This volume of Lecture Notes in Networks and Systems contains accepted papers presented at the 17th International Conference on Computational Intelligence in Security for Information Systems (CISIS 2024) and the 15th International Conference on EUropean Transnational Education (ICEUTE 2024), which were held in the beautiful city of Salamanca, Spain, in October 2024.
The aim of the CISIS 2024 conference is to offer a meeting opportunity for academic and industry-related researchers belonging to the various vast communities of Computational Intelligence, Information Security, and Data Mining. The need for intelligent, flexible behavior by large, complex systems, especially in mission-critical domains, is intended to be the catalyst and the aggregation stimulus for the overall event.
After peer review, the CISIS 2024 International Program Committee selected 24 papers for publication in these conference proceedings. In this edition, one special session was organized: Artificial Intelligence for Protecting the Internet of Things.
The aim of ICEUTE 2024 conference is to offer a stimulating and fruitful meeting point for people working on transnational education within Europe. It provides an exciting forum for presenting and discussing the latest works and advances in transnational education within European countries. In the case of ICEUTE 2024, the International Program Committee selected nine papers, which are also published in these conference proceedings.
The selection of papers was extremely rigorous to maintain the high quality of the conferences. We deeply appreciate the hard work and dedication of the members of the Program Committees during the reviewing process. Their contributions are integral to the creation of a high-standard conference; the CISIS and ICEUTE conferences would not exist without their help.
قائمة المحتويات
.- Part I CISIS Applications.
.- Chapter 1 Blockchain-based random selection among a private number of candidates.
.- Chapter 2 A timeline and analysis of recent Bitcoin money-laundering detection methods.
.- Chapter 3 An approach based on LLMs for forensic threat detection in autonomous systems.
.- Chapter 4 Smart water meter network anomaly and failure detection system.
.- Chapter 5 Design and Implementation of a Fast, Platform-Adaptive, AIS-20/31 Compliant PLL-Based True Random Number Generator on a Zynq 7020 So C FPGA.
.- Chapter 6 A Comparison of Frameworks for Heterogeneous Computing Using High-Performance Pattern-Matching for DNA Biometrics and Digital Forensics.
.- Chapter 7 Fuzzing Robotic Software using HPC and LLM.
.- Chapter 8 Performance Impact of Strengthening the Accountability and Explainability System in Autonomous Robots, etc.