Artificial Intelligence and Security (Record no. 89053)
[ view plain ]
000 -LEADER | |
---|---|
fixed length control field | 07976nam a22006735i 4500 |
001 - CONTROL NUMBER | |
control field | 978-3-030-24265-7 |
003 - CONTROL NUMBER IDENTIFIER | |
control field | DE-He213 |
005 - DATE AND TIME OF LATEST TRANSACTION | |
control field | 20240730173720.0 |
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION | |
fixed length control field | cr nn 008mamaa |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION | |
fixed length control field | 190710s2019 sz | s |||| 0|eng d |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
International Standard Book Number | 9783030242657 |
-- | 978-3-030-24265-7 |
024 7# - OTHER STANDARD IDENTIFIER | |
Standard number or code | 10.1007/978-3-030-24265-7 |
Source of number or code | doi |
050 #4 - LIBRARY OF CONGRESS CALL NUMBER | |
Classification number | QA76.9.A25 |
072 #7 - SUBJECT CATEGORY CODE | |
Subject category code | UR |
Source | bicssc |
072 #7 - SUBJECT CATEGORY CODE | |
Subject category code | UTN |
Source | bicssc |
072 #7 - SUBJECT CATEGORY CODE | |
Subject category code | COM053000 |
Source | bisacsh |
072 #7 - SUBJECT CATEGORY CODE | |
Subject category code | UR |
Source | thema |
072 #7 - SUBJECT CATEGORY CODE | |
Subject category code | UTN |
Source | thema |
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER | |
Classification number | 005.8 |
Edition number | 23 |
245 10 - TITLE STATEMENT | |
Title | Artificial Intelligence and Security |
Medium | [electronic resource] : |
Remainder of title | 5th International Conference, ICAIS 2019, New York, NY, USA, July 26-28, 2019, Proceedings, Part II / |
Statement of responsibility, etc. | edited by Xingming Sun, Zhaoqing Pan, Elisa Bertino. |
250 ## - EDITION STATEMENT | |
Edition statement | 1st ed. 2019. |
264 #1 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE | |
Place of production, publication, distribution, manufacture | Cham : |
Name of producer, publisher, distributor, manufacturer | Springer International Publishing : |
-- | Imprint: Springer, |
Date of production, publication, distribution, manufacture, or copyright notice | 2019. |
300 ## - PHYSICAL DESCRIPTION | |
Extent | XVII, 665 p. 375 illus., 189 illus. in color. |
Other physical details | online resource. |
336 ## - CONTENT TYPE | |
Content type term | text |
Content type code | txt |
Source | rdacontent |
337 ## - MEDIA TYPE | |
Media type term | computer |
Media type code | c |
Source | rdamedia |
338 ## - CARRIER TYPE | |
Carrier type term | online resource |
Carrier type code | cr |
Source | rdacarrier |
347 ## - DIGITAL FILE CHARACTERISTICS | |
File type | text file |
Encoding format | |
Source | rda |
490 1# - SERIES STATEMENT | |
Series statement | Security and Cryptology, |
International Standard Serial Number | 2946-1863 ; |
Volume/sequential designation | 11633 |
505 0# - FORMATTED CONTENTS NOTE | |
Formatted contents note | Artificial Intelligence -- CCNET: Cascading Convolutions for Cardiac Segmentation -- A Deep Belief Networks Based Prediction Method for Identification of Disease-associated Non-coding SNPs in Human Genome -- On Human-like Performance Artificial Intelligence - A Demonstration Using an Atari Game -- Implementation of Multiplicative Seasonal ARIMA modeling and Flood Prediction based on Long-Term Time Series Data in Indonesia -- Improved Bayesian Method with Collision Recovery for RFID Anti-Collision -- Multi-step Attack Scenarios Mining Based on Neural Network and Bayesian Network Attack Graph -- A Comparative Study of Machine Learning Classifiers for Network Intrusion Detection -- On True Language Understanding -- The l2,1-Norm Stacked Robust Autoencoders via Adaptation Regularization for Domain Adaptation -- Molecular Dynamics Simulation Optimization Based on GROMACS on Sunway TaihuLight -- A Review of Network Representation Learning -- A Two-stage Deep Neural Network for Sequence Labeling -- Reinforcement Learning based Content Push Policy for HetNets with Energy Harvesting Small Cells -- A Comparative Research on Open Source Edge Computing Systems -- Weather Forecasting Using Artificial Neural Network -- A New Quantitative Evaluation Method for Fuzzing -- Classification of ECG Arrhythmia Using CNN, SVM and LDA -- Discrete Similarity Preserving Hashing for Cross-Modal Retrieval -- Classification of Vitiligo Based on Convolutional Neural Network -- Big Data -- Multi-scale and Hierarchical Embedding for Polarity Shift Sensitive Sentiment Classification -- Trade-off between Energy Consumption and Makespan in the Mapreduce Resource Allocation Problem -- FSampleJoin: A Fixed-sample-based Method for String Similarity Joins using MapReduce -- Mass Diffusion Recommendation Algorithm Based on Multi-Subnet Composited Complex Network Model -- Optimizing Word Embedding for Fine-grained Sentiment Analysis -- A Sentiment Classification Model Based on Multiple Multi-classifier Systems -- Task SchedulingAlgorithm based on Campus Cloud Platform -- Automatic Self-feedback for the Studying effect of MOOC Based on Support Vector Machine -- Prediction on Payment Volume from Customer Service Electricity Channel -- Delay-Tolerant Rendezvous-based Data collection for Target Tracking in Large-Scale Wireless Sensor Networks with UGV -- Energy-Efficient Data-Collection with Rendezvous-Based Approaches in Large-Scale WSNs with multi-UGV -- Analysis of the Efficiency-Energy with Regression and Classification in Household using K-NN 354 -- Probe Recommendation Algorithm for Link Delay Detection -- Recommendation with Heterogeneous Information Networks Based on Meta-Graph -- A GA-optimized Weighted Mixed Kernel Function of SVM Based on Information Entropy -- Modeling and Simulation of Network Public Opinion Propagation Model Based on Interest Matching in Social Network -- Power Consumption and Coverage Test of NB-IoT in the Substation Edge Computing Environment -- Research on the Optimizationof Spark Big Table Equal Join -- Gait Recognition based on spatial-temporal information -- Research on Load Balancing Algorithm Optimization Based on Spark Platform -- A System for Calculating the Amount of Motion Based on 3D Pose Estimation -- Design of Security Portrait Big Data Application System -- Urban traffic flow forecast based on ST-SEResNet -- A Novel Power System Anomaly Data Identification Method Based on Neural Network and Affine Propagation -- Input-Output Analysis of Chinese National Agricultural Science and Technology Park -- A Power Grid Operations Monitoring Platform Based on Big Data Technology -- An Efficient Social-Aware Routing Strategy in Mobile Social Networks -- Cloud Computing and Security -- Improvement of Differential Fault Attack Based on Lightweight Ciphers with GFN Structure -- Cloud Management Systems - Load Balancing Algorithms and VDI Implementation Techniques -- When Side Channel becomes Good: Kernel Malware Attack Investigation -- Robust Encrypted Watermarking for Medical Images Based on DWT-DCT and Tent Mapping in Encrypted Domain -- An Analysis of A Three-Factor Authentication Scheme and Its Improved Fix -- A Novel Content Based Image Retrieval Scheme in Cloud Computing -- Mobile Image Retrieval System for Cloud Service Based on Convolutional Neural Network and Hadoop -- Formal Specification of Concurrent Enforcement Ucon Model with CTL Logic -- Design of Real-Time Resource-Aware Network Resource Allocation Mechanism Under SDN Background -- RSCM: A Reliability-Aware Service Chain Mapping. |
520 ## - SUMMARY, ETC. | |
Summary, etc. | The 4-volume set LNCS 11632 until LNCS 11635 constitutes the refereed proceedings of the 5th International Conference on Artificial Intelligence and Security, ICAIS 2019, which was held in New York, USA, in July 2019. The conference was formerly called "International Conference on Cloud Computing and Security" with the acronym ICCCS. The total of 230 full papers presented in this 4-volume proceedings was carefully reviewed and selected from 1529 submissions. The papers were organized in topical sections as follows: Part I: cloud computing; Part II: artificial intelligence; big data; and cloud computing and security; Part III: cloud computing and security; information hiding; IoT security; multimedia forensics; and encryption and cybersecurity; Part IV: encryption and cybersecurity. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | Data protection. |
9 (RLIN) | 7245 |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | Artificial intelligence. |
9 (RLIN) | 3407 |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | Computer engineering. |
9 (RLIN) | 10164 |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | Computer networks . |
9 (RLIN) | 31572 |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | Application software. |
9 (RLIN) | 109352 |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | Computer vision. |
9 (RLIN) | 109353 |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | Algorithms. |
9 (RLIN) | 3390 |
650 14 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | Data and Information Security. |
9 (RLIN) | 31990 |
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | Artificial Intelligence. |
9 (RLIN) | 3407 |
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | Computer Engineering and Networks. |
9 (RLIN) | 109354 |
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | Computer and Information Systems Applications. |
9 (RLIN) | 109355 |
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | Computer Vision. |
9 (RLIN) | 109356 |
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | Algorithms. |
9 (RLIN) | 3390 |
700 1# - ADDED ENTRY--PERSONAL NAME | |
Personal name | Sun, Xingming. |
Relator term | editor. |
Relationship | edt |
-- | http://id.loc.gov/vocabulary/relators/edt |
9 (RLIN) | 109357 |
700 1# - ADDED ENTRY--PERSONAL NAME | |
Personal name | Pan, Zhaoqing. |
Relator term | editor. |
Relationship | edt |
-- | http://id.loc.gov/vocabulary/relators/edt |
9 (RLIN) | 109358 |
700 1# - ADDED ENTRY--PERSONAL NAME | |
Personal name | Bertino, Elisa. |
Relator term | editor. |
Relationship | edt |
-- | http://id.loc.gov/vocabulary/relators/edt |
9 (RLIN) | 109359 |
710 2# - ADDED ENTRY--CORPORATE NAME | |
Corporate name or jurisdiction name as entry element | SpringerLink (Online service) |
9 (RLIN) | 109360 |
773 0# - HOST ITEM ENTRY | |
Title | Springer Nature eBook |
776 08 - ADDITIONAL PHYSICAL FORM ENTRY | |
Relationship information | Printed edition: |
International Standard Book Number | 9783030242640 |
776 08 - ADDITIONAL PHYSICAL FORM ENTRY | |
Relationship information | Printed edition: |
International Standard Book Number | 9783030242664 |
830 #0 - SERIES ADDED ENTRY--UNIFORM TITLE | |
Uniform title | Security and Cryptology, |
International Standard Serial Number | 2946-1863 ; |
Volume/sequential designation | 11633 |
9 (RLIN) | 109361 |
856 40 - ELECTRONIC LOCATION AND ACCESS | |
Uniform Resource Identifier | <a href="https://doi.org/10.1007/978-3-030-24265-7">https://doi.org/10.1007/978-3-030-24265-7</a> |
912 ## - | |
-- | ZDB-2-SCS |
912 ## - | |
-- | ZDB-2-SXCS |
912 ## - | |
-- | ZDB-2-LNC |
942 ## - ADDED ENTRY ELEMENTS (KOHA) | |
Koha item type | eBooks-Lecture Notes in CS |
No items available.