000 | 03032nam a22006255i 4500 | ||
---|---|---|---|
001 | 978-3-030-17982-3 | ||
003 | DE-He213 | ||
005 | 20240730171714.0 | ||
007 | cr nn 008mamaa | ||
008 | 190411s2019 sz | s |||| 0|eng d | ||
020 |
_a9783030179823 _9978-3-030-17982-3 |
||
024 | 7 |
_a10.1007/978-3-030-17982-3 _2doi |
|
050 | 4 | _aQA76.9.A25 | |
072 | 7 |
_aUR _2bicssc |
|
072 | 7 |
_aUTN _2bicssc |
|
072 | 7 |
_aCOM053000 _2bisacsh |
|
072 | 7 |
_aUR _2thema |
|
072 | 7 |
_aUTN _2thema |
|
082 | 0 | 4 |
_a005.8 _223 |
245 | 1 | 0 |
_aInformation Security Applications _h[electronic resource] : _b19th International Conference, WISA 2018, Jeju Island, Korea, August 23-25, 2018, Revised Selected Papers / _cedited by Brent ByungHoon Kang, JinSoo Jang. |
250 | _a1st ed. 2019. | ||
264 | 1 |
_aCham : _bSpringer International Publishing : _bImprint: Springer, _c2019. |
|
300 |
_aX, 267 p. 95 illus., 52 illus. in color. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
490 | 1 |
_aSecurity and Cryptology, _x2946-1863 ; _v11402 |
|
505 | 0 | _aSystems Security -- Analysis and Visualization of Threats -- Applied Crypto. | |
520 | _aThis book constitutes the thoroughly refereed post-conference proceedings of the 19th International Conference on Information Security Applications, WISA 2018, held on Jeju Island, Korea, in August 2018. The 11 revised full papers and 11 short papers presented in this volume were carefully reviewed and selected from 44 submissions. # The primary focus of WISA 2018 was on systems and network security including all other technical and practical aspects of security applications and also on the embedded, unmanned or autonomous systems and cyber physical systems in general. | ||
650 | 0 |
_aData protection. _97245 |
|
650 | 0 |
_aComputer networks . _931572 |
|
650 | 0 |
_aComputers. _98172 |
|
650 | 0 |
_aComputer engineering. _910164 |
|
650 | 0 |
_aArtificial intelligence. _93407 |
|
650 | 1 | 4 |
_aData and Information Security. _931990 |
650 | 2 | 4 |
_aComputer Communication Networks. _9100066 |
650 | 2 | 4 |
_aComputing Milieux. _955441 |
650 | 2 | 4 |
_aComputer Engineering and Networks. _9100067 |
650 | 2 | 4 |
_aArtificial Intelligence. _93407 |
700 | 1 |
_aKang, Brent ByungHoon. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _9100068 |
|
700 | 1 |
_aJang, JinSoo. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _9100070 |
|
710 | 2 |
_aSpringerLink (Online service) _9100072 |
|
773 | 0 | _tSpringer Nature eBook | |
776 | 0 | 8 |
_iPrinted edition: _z9783030179816 |
776 | 0 | 8 |
_iPrinted edition: _z9783030179830 |
830 | 0 |
_aSecurity and Cryptology, _x2946-1863 ; _v11402 _9100074 |
|
856 | 4 | 0 | _uhttps://doi.org/10.1007/978-3-030-17982-3 |
912 | _aZDB-2-SCS | ||
912 | _aZDB-2-SXCS | ||
912 | _aZDB-2-LNC | ||
942 | _cELN | ||
999 |
_c87770 _d87770 |