|
|
|
|
LEADER |
03429nam a2200589 4500 |
001 |
978-981-13-2907-4 |
003 |
DE-He213 |
005 |
20190621011603.0 |
007 |
cr nn 008mamaa |
008 |
181006s2018 si | s |||| 0|eng d |
020 |
|
|
|a 9789811329074
|9 978-981-13-2907-4
|
024 |
7 |
|
|a 10.1007/978-981-13-2907-4
|2 doi
|
040 |
|
|
|d GrThAP
|
050 |
|
4 |
|a QA76.9.A25
|
072 |
|
7 |
|a UR
|2 bicssc
|
072 |
|
7 |
|a COM053000
|2 bisacsh
|
072 |
|
7 |
|a UR
|2 thema
|
072 |
|
7 |
|a UTN
|2 thema
|
082 |
0 |
4 |
|a 005.8
|2 23
|
245 |
1 |
0 |
|a Applications and Techniques in Information Security
|h [electronic resource] :
|b 9th International Conference, ATIS 2018, Nanning, China, November 9-11, 2018, Proceedings /
|c edited by Qingfeng Chen, Jia Wu, Shichao Zhang, Changan Yuan, Lynn Batten, Gang Li.
|
250 |
|
|
|a 1st ed. 2018.
|
264 |
|
1 |
|a Singapore :
|b Springer Singapore :
|b Imprint: Springer,
|c 2018.
|
300 |
|
|
|a XII, 223 p. 65 illus.
|b online resource.
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a text file
|b PDF
|2 rda
|
490 |
1 |
|
|a Communications in Computer and Information Science,
|x 1865-0929 ;
|v 950
|
505 |
0 |
|
|a Information Security -- Information Abuse Prevention -- Security Implementations -- Knowledge Discovery -- Applications.
|
520 |
|
|
|a This book constitutes the refereed proceedings of the 9th International Conference on Applications and Techniques in Information Security, ATIS 2018, held in Nanning, China, in November 2018. The 19 full papers were carefully reviewed and selected from 59 submissions. The papers are organized in the following topical sections: information security, information abuse prevention, security implementations, knowledge discovery, and applications.
|
650 |
|
0 |
|a Computer security.
|
650 |
|
0 |
|a Data mining.
|
650 |
|
0 |
|a Artificial intelligence.
|
650 |
|
0 |
|a Data encryption (Computer science).
|
650 |
1 |
4 |
|a Systems and Data Security.
|0 http://scigraph.springernature.com/things/product-market-codes/I28060
|
650 |
2 |
4 |
|a Data Mining and Knowledge Discovery.
|0 http://scigraph.springernature.com/things/product-market-codes/I18030
|
650 |
2 |
4 |
|a Artificial Intelligence.
|0 http://scigraph.springernature.com/things/product-market-codes/I21000
|
650 |
2 |
4 |
|a Cryptology.
|0 http://scigraph.springernature.com/things/product-market-codes/I28020
|
700 |
1 |
|
|a Chen, Qingfeng.
|e editor.
|4 edt
|4 http://id.loc.gov/vocabulary/relators/edt
|
700 |
1 |
|
|a Wu, Jia.
|e editor.
|4 edt
|4 http://id.loc.gov/vocabulary/relators/edt
|
700 |
1 |
|
|a Zhang, Shichao.
|e editor.
|4 edt
|4 http://id.loc.gov/vocabulary/relators/edt
|
700 |
1 |
|
|a Yuan, Changan.
|e editor.
|4 edt
|4 http://id.loc.gov/vocabulary/relators/edt
|
700 |
1 |
|
|a Batten, Lynn.
|e editor.
|0 (orcid)0000-0003-4525-2423
|1 https://orcid.org/0000-0003-4525-2423
|4 edt
|4 http://id.loc.gov/vocabulary/relators/edt
|
700 |
1 |
|
|a Li, Gang.
|e editor.
|0 (orcid)0000-0003-1583-641X
|1 https://orcid.org/0000-0003-1583-641X
|4 edt
|4 http://id.loc.gov/vocabulary/relators/edt
|
710 |
2 |
|
|a SpringerLink (Online service)
|
773 |
0 |
|
|t Springer eBooks
|
776 |
0 |
8 |
|i Printed edition:
|z 9789811329067
|
776 |
0 |
8 |
|i Printed edition:
|z 9789811329081
|
830 |
|
0 |
|a Communications in Computer and Information Science,
|x 1865-0929 ;
|v 950
|
856 |
4 |
0 |
|u https://doi.org/10.1007/978-981-13-2907-4
|z Full Text via HEAL-Link
|
912 |
|
|
|a ZDB-2-SCS
|
950 |
|
|
|a Computer Science (Springer-11645)
|