000 03211nam a22005415i 4500
001 978-981-10-4154-9
003 DE-He213
005 20220801222459.0
007 cr nn 008mamaa
008 170317s2017 si | s |||| 0|eng d
020 _a9789811041549
_9978-981-10-4154-9
024 7 _a10.1007/978-981-10-4154-9
_2doi
050 4 _aTK5101-5105.9
072 7 _aTJK
_2bicssc
072 7 _aTEC041000
_2bisacsh
072 7 _aTJK
_2thema
082 0 4 _a621.382
_223
245 1 0 _aInformation Science and Applications 2017
_h[electronic resource] :
_bICISA 2017 /
_cedited by Kuinam Kim, Nikolai Joukov.
250 _a1st ed. 2017.
264 1 _aSingapore :
_bSpringer Nature Singapore :
_bImprint: Springer,
_c2017.
300 _aXXI, 838 p. 385 illus.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
490 1 _aLecture Notes in Electrical Engineering,
_x1876-1119 ;
_v424
520 _aThis book contains selected papers from the 8th International Conference on Information Science and Applications (ICISA 2017) and provides a snapshot of the latest issues encountered in technical convergence and convergences of security technology. It explores how information science is core to most current research, industrial and commercial activities and consists of contributions covering topics including Ubiquitous Computing, Networks and Information Systems, Multimedia and Visualization, Middleware and Operating Systems, Security and Privacy, Data Mining and Artificial Intelligence, Software Engineering, and Web Technology. The proceedings introduce the most recent information technology and ideas, applications and problems related to technology convergence, illustrated through case studies, and reviews converging existing security techniques. Through this volume, readers will gain an understanding of the current state-of-the-art information strategies and technologies of convergence security.The intended readerships are researchers in academia, industry and other research institutes focusing on information science and technology.
650 0 _aTelecommunication.
_910437
650 0 _aData protection.
_97245
650 0 _aComputational intelligence.
_97716
650 1 4 _aCommunications Engineering, Networks.
_931570
650 2 4 _aData and Information Security.
_931990
650 2 4 _aComputational Intelligence.
_97716
700 1 _aKim, Kuinam.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
_961715
700 1 _aJoukov, Nikolai.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
_961716
710 2 _aSpringerLink (Online service)
_961717
773 0 _tSpringer Nature eBook
776 0 8 _iPrinted edition:
_z9789811041532
776 0 8 _iPrinted edition:
_z9789811041556
776 0 8 _iPrinted edition:
_z9789811350641
830 0 _aLecture Notes in Electrical Engineering,
_x1876-1119 ;
_v424
_961718
856 4 0 _uhttps://doi.org/10.1007/978-981-10-4154-9
912 _aZDB-2-ENG
912 _aZDB-2-SXE
942 _cEBK
999 _c80814
_d80814