000 | 03405nam a22006855i 4500 | ||
---|---|---|---|
001 | 978-3-030-97532-6 | ||
003 | DE-He213 | ||
005 | 20240423125530.0 | ||
007 | cr nn 008mamaa | ||
008 | 220222s2022 sz | s |||| 0|eng d | ||
020 |
_a9783030975326 _9978-3-030-97532-6 |
||
024 | 7 |
_a10.1007/978-3-030-97532-6 _2doi |
|
050 | 4 | _aQ334-342 | |
050 | 4 | _aTA347.A78 | |
072 | 7 |
_aUYQ _2bicssc |
|
072 | 7 |
_aCOM004000 _2bisacsh |
|
072 | 7 |
_aUYQ _2thema |
|
082 | 0 | 4 |
_a006.3 _223 |
245 | 1 | 0 |
_aSecure Knowledge Management In The Artificial Intelligence Era _h[electronic resource] : _b9th International Conference, SKM 2021, San Antonio, TX, USA, October 8–9, 2021, Proceedings / _cedited by Ram Krishnan, H. Raghav Rao, Sanjay K. Sahay, Sagar Samtani, Ziming Zhao. |
250 | _a1st ed. 2022. | ||
264 | 1 |
_aCham : _bSpringer International Publishing : _bImprint: Springer, _c2022. |
|
300 |
_aXVIII, 201 p. 57 illus., 46 illus. in color. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
490 | 1 |
_aCommunications in Computer and Information Science, _x1865-0937 ; _v1549 |
|
505 | 0 | _aIntrusion and Malware Detection -- Secure Knowledge Management -- Deep Learning for Security -- Web and Social Network. | |
520 | _aThis book constitutes the refereed proceedings of the 9th International Conference On Secure Knowledge Management In Artificial Intelligence Era, SKM 2021, held in San Antonio, TX, USA, in 2021. Due to the COVID-19 pandemic the conference was held online. The 11 papers presented were carefully reviewed and selected from 30 submissions. They were organized according to the following topical sections: intrusion and malware detection; secure knowledge management; deep learning for security; web and social network. | ||
650 | 0 | _aArtificial intelligence. | |
650 | 0 | _aData protection. | |
650 | 0 | _aCryptography. | |
650 | 0 | _aData encryption (Computer science). | |
650 | 0 | _aComputer engineering. | |
650 | 0 | _aComputer networks . | |
650 | 0 | _aCoding theory. | |
650 | 0 | _aInformation theory. | |
650 | 1 | 4 | _aArtificial Intelligence. |
650 | 2 | 4 | _aData and Information Security. |
650 | 2 | 4 | _aCryptology. |
650 | 2 | 4 | _aComputer Engineering and Networks. |
650 | 2 | 4 | _aComputer Engineering and Networks. |
650 | 2 | 4 | _aCoding and Information Theory. |
700 | 1 |
_aKrishnan, Ram. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt |
|
700 | 1 |
_aRao, H. Raghav. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt |
|
700 | 1 |
_aSahay, Sanjay K. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt |
|
700 | 1 |
_aSamtani, Sagar. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt |
|
700 | 1 |
_aZhao, Ziming. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt |
|
710 | 2 | _aSpringerLink (Online service) | |
773 | 0 | _tSpringer Nature eBook | |
776 | 0 | 8 |
_iPrinted edition: _z9783030975319 |
776 | 0 | 8 |
_iPrinted edition: _z9783030975333 |
830 | 0 |
_aCommunications in Computer and Information Science, _x1865-0937 ; _v1549 |
|
856 | 4 | 0 | _uhttps://doi.org/10.1007/978-3-030-97532-6 |
912 | _aZDB-2-SCS | ||
912 | _aZDB-2-SXCS | ||
942 | _cSPRINGER | ||
999 |
_c178979 _d178979 |