000 05841nam a22006495i 4500
001 978-3-031-42519-6
003 DE-He213
005 20240207153748.0
007 cr nn 008mamaa
008 230826s2023 sz | s |||| 0|eng d
020 _a9783031425196
_9978-3-031-42519-6
050 4 _aQ342
072 7 _aUYQ
_2bicssc
072 7 _aTEC009000
_2bisacsh
072 7 _aUYQ
_2thema
082 0 4 _a006.3
_223
245 1 0 _aInternational Joint Conference 16th International Conference on Computational Intelligence in Security for Information Systems (CISIS 2023) 14th International Conference on EUropean Transnational Education (ICEUTE 2023)
_h[electronic resource] :
_bProceedings /
_cedited by Pablo García Bringas, Hilde Pérez García, Francisco Javier Martínez de Pisón, Francisco Martínez Álvarez, Alicia Troncoso Lora, Álvaro Herrero, José Luis Calvo Rolle, Héctor Quintián, Emilio Corchado.
250 _a1st ed. 2023.
264 1 _aCham :
_bSpringer Nature Switzerland :
_bImprint: Springer,
_c2023.
300 _aXVIII, 370 p. 129 illus., 116 illus. in color.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
490 1 _aLecture Notes in Networks and Systems,
_x2367-3389 ;
_v748
500 _aAcceso multiusuario
505 0 _aFinding and removing infected T -trees in IoT networks -- Intrusion Detection and Prevention in Industrial Internet of Things: A Study -- Critical analysis of global models for malware propagation on wireless sensor networks -- A novel method for failure detection based on real-time systems identification -- Accountability & explainability in robotics: a proof of concept for ROS 2- and Nav2-based mobile robots -- Reducing the security margin against a differential attack in the TinyJambu cryptosystem -- Analysis of extractive text summarization methods as a binary classification problem -- Systematic literature review of methods used for SQL injection detection based on intelligent algorithms -- Benchmarking Classifiers for DDoS Attack Detection in Industrial IoT Networks -- Impact of the Keep-Alive Parameter on SQL Injection Attack Detection in Network Flow Data -- QuantumSolver Composer: Automatic Quantum Transformation of Classical Circuits.
520 _aThis book of Lecture Notes in Networks and Systems contains accepted papers presented at the 16th International Conference on Computational Intelligence in Security for Information Systems (CISIS 2023) and the 14th International Conference on EUropean Transnational Education (ICEUTE 2023). These conferences were held in the beautiful city of Salamanca, Spain, in September 2023. The aim of the CISIS 2023 conference is to offer a meeting opportunity for academic and industry-related researchers belonging to the various, vast communities of computational intelligence, information security, and data mining. The need for intelligent, flexible behavior by large, complex systems, especially in mission-critical domains, is intended to be the catalyst and the aggregation stimulus for the overall event. The aim of ICEUTE 2023 conference is to offer a meeting point for people working on transnational education within Europe. It provides a stimulating and fruitful forum for presenting and discussing the latest works and advances on transnational education within European countries.
541 _fUABC ;
_cPerpetuidad
650 0 _aComputational intelligence.
650 0 _aEngineering
_xData processing.
650 0 _aEducation.
650 1 4 _aComputational Intelligence.
650 2 4 _aData Engineering.
650 2 4 _aEducation.
700 1 _aGarcía Bringas, Pablo.
_eeditor.
_0(orcid)0000-0003-3594-9534
_1https://orcid.org/0000-0003-3594-9534
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
700 1 _aPérez García, Hilde.
_eeditor.
_0(orcid)0000-0001-7112-1983
_1https://orcid.org/0000-0001-7112-1983
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
700 1 _aMartínez de Pisón, Francisco Javier.
_eeditor.
_0(orcid)0000-0002-3063-7374
_1https://orcid.org/0000-0002-3063-7374
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
700 1 _aMartínez Álvarez, Francisco.
_eeditor.
_0(orcid)0000-0002-6309-1785
_1https://orcid.org/0000-0002-6309-1785
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
700 1 _aTroncoso Lora, Alicia.
_eeditor.
_0(orcid)0000-0002-9801-7999
_1https://orcid.org/0000-0002-9801-7999
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
700 1 _aHerrero, Álvaro.
_eeditor.
_0(orcid)0000-0002-2444-5384
_1https://orcid.org/0000-0002-2444-5384
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
700 1 _aCalvo Rolle, José Luis.
_eeditor.
_0(orcid)0000-0002-2333-8405
_1https://orcid.org/0000-0002-2333-8405
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
700 1 _aQuintián, Héctor.
_eeditor.
_0(orcid)0000-0002-0268-7999
_1https://orcid.org/0000-0002-0268-7999
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
700 1 _aCorchado, Emilio.
_eeditor.
_0(orcid)0000-0001-8560-3991
_1https://orcid.org/0000-0001-8560-3991
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
710 2 _aSpringerLink (Online service)
773 0 _tSpringer Nature eBook
776 0 8 _iPrinted edition:
_z9783031425189
776 0 8 _iPrinted edition:
_z9783031425202
830 0 _aLecture Notes in Networks and Systems,
_x2367-3389 ;
_v748
856 4 0 _zLibro electrónico
_uhttp://libcon.rec.uabc.mx:2048/login?url=https://doi.org/10.1007/978-3-031-42519-6
912 _aZDB-2-INR
912 _aZDB-2-SXIT
942 _cLIBRO_ELEC
999 _c263275
_d263274