation of a Fast, Platform-Adaptive, AIS-20/31 Compliant PLL-Based True Random Number Generator on a Zynq 7020 SoC FPGA.

.
Chapter 6 A Comparison of Frameworks for Heterogeneous Computing Using High-Performance Pattern-Matching for DNA Biometrics and Digital Forensics.

.
Chapter 7 Fuzzing Robotic Software using HPC and LLM.

.
Chapter 8 Performance Impact of Strengthening the Accountability and Explainability System in Autonomous Robots, etc.