000 03393nam a22006735i 4500
001 978-3-030-34637-9
003 DE-He213
005 20240730165252.0
007 cr nn 008mamaa
008 191109s2019 sz | s |||| 0|eng d
020 _a9783030346379
_9978-3-030-34637-9
024 7 _a10.1007/978-3-030-34637-9
_2doi
050 4 _aQA76.9.A25
072 7 _aUR
_2bicssc
072 7 _aUTN
_2bicssc
072 7 _aCOM053000
_2bisacsh
072 7 _aUR
_2thema
072 7 _aUTN
_2thema
082 0 4 _a005.8
_223
245 1 0 _aScience of Cyber Security
_h[electronic resource] :
_bSecond International Conference, SciSec 2019, Nanjing, China, August 9-11, 2019, Revised Selected Papers /
_cedited by Feng Liu, Jia Xu, Shouhuai Xu, Moti Yung.
250 _a1st ed. 2019.
264 1 _aCham :
_bSpringer International Publishing :
_bImprint: Springer,
_c2019.
300 _aXIII, 382 p. 165 illus., 99 illus. in color.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
490 1 _aSecurity and Cryptology,
_x2946-1863 ;
_v11933
505 0 _aArtificial Intelligence for Cybersecurity -- Machine Learning for Cybersecurity -- Attack and Defense -- Blockchain, Attack and Defense -- Encryption and Application.
520 _aThis book constitutes the proceedings of the Second International Conference on Science of Cyber Security, SciSec 2019, held in Nanjing, China, in August 2019. The 20 full papers and 8 short papers presented in this volume were carefully reviewed and selected from 62 submissions. These papers cover the following subjects: Artificial Intelligence for Cybersecurity, Machine Learning for Cybersecurity, and Mechanisms for Solving Actual Cybersecurity Problems (e.g., Blockchain, Attack and Defense; Encryptions with Cybersecurity Applications). .
650 0 _aData protection.
_97245
650 0 _aSoftware engineering.
_94138
650 0 _aComputers and civilization.
_921733
650 0 _aSocial sciences
_xData processing.
_983360
650 0 _aComputer networks .
_931572
650 0 _aDatabase management.
_93157
650 1 4 _aData and Information Security.
_931990
650 2 4 _aSoftware Engineering.
_94138
650 2 4 _aComputers and Society.
_931668
650 2 4 _aComputer Application in Social and Behavioral Sciences.
_931815
650 2 4 _aComputer Communication Networks.
_988139
650 2 4 _aDatabase Management.
_93157
700 1 _aLiu, Feng.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
_988140
700 1 _aXu, Jia.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
_988142
700 1 _aXu, Shouhuai.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
_988143
700 1 _aYung, Moti.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
_988144
710 2 _aSpringerLink (Online service)
_988145
773 0 _tSpringer Nature eBook
776 0 8 _iPrinted edition:
_z9783030346362
776 0 8 _iPrinted edition:
_z9783030346386
830 0 _aSecurity and Cryptology,
_x2946-1863 ;
_v11933
_988147
856 4 0 _uhttps://doi.org/10.1007/978-3-030-34637-9
912 _aZDB-2-SCS
912 _aZDB-2-SXCS
912 _aZDB-2-LNC
942 _cELN
999 _c86207
_d86207