|
|
|
|
LEADER |
03267nam a2200565 4500 |
001 |
978-3-030-17982-3 |
003 |
DE-He213 |
005 |
20191022063506.0 |
007 |
cr nn 008mamaa |
008 |
190411s2019 gw | s |||| 0|eng d |
020 |
|
|
|a 9783030179823
|9 978-3-030-17982-3
|
024 |
7 |
|
|a 10.1007/978-3-030-17982-3
|2 doi
|
040 |
|
|
|d GrThAP
|
050 |
|
4 |
|a QA76.9.A25
|
072 |
|
7 |
|a UR
|2 bicssc
|
072 |
|
7 |
|a COM053000
|2 bisacsh
|
072 |
|
7 |
|a UR
|2 thema
|
072 |
|
7 |
|a UTN
|2 thema
|
082 |
0 |
4 |
|a 005.8
|2 23
|
245 |
1 |
0 |
|a Information Security Applications
|h [electronic resource] :
|b 19th International Conference, WISA 2018, Jeju Island, Korea, August 23-25, 2018, Revised Selected Papers /
|c edited by Brent ByungHoon Kang, JinSoo Jang.
|
250 |
|
|
|a 1st ed. 2019.
|
264 |
|
1 |
|a Cham :
|b Springer International Publishing :
|b Imprint: Springer,
|c 2019.
|
300 |
|
|
|a X, 267 p. 95 illus., 52 illus. in color.
|b online resource.
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a text file
|b PDF
|2 rda
|
490 |
1 |
|
|a Security and Cryptology ;
|v 11402
|
505 |
0 |
|
|a Systems Security -- Analysis and Visualization of Threats -- Applied Crypto.
|
520 |
|
|
|a This book constitutes the thoroughly refereed post-conference proceedings of the 19th International Conference on Information Security Applications, WISA 2018, held on Jeju Island, Korea, in August 2018. The 11 revised full papers and 11 short papers presented in this volume were carefully reviewed and selected from 44 submissions. # The primary focus of WISA 2018 was on systems and network security including all other technical and practical aspects of security applications and also on the embedded, unmanned or autonomous systems and cyber physical systems in general.
|
650 |
|
0 |
|a Computer security.
|
650 |
|
0 |
|a Computers.
|
650 |
|
0 |
|a Computer organization.
|
650 |
|
0 |
|a Artificial intelligence.
|
650 |
1 |
4 |
|a Systems and Data Security.
|0 http://scigraph.springernature.com/things/product-market-codes/I28060
|
650 |
2 |
4 |
|a Information Systems and Communication Service.
|0 http://scigraph.springernature.com/things/product-market-codes/I18008
|
650 |
2 |
4 |
|a Computing Milieux.
|0 http://scigraph.springernature.com/things/product-market-codes/I24008
|
650 |
2 |
4 |
|a Computer Systems Organization and Communication Networks.
|0 http://scigraph.springernature.com/things/product-market-codes/I13006
|
650 |
2 |
4 |
|a Artificial Intelligence.
|0 http://scigraph.springernature.com/things/product-market-codes/I21000
|
700 |
1 |
|
|a Kang, Brent ByungHoon.
|e editor.
|0 (orcid)0000-0001-8984-1006
|1 https://orcid.org/0000-0001-8984-1006
|4 edt
|4 http://id.loc.gov/vocabulary/relators/edt
|
700 |
1 |
|
|a Jang, JinSoo.
|e editor.
|0 (orcid)0000-0003-2070-2408
|1 https://orcid.org/0000-0003-2070-2408
|4 edt
|4 http://id.loc.gov/vocabulary/relators/edt
|
710 |
2 |
|
|a SpringerLink (Online service)
|
773 |
0 |
|
|t Springer eBooks
|
776 |
0 |
8 |
|i Printed edition:
|z 9783030179816
|
776 |
0 |
8 |
|i Printed edition:
|z 9783030179830
|
830 |
|
0 |
|a Security and Cryptology ;
|v 11402
|
856 |
4 |
0 |
|u https://doi.org/10.1007/978-3-030-17982-3
|z Full Text via HEAL-Link
|
912 |
|
|
|a ZDB-2-SCS
|
912 |
|
|
|a ZDB-2-LNC
|
950 |
|
|
|a Computer Science (Springer-11645)
|