|
|
|
|
LEADER |
04079nam a2200649 4500 |
001 |
978-981-15-0871-4 |
003 |
DE-He213 |
005 |
20191028213319.0 |
007 |
cr nn 008mamaa |
008 |
191014s2019 si | s |||| 0|eng d |
020 |
|
|
|a 9789811508714
|9 978-981-15-0871-4
|
024 |
7 |
|
|a 10.1007/978-981-15-0871-4
|2 doi
|
040 |
|
|
|d GrThAP
|
050 |
|
4 |
|a QA76.9.A25
|
072 |
|
7 |
|a UR
|2 bicssc
|
072 |
|
7 |
|a COM053000
|2 bisacsh
|
072 |
|
7 |
|a UR
|2 thema
|
072 |
|
7 |
|a UTN
|2 thema
|
082 |
0 |
4 |
|a 005.8
|2 23
|
245 |
1 |
0 |
|a Applications and Techniques in Information Security
|h [electronic resource] :
|b 10th International Conference, ATIS 2019, Thanjavur, India, November 22-24, 2019, Proceedings /
|c edited by V. S. Shankar Sriram, V. Subramaniyaswamy, N. Sasikaladevi, Leo Zhang, Lynn Batten, Gang Li.
|
250 |
|
|
|a 1st ed. 2019.
|
264 |
|
1 |
|a Singapore :
|b Springer Singapore :
|b Imprint: Springer,
|c 2019.
|
300 |
|
|
|a XI, 313 p. 157 illus., 101 illus. in color.
|b online resource.
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a text file
|b PDF
|2 rda
|
490 |
1 |
|
|a Communications in Computer and Information Science,
|x 1865-0929 ;
|v 1116
|
505 |
0 |
|
|a Information Security -- Network Security -- Intrusion Detection System -- Authentication and Key Management System -- Security Centric Applications. .
|
520 |
|
|
|a This book constitutes the refereed proceedings of the 10th International Conference on Applications and Techniques in Information Security, ATIS 2019, held in Tamil Nadul, India, in November 2019. The 22 full papers and 2 short papers presented in the volume were carefully reviewed and selected from 50 submissions. The papers are organized in the following topical sections: information security; network security; intrusion detection system; authentication and key management system; security centric applications. .
|
650 |
|
0 |
|a Computer security.
|
650 |
|
0 |
|a Data protection.
|
650 |
|
0 |
|a Computers.
|
650 |
|
0 |
|a Law and legislation.
|
650 |
|
0 |
|a Artificial intelligence.
|
650 |
|
0 |
|a Application software.
|
650 |
|
0 |
|a Computer communication systems.
|
650 |
1 |
4 |
|a Systems and Data Security.
|0 http://scigraph.springernature.com/things/product-market-codes/I28060
|
650 |
2 |
4 |
|a Security.
|0 http://scigraph.springernature.com/things/product-market-codes/I28000
|
650 |
2 |
4 |
|a Legal Aspects of Computing.
|0 http://scigraph.springernature.com/things/product-market-codes/I24059
|
650 |
2 |
4 |
|a Artificial Intelligence.
|0 http://scigraph.springernature.com/things/product-market-codes/I21000
|
650 |
2 |
4 |
|a Information Systems Applications (incl. Internet).
|0 http://scigraph.springernature.com/things/product-market-codes/I18040
|
650 |
2 |
4 |
|a Computer Communication Networks.
|0 http://scigraph.springernature.com/things/product-market-codes/I13022
|
700 |
1 |
|
|a Shankar Sriram, V. S.
|e editor.
|0 (orcid)0000-0001-7870-7944
|1 https://orcid.org/0000-0001-7870-7944
|4 edt
|4 http://id.loc.gov/vocabulary/relators/edt
|
700 |
1 |
|
|a Subramaniyaswamy, V.
|e editor.
|4 edt
|4 http://id.loc.gov/vocabulary/relators/edt
|
700 |
1 |
|
|a Sasikaladevi, N.
|e editor.
|0 (orcid)0000-0002-0841-502X
|1 https://orcid.org/0000-0002-0841-502X
|4 edt
|4 http://id.loc.gov/vocabulary/relators/edt
|
700 |
1 |
|
|a Zhang, Leo.
|e editor.
|4 edt
|4 http://id.loc.gov/vocabulary/relators/edt
|
700 |
1 |
|
|a Batten, Lynn.
|e editor.
|0 (orcid)0000-0003-4525-2423
|1 https://orcid.org/0000-0003-4525-2423
|4 edt
|4 http://id.loc.gov/vocabulary/relators/edt
|
700 |
1 |
|
|a Li, Gang.
|e editor.
|0 (orcid)0000-0003-1583-641X
|1 https://orcid.org/0000-0003-1583-641X
|4 edt
|4 http://id.loc.gov/vocabulary/relators/edt
|
710 |
2 |
|
|a SpringerLink (Online service)
|
773 |
0 |
|
|t Springer eBooks
|
776 |
0 |
8 |
|i Printed edition:
|z 9789811508707
|
776 |
0 |
8 |
|i Printed edition:
|z 9789811508721
|
830 |
|
0 |
|a Communications in Computer and Information Science,
|x 1865-0929 ;
|v 1116
|
856 |
4 |
0 |
|u https://doi.org/10.1007/978-981-15-0871-4
|z Full Text via HEAL-Link
|
912 |
|
|
|a ZDB-2-SCS
|
950 |
|
|
|a Computer Science (Springer-11645)
|