000 | 03063nam a22006375i 4500 | ||
---|---|---|---|
001 | 978-3-030-66763-4 | ||
003 | DE-He213 | ||
005 | 20240423125351.0 | ||
007 | cr nn 008mamaa | ||
008 | 201229s2020 sz | s |||| 0|eng d | ||
020 |
_a9783030667634 _9978-3-030-66763-4 |
||
024 | 7 |
_a10.1007/978-3-030-66763-4 _2doi |
|
050 | 4 | _aQA76.76.A65 | |
072 | 7 |
_aUB _2bicssc |
|
072 | 7 |
_aCOM005000 _2bisacsh |
|
072 | 7 |
_aUX _2thema |
|
082 | 0 | 4 |
_a005.3 _223 |
245 | 1 | 0 |
_aTrends in Computational Intelligence, Security and Internet of Things _h[electronic resource] : _bThird International Conference, ICCISIoT 2020, Tripura, India, December 29-30, 2020, Proceedings / _cedited by Nirmalya Kar, Ashim Saha, Suman Deb. |
250 | _a1st ed. 2020. | ||
264 | 1 |
_aCham : _bSpringer International Publishing : _bImprint: Springer, _c2020. |
|
300 |
_aXIII, 329 p. 164 illus., 122 illus. in color. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
490 | 1 |
_aCommunications in Computer and Information Science, _x1865-0937 ; _v1358 |
|
505 | 0 | _aComputational Intelligence -- Security -- Internet of Things. | |
520 | _aThis volume constitutes the refereed proceedings of the Third International Conference on Computational Intelligence, Security and Internet of Things, ICCISIoT 2020, held in Agartala, India, in December 2020. Due to the COVID-19 pandemic the conference was held online. The 23 full papers and 4 short papers were carefully reviewed and selected from 113 submissions. The papers are organised according to the following topics: computational intelligence, security, and internet of things. . | ||
650 | 0 | _aApplication software. | |
650 | 0 | _aComputer networks . | |
650 | 0 | _aComputer systems. | |
650 | 0 | _aArtificial intelligence. | |
650 | 0 | _aData protection. | |
650 | 0 | _aCryptography. | |
650 | 0 | _aData encryption (Computer science). | |
650 | 1 | 4 | _aComputer and Information Systems Applications. |
650 | 2 | 4 | _aComputer Communication Networks. |
650 | 2 | 4 | _aComputer System Implementation. |
650 | 2 | 4 | _aArtificial Intelligence. |
650 | 2 | 4 | _aData and Information Security. |
650 | 2 | 4 | _aCryptology. |
700 | 1 |
_aKar, Nirmalya. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt |
|
700 | 1 |
_aSaha, Ashim. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt |
|
700 | 1 |
_aDeb, Suman. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt |
|
710 | 2 | _aSpringerLink (Online service) | |
773 | 0 | _tSpringer Nature eBook | |
776 | 0 | 8 |
_iPrinted edition: _z9783030667627 |
776 | 0 | 8 |
_iPrinted edition: _z9783030667641 |
830 | 0 |
_aCommunications in Computer and Information Science, _x1865-0937 ; _v1358 |
|
856 | 4 | 0 | _uhttps://doi.org/10.1007/978-3-030-66763-4 |
912 | _aZDB-2-SCS | ||
912 | _aZDB-2-SXCS | ||
942 | _cSPRINGER | ||
999 |
_c177171 _d177171 |