Katalog der Deutschen Nationalbibliothek
Ergebnis der Suche nach: "Machine Learning"
![]() |
|
Link zu diesem Datensatz | https://d-nb.info/1355029414 |
Titel | Artificial Intelligence and Machine Learning : 43rd IBIMA Conference, IBIMA-AI 2024, Madrid, Spain, June 26–27, 2024, Revised Selected Papers, Part-II / edited by Khalid S. Soliman |
Person(en) | Soliman, Khalid S. (Herausgeber) |
Organisation(en) | SpringerLink (Online service) (Sonstige) |
Ausgabe | 1st ed. 2025 |
Verlag | Cham : Springer Nature Switzerland, Imprint: Springer |
Zeitliche Einordnung | Erscheinungsdatum: 2025 |
Umfang/Format | Online-Ressource, XV, 454 p. 259 illus., 201 illus. in color. : online resource. |
Andere Ausgabe(n) |
Printed edition:: ISBN: 978-3-031-79085-0 Printed edition:: ISBN: 978-3-031-79087-4 |
Inhalt | -- Software Engineering. -- Access Control Mechanisms in Java Applications. -- An evaluative study comparing the performance of RESTful Web APIs created with .NET and Java Spring Boot. -- Implementation Of a Model for Employee Evaluation on The Base of Open-Source Tools: The Case of Libre Office Base. -- Model based approach for building dynamic UI with SPA. -- Scheduling User Acceptance Tests from A Process Perspective. -- Software Development Process Analysis – Ishikawa Diagram – Case Study. -- E-Learning Platform to Asynchrony/Leak Recognition and Elimination Using Simulation Model of Lung Mechanical Ventilation. -- Computer Security and Privacy. -- A Review of a Website Phishing Detection Taxonomy. -- A Survey of Challenges in Dark Web Crawling: Technical, Security, and Ethical Perspective. -- Blockchain-Based Access Control in Smart Manufacturing as An Industrial Application: A Systematic Literature Review. -- Detection of Cryptographic Functions Within Binary Executable Ransomware Files. -- Exploring Blockchain's Influence on Illicit Practices: A Comprehensive Analysis. -- Performance Comparison of Programming Interfaces for Microservices Architecture. -- Ransomware Defense Strategies Using Cyber Threat Intelligence: A Case Study of a Saudi Organization. -- The Effectiveness of the Tools Used in Risk Management Regarding the Security of Local Military Networks. -- Use of the System Event Register to Assess the Security Level of The IT System |
Persistent Identifier |
URN: urn:nbn:de:101:1-2501311340219.321354652197 DOI: 10.1007/978-3-031-79086-7 |
URL | https://doi.org/10.1007/978-3-031-79086-7 |
ISBN/Einband/Preis | 978-3-031-79086-7 |
Sprache(n) | Englisch (eng) |
Beziehungen | Communications in Computer and Information Science ; 2300 |
Sachgruppe(n) | 004 Informatik |
Online-Zugriff | Archivobjekt öffnen |
