000 | 03424nam a22007095i 4500 | ||
---|---|---|---|
001 | 978-981-19-8285-9 | ||
003 | DE-He213 | ||
005 | 20240423125148.0 | ||
007 | cr nn 008mamaa | ||
008 | 221209s2022 si | s |||| 0|eng d | ||
020 |
_a9789811982859 _9978-981-19-8285-9 |
||
024 | 7 |
_a10.1007/978-981-19-8285-9 _2doi |
|
050 | 4 | _aQA76.9.A25 | |
072 | 7 |
_aUR _2bicssc |
|
072 | 7 |
_aUTN _2bicssc |
|
072 | 7 |
_aCOM053000 _2bisacsh |
|
072 | 7 |
_aUR _2thema |
|
072 | 7 |
_aUTN _2thema |
|
082 | 0 | 4 |
_a005.8 _223 |
245 | 1 | 0 |
_aCyber Security _h[electronic resource] : _b19th China Annual Conference, CNCERT 2022, Beijing, China, August 16–17, 2022, Revised Selected Papers / _cedited by Wei Lu, Yuqing Zhang, Weiping Wen, Hanbing Yan, Chao Li. |
250 | _a1st ed. 2022. | ||
264 | 1 |
_aSingapore : _bSpringer Nature Singapore : _bImprint: Springer, _c2022. |
|
300 |
_aX, 239 p. 78 illus., 55 illus. in color. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
490 | 1 |
_aCommunications in Computer and Information Science, _x1865-0937 ; _v1699 |
|
505 | 0 | _aData Security -- Anomaly Detection -- Cryptocurrency -- Information Security -- Vulnerabilities -- Mobile Internet -- Threat Intelligence -- Text Recognition. | |
506 | 0 | _aOpen Access | |
520 | _aThis open access book constitutes the refereed proceedings of the 18th China Annual Conference on Cyber Security, CNCERT 2022, held in Beijing, China, in August 2022. The 17 papers presented were carefully reviewed and selected from 64 submissions. The papers are organized according to the following topical sections: data security; anomaly detection; cryptocurrency; information security; vulnerabilities; mobile internet; threat intelligence; text recognition. | ||
650 | 0 | _aData protection. | |
650 | 0 | _aComputer engineering. | |
650 | 0 | _aComputer networks . | |
650 | 0 | _aArtificial intelligence. | |
650 | 0 |
_aComputers _xLaw and legislation. |
|
650 | 0 |
_aInformation technology _xLaw and legislation. |
|
650 | 0 |
_aComputer networks _xSecurity measures. |
|
650 | 1 | 4 | _aData and Information Security. |
650 | 2 | 4 | _aComputer Engineering and Networks. |
650 | 2 | 4 | _aComputer Engineering and Networks. |
650 | 2 | 4 | _aArtificial Intelligence. |
650 | 2 | 4 | _aLegal Aspects of Computing. |
650 | 2 | 4 | _aMobile and Network Security. |
700 | 1 |
_aLu, Wei. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt |
|
700 | 1 |
_aZhang, Yuqing. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt |
|
700 | 1 |
_aWen, Weiping. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt |
|
700 | 1 |
_aYan, Hanbing. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt |
|
700 | 1 |
_aLi, Chao. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt |
|
710 | 2 | _aSpringerLink (Online service) | |
773 | 0 | _tSpringer Nature eBook | |
776 | 0 | 8 |
_iPrinted edition: _z9789811982842 |
776 | 0 | 8 |
_iPrinted edition: _z9789811982866 |
830 | 0 |
_aCommunications in Computer and Information Science, _x1865-0937 ; _v1699 |
|
856 | 4 | 0 | _uhttps://doi.org/10.1007/978-981-19-8285-9 |
912 | _aZDB-2-SCS | ||
912 | _aZDB-2-SXCS | ||
912 | _aZDB-2-SOB | ||
942 | _cSPRINGER | ||
999 |
_c174931 _d174931 |