Contributions Presented at The International Conference on Computing, Communication, Cybersecurity and AI, July 3–4, 2024, London, UK The C3AI 2024 /

Bibliographic Details
Corporate Author: SpringerLink (Online service)
Other Authors: Naik, Nitin (Editor), Jenkins, Paul (Editor), Prajapat, Shaligram (Editor), Grace, Paul (Editor)
Summary:IX, 826 p. 335 illus., 280 illus. in color.
text
Language:English
Published: Cham : Springer Nature Switzerland : Imprint: Springer, 2024.
Edition:1st ed. 2024.
Series:Lecture Notes in Networks and Systems, 884
Subjects:
Online Access:https://doi.org/10.1007/978-3-031-74443-3
Format: Electronic Book

MARC

LEADER 00000nam a22000005i 4500
001 978-3-031-74443-3
003 DE-He213
005 20241220115605.0
007 cr nn 008mamaa
008 241220s2024 sz | s |||| 0|eng d
020 |a 9783031744433  |9 978-3-031-74443-3 
024 7 |a 10.1007/978-3-031-74443-3  |2 doi 
050 4 |a Q342 
072 7 |a UYQ  |2 bicssc 
072 7 |a COM004000  |2 bisacsh 
072 7 |a UYQ  |2 thema 
082 0 4 |a 006.3  |2 23 
245 1 0 |a Contributions Presented at The International Conference on Computing, Communication, Cybersecurity and AI, July 3–4, 2024, London, UK  |h [electronic resource] :  |b The C3AI 2024 /  |c edited by Nitin Naik, Paul Jenkins, Shaligram Prajapat, Paul Grace. 
250 |a 1st ed. 2024. 
264 1 |a Cham :  |b Springer Nature Switzerland :  |b Imprint: Springer,  |c 2024. 
300 |a IX, 826 p. 335 illus., 280 illus. in color.  |b online resource. 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a text file  |b PDF  |2 rda 
490 1 |a Lecture Notes in Networks and Systems,  |x 2367-3389 ;  |v 884 
505 0 |a Security model for IoT applications IoTSeMo -- DAN Deep Neural Network-based Application Mapping for Optimized Network-on-Chip Design -- Threat Modelling in Virtual Assistant Hub Devices -- Generate Unnoticeable Adversarial Examples on Audio Classification Models with Multi perspective Objectives -- Prior enhanced Semi supervised Federated Learning for IoT Intrusion Detection A Game Theory and Comparative Learning based Approach -- An empirical study on Insider Threats Towards Crime Prevention through Environmental Design CPTED A student case study -- Utilizing Machine Learning and Deep Learning Techniques for the Detection of Distributed Denial of Service DDoS Attacks -- Inspecting software architecture design styles to infer threat models and inform likely attacks. 
520 |a This book offers an in-depth exploration of cutting-edge research across the interconnected fields of computing, communication, cybersecurity, and artificial intelligence. It serves as a comprehensive guide to the technologies shaping our digital world, providing both a profound understanding of these domains and practical strategies for addressing their challenges. The content is drawn from the International Conference on Computing, Communication, Cybersecurity and AI (C3AI 2024), held in London, UK, from July 3 to 4, 2024. The conference attracted 66 submissions from 17 countries, including the USA, UK, Canada, Brazil, India, China, Germany, and Spain. Of these, 47 high-calibre papers were rigorously selected through a meticulous review process, where each paper received three to four reviews to ensure quality and relevance. This book is an essential resource for readers seeking a thorough and timely review of the latest advancements and trends in computing, communication, cybersecurity, and artificial intelligence. 
650 0 |a Computational intelligence. 
650 0 |a Artificial intelligence. 
650 1 4 |a Computational Intelligence. 
650 2 4 |a Artificial Intelligence. 
700 1 |a Naik, Nitin.  |e editor.  |4 edt  |4 http://id.loc.gov/vocabulary/relators/edt 
700 1 |a Jenkins, Paul.  |e editor.  |4 edt  |4 http://id.loc.gov/vocabulary/relators/edt 
700 1 |a Prajapat, Shaligram.  |e editor.  |4 edt  |4 http://id.loc.gov/vocabulary/relators/edt 
700 1 |a Grace, Paul.  |e editor.  |4 edt  |4 http://id.loc.gov/vocabulary/relators/edt 
710 2 |a SpringerLink (Online service) 
773 0 |t Springer Nature eBook 
776 0 8 |i Printed edition:  |z 9783031744426 
776 0 8 |i Printed edition:  |z 9783031744440 
830 0 |a Lecture Notes in Networks and Systems,  |x 2367-3389 ;  |v 884 
856 4 0 |u https://doi.org/10.1007/978-3-031-74443-3 
912 |a ZDB-2-INR 
912 |a ZDB-2-SXIT 
950 |a Intelligent Technologies and Robotics (SpringerNature-42732) 
950 |a Intelligent Technologies and Robotics (R0) (SpringerNature-43728)