000 | 03511nam a22007335i 4500 | ||
---|---|---|---|
001 | 978-3-031-15777-6 | ||
003 | DE-He213 | ||
005 | 20240423124957.0 | ||
007 | cr nn 008mamaa | ||
008 | 220823s2022 sz | s |||| 0|eng d | ||
020 |
_a9783031157776 _9978-3-031-15777-6 |
||
024 | 7 |
_a10.1007/978-3-031-15777-6 _2doi |
|
050 | 4 | _aQA76.9.D35 | |
050 | 4 | _aQ350-390 | |
072 | 7 |
_aUMB _2bicssc |
|
072 | 7 |
_aGPF _2bicssc |
|
072 | 7 |
_aCOM021000 _2bisacsh |
|
072 | 7 |
_aUMB _2thema |
|
072 | 7 |
_aGPF _2thema |
|
082 | 0 | 4 |
_a005.73 _223 |
082 | 0 | 4 |
_a003.54 _223 |
245 | 1 | 0 |
_aInformation and Communications Security _h[electronic resource] : _b24th International Conference, ICICS 2022, Canterbury, UK, September 5–8, 2022, Proceedings / _cedited by Cristina Alcaraz, Liqun Chen, Shujun Li, Pierangela Samarati. |
250 | _a1st ed. 2022. | ||
264 | 1 |
_aCham : _bSpringer International Publishing : _bImprint: Springer, _c2022. |
|
300 |
_aXVII, 640 p. 176 illus., 134 illus. in color. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
490 | 1 |
_aLecture Notes in Computer Science, _x1611-3349 ; _v13407 |
|
505 | 0 | _aCryptography -- Authentication -- Privacy and Anonymity -- Attacks and Vulnerability Analysis -- Artificial Intelligence for Detection -- Network Security and Forensics. . | |
520 | _aThis LNCS 13407 constitutes the refereed proceedings of the 24th International Conference on Information and Communications Security, ICICS 2022, held in Canterbury, UK,, in September 2022. The 34 revised full papers presented in the book were carefully selected from 150 submissions The papers are organized around the following topics: Cryptography, Authentication, Privacy and Anonymity, Attacks and Vulnerability Analysis, Artificial Intelligence for Detection, and Network Security and Forensics. | ||
650 | 0 | _aData structures (Computer science). | |
650 | 0 | _aInformation theory. | |
650 | 0 | _aDatabase management. | |
650 | 0 | _aData mining. | |
650 | 0 | _aApplication software. | |
650 | 0 |
_aImage processing _xDigital techniques. |
|
650 | 0 | _aComputer vision. | |
650 | 0 | _aCryptography. | |
650 | 0 | _aData encryption (Computer science). | |
650 | 1 | 4 | _aData Structures and Information Theory. |
650 | 2 | 4 | _aDatabase Management. |
650 | 2 | 4 | _aData Mining and Knowledge Discovery. |
650 | 2 | 4 | _aComputer and Information Systems Applications. |
650 | 2 | 4 | _aComputer Imaging, Vision, Pattern Recognition and Graphics. |
650 | 2 | 4 | _aCryptology. |
700 | 1 |
_aAlcaraz, Cristina. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt |
|
700 | 1 |
_aChen, Liqun. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt |
|
700 | 1 |
_aLi, Shujun. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt |
|
700 | 1 |
_aSamarati, Pierangela. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt |
|
710 | 2 | _aSpringerLink (Online service) | |
773 | 0 | _tSpringer Nature eBook | |
776 | 0 | 8 |
_iPrinted edition: _z9783031157769 |
776 | 0 | 8 |
_iPrinted edition: _z9783031157783 |
830 | 0 |
_aLecture Notes in Computer Science, _x1611-3349 ; _v13407 |
|
856 | 4 | 0 | _uhttps://doi.org/10.1007/978-3-031-15777-6 |
912 | _aZDB-2-SCS | ||
912 | _aZDB-2-SXCS | ||
912 | _aZDB-2-LNC | ||
942 | _cSPRINGER | ||
999 |
_c172828 _d172828 |