000 | 03972nam a22007575i 4500 | ||
---|---|---|---|
001 | 978-981-33-4922-3 | ||
003 | DE-He213 | ||
005 | 20220530132019.0 | ||
007 | cr nn 008mamaa | ||
008 | 210118s2020 si | s |||| 0|eng d | ||
020 |
_a9789813349223 _9978-981-33-4922-3 |
||
024 | 7 |
_a10.1007/978-981-33-4922-3 _2doi |
|
072 | 7 |
_aUR _2bicssc |
|
072 | 7 |
_aUTN _2bicssc |
|
072 | 7 |
_aCOM053000 _2bisacsh |
|
072 | 7 |
_aUR _2thema |
|
072 | 7 |
_aUTN _2thema |
|
082 | 0 | 4 |
_a005.8 _223 |
245 | 1 | 0 |
_aCyber Security _h[electronic resource] : _b17th China Annual Conference, CNCERT 2020, Beijing, China, August 12, 2020, Revised Selected Papers / _cedited by Wei Lu, Qiaoyan Wen, Yuqing Zhang, Bo Lang, Weiping Wen, Hanbing Yan, Chao Li, Li Ding, Ruiguang Li, Yu Zhou. |
250 | _a1st ed. 2020. | ||
264 | 1 |
_aSingapore : _bSpringer Nature Singapore : _bImprint: Springer, _c2020. |
|
300 |
_aX, 235 páginas108 ilustraciones, 70 ilustraciones in color. _bonline resource. |
||
336 |
_atexto _btxt _2rdacontent |
||
337 |
_acomputadora _bc _2rdamedia |
||
338 |
_arecurso en línea _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
490 | 1 |
_aCommunications in Computer and Information Science, _x1865-0937 ; _v1299 |
|
505 | 0 | _aAccess Control -- Cryptography -- Denial-of-Service Attacks -- Hardware Security Implementation -- Intrusion/Anomaly Detection and Malware Mitigation -- Social Network Security and Privacy.-Systems Security. | |
506 | 0 | _aOpen Access | |
520 | _aThis open access book constitutes the refereed proceedings of the 16th International Annual Conference on Cyber Security, CNCERT 2020, held in Beijing, China, in August 2020. The 17 papers presented were carefully reviewed and selected from 58 submissions. The papers are organized according to the following topical sections: access control; cryptography; denial-of-service attacks; hardware security implementation; intrusion/anomaly detection and malware mitigation; social network security and privacy; systems security. | ||
650 | 0 | _aData protection. | |
650 | 0 | _aComputer networks . | |
650 | 0 | _aApplication software. | |
650 | 0 | _aComputer systems. | |
650 | 0 | _aCryptography. | |
650 | 0 | _aData encryption (Computer science). | |
650 | 0 | _aComputer networks-Security measures. | |
650 | 1 | 4 | _aData and Information Security. |
650 | 2 | 4 | _aComputer Communication Networks. |
650 | 2 | 4 | _aComputer and Information Systems Applications. |
650 | 2 | 4 | _aComputer System Implementation. |
650 | 2 | 4 | _aCryptology. |
650 | 2 | 4 | _aMobile and Network Security. |
700 | 1 |
_aLu, Wei. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt |
|
700 | 1 |
_aWen, Qiaoyan. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt |
|
700 | 1 |
_aZhang, Yuqing. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt |
|
700 | 1 |
_aLang, Bo. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt |
|
700 | 1 |
_aWen, Weiping. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt |
|
700 | 1 |
_aYan, Hanbing. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt |
|
700 | 1 |
_aLi, Chao. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt |
|
700 | 1 |
_aDing, Li. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt |
|
700 | 1 |
_aLi, Ruiguang. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt |
|
700 | 1 |
_aZhou, Yu. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt |
|
710 | 2 | _aSpringerLink (Online service) | |
773 | 0 | _tSpringer Nature eBook | |
776 | 0 | 8 |
_iPrinted edition: _z9789813349216 |
776 | 0 | 8 |
_iPrinted edition: _z9789813349230 |
830 | 0 |
_aCommunications in Computer and Information Science, _x1865-0937 ; _v1299 |
|
856 | 4 | 0 | _uhttps://doi.org/10.1007/978-981-33-4922-3 |
912 | _aZDB-2-SCS | ||
912 | _aZDB-2-SXCS | ||
912 | _aZDB-2-SOB | ||
999 |
_c153971 _d153971 |