Intelligence and security informatics: techniques and applications
Gespeichert in:
Weitere Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Berlin ; Heidelberg
Springer
2008
|
Schriftenreihe: | Studies in computational intelligence
135 |
Schlagworte: | |
Online-Zugang: | DE-634 DE-898 Volltext |
Beschreibung: | Literaturangaben |
Beschreibung: | 1 Online-Ressource (XIII, 460 S.) Ill., graph. Darst. |
ISBN: | 9783540692072 9783540692096 |
DOI: | 10.1007/978-3-540-69209-6 |
Internformat
MARC
LEADER | 00000nam a2200000 cb4500 | ||
---|---|---|---|
001 | BV023471487 | ||
003 | DE-604 | ||
007 | cr|uuu---uuuuu | ||
008 | 080801s2008 xx ad|| o|||| 00||| eng d | ||
015 | |a 07,N03,0032 |2 dnb | ||
015 | |a 08,A30,0030 |2 dnb | ||
016 | 7 | |a 982335024 |2 DE-101 | |
020 | |a 9783540692072 |c Pp : EUR 181.85 (freier Pr.), sfr 152.50 (freier Pr.) |9 978-3-540-69207-2 | ||
020 | |a 9783540692096 |c Online |9 978-3-540-69209-6 | ||
024 | 7 | |a 10.1007/978-3-540-69209-6 |2 doi | |
024 | 3 | |a 9783540692072 | |
028 | 5 | 2 | |a 11737117 |
035 | |a (OCoLC)1184252797 | ||
035 | |a (DE-599)DNB982335024 | ||
040 | |a DE-604 |b ger |e rakddb | ||
041 | 0 | |a eng | |
049 | |a DE-898 |a DE-634 |a DE-83 | ||
082 | 0 | |a 005.8 |2 22/ger | |
082 | 0 | |a 006.37 |2 22/ger | |
082 | 0 | |a 006.312 |2 22/ger | |
084 | |a ST 277 |0 (DE-625)143643: |2 rvk | ||
084 | |a 004 |2 sdnb | ||
245 | 1 | 0 | |a Intelligence and security informatics |b techniques and applications |c Hsinchun Chen ... (ed.) |
264 | 1 | |a Berlin ; Heidelberg |b Springer |c 2008 | |
300 | |a 1 Online-Ressource (XIII, 460 S.) |b Ill., graph. Darst. | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
490 | 1 | |a Studies in computational intelligence |v 135 | |
500 | |a Literaturangaben | ||
650 | 0 | 7 | |a Schutz |0 (DE-588)4180271-8 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Objektverfolgung |0 (DE-588)4311226-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Data Mining |0 (DE-588)4428654-5 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Kryptoanalyse |0 (DE-588)4830502-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Infrastruktureinrichtung |0 (DE-588)4225796-7 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Computerkriminalität |0 (DE-588)4010452-7 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Maschinelles Sehen |0 (DE-588)4129594-8 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Datensicherung |0 (DE-588)4011144-1 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Authentifikation |0 (DE-588)4330656-1 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Zugriffskontrolle |0 (DE-588)4293034-0 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Privatsphäre |0 (DE-588)4123980-5 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Internet |0 (DE-588)4308416-3 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Social Media |0 (DE-588)4639271-3 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Innere Sicherheit |0 (DE-588)4127888-4 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Wissensextraktion |0 (DE-588)4546354-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Kamera |0 (DE-588)4366655-3 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Soziales Netzwerk |0 (DE-588)4055762-5 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Content Management |0 (DE-588)4673954-3 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Automatische Identifikation |0 (DE-588)4206098-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Technische Infrastruktur |0 (DE-588)4774721-3 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Bilderkennung |0 (DE-588)4264283-8 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Computerforensik |0 (DE-588)4774034-6 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Terrorismus |0 (DE-588)4059534-1 |2 gnd |9 rswk-swf |
655 | 7 | |0 (DE-588)4143413-4 |a Aufsatzsammlung |2 gnd-content | |
689 | 0 | 0 | |a Internet |0 (DE-588)4308416-3 |D s |
689 | 0 | 1 | |a Terrorismus |0 (DE-588)4059534-1 |D s |
689 | 0 | 2 | |a Content Management |0 (DE-588)4673954-3 |D s |
689 | 0 | 3 | |a Data Mining |0 (DE-588)4428654-5 |D s |
689 | 0 | 4 | |a Innere Sicherheit |0 (DE-588)4127888-4 |D s |
689 | 0 | |5 DE-604 | |
689 | 1 | 0 | |a Computerkriminalität |0 (DE-588)4010452-7 |D s |
689 | 1 | 1 | |a Computerforensik |0 (DE-588)4774034-6 |D s |
689 | 1 | 2 | |a Data Mining |0 (DE-588)4428654-5 |D s |
689 | 1 | 3 | |a Wissensextraktion |0 (DE-588)4546354-2 |D s |
689 | 1 | 4 | |a Kryptoanalyse |0 (DE-588)4830502-9 |D s |
689 | 1 | 5 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 1 | |5 DE-604 | |
689 | 2 | 0 | |a Technische Infrastruktur |0 (DE-588)4774721-3 |D s |
689 | 2 | 1 | |a Infrastruktureinrichtung |0 (DE-588)4225796-7 |D s |
689 | 2 | 2 | |a Schutz |0 (DE-588)4180271-8 |D s |
689 | 2 | 3 | |a Privatsphäre |0 (DE-588)4123980-5 |D s |
689 | 2 | 4 | |a Zugriffskontrolle |0 (DE-588)4293034-0 |D s |
689 | 2 | 5 | |a Authentifikation |0 (DE-588)4330656-1 |D s |
689 | 2 | |5 DE-604 | |
689 | 3 | 0 | |a Internet |0 (DE-588)4308416-3 |D s |
689 | 3 | 1 | |a Soziales Netzwerk |0 (DE-588)4055762-5 |D s |
689 | 3 | 2 | |a Social Media |0 (DE-588)4639271-3 |D s |
689 | 3 | 3 | |a Wissensextraktion |0 (DE-588)4546354-2 |D s |
689 | 3 | 4 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 3 | 5 | |a Datensicherung |0 (DE-588)4011144-1 |D s |
689 | 3 | |5 DE-604 | |
689 | 4 | 0 | |a Maschinelles Sehen |0 (DE-588)4129594-8 |D s |
689 | 4 | 1 | |a Bilderkennung |0 (DE-588)4264283-8 |D s |
689 | 4 | 2 | |a Automatische Identifikation |0 (DE-588)4206098-9 |D s |
689 | 4 | 3 | |a Objektverfolgung |0 (DE-588)4311226-2 |D s |
689 | 4 | 4 | |a Kamera |0 (DE-588)4366655-3 |D s |
689 | 4 | |5 DE-604 | |
700 | 1 | |a Chen, Hsinchun |4 edt | |
830 | 0 | |a Studies in computational intelligence |v 135 |w (DE-604)BV020822171 |9 135 | |
856 | 4 | 0 | |u https://doi.org/10.1007/978-3-540-69209-6 |x Verlag |3 Volltext |
912 | |a ZDB-2-ENG | ||
943 | 1 | |a oai:aleph.bib-bvb.de:BVB01-016653815 | |
966 | e | |u https://doi.org/10.1007/978-3-540-69209-6 |l DE-634 |p ZDB-2-ENG |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-540-69209-6 |l DE-898 |p ZDB-2-ENG |x Verlag |3 Volltext |
Datensatz im Suchindex
_version_ | 1817613143260528640 |
---|---|
adam_text | |
adam_txt | |
any_adam_object | |
any_adam_object_boolean | |
author2 | Chen, Hsinchun |
author2_role | edt |
author2_variant | h c hc |
author_facet | Chen, Hsinchun |
building | Verbundindex |
bvnumber | BV023471487 |
classification_rvk | ST 277 |
collection | ZDB-2-ENG |
ctrlnum | (OCoLC)1184252797 (DE-599)DNB982335024 |
dewey-full | 005.8 006.37 006.312 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security 006 - Special computer methods |
dewey-raw | 005.8 006.37 006.312 |
dewey-search | 005.8 006.37 006.312 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
discipline_str_mv | Informatik |
doi_str_mv | 10.1007/978-3-540-69209-6 |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>00000nam a2200000 cb4500</leader><controlfield tag="001">BV023471487</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">080801s2008 xx ad|| o|||| 00||| eng d</controlfield><datafield tag="015" ind1=" " ind2=" "><subfield code="a">07,N03,0032</subfield><subfield code="2">dnb</subfield></datafield><datafield tag="015" ind1=" " ind2=" "><subfield code="a">08,A30,0030</subfield><subfield code="2">dnb</subfield></datafield><datafield tag="016" ind1="7" ind2=" "><subfield code="a">982335024</subfield><subfield code="2">DE-101</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783540692072</subfield><subfield code="c">Pp : EUR 181.85 (freier Pr.), sfr 152.50 (freier Pr.)</subfield><subfield code="9">978-3-540-69207-2</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783540692096</subfield><subfield code="c">Online</subfield><subfield code="9">978-3-540-69209-6</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1007/978-3-540-69209-6</subfield><subfield code="2">doi</subfield></datafield><datafield tag="024" ind1="3" ind2=" "><subfield code="a">9783540692072</subfield></datafield><datafield tag="028" ind1="5" ind2="2"><subfield code="a">11737117</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1184252797</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)DNB982335024</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rakddb</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-898</subfield><subfield code="a">DE-634</subfield><subfield code="a">DE-83</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">22/ger</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">006.37</subfield><subfield code="2">22/ger</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">006.312</subfield><subfield code="2">22/ger</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 277</subfield><subfield code="0">(DE-625)143643:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">004</subfield><subfield code="2">sdnb</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Intelligence and security informatics</subfield><subfield code="b">techniques and applications</subfield><subfield code="c">Hsinchun Chen ... (ed.)</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Berlin ; Heidelberg</subfield><subfield code="b">Springer</subfield><subfield code="c">2008</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (XIII, 460 S.)</subfield><subfield code="b">Ill., graph. Darst.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">Studies in computational intelligence</subfield><subfield code="v">135</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Literaturangaben</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Schutz</subfield><subfield code="0">(DE-588)4180271-8</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Objektverfolgung</subfield><subfield code="0">(DE-588)4311226-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Data Mining</subfield><subfield code="0">(DE-588)4428654-5</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kryptoanalyse</subfield><subfield code="0">(DE-588)4830502-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Infrastruktureinrichtung</subfield><subfield code="0">(DE-588)4225796-7</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computerkriminalität</subfield><subfield code="0">(DE-588)4010452-7</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Maschinelles Sehen</subfield><subfield code="0">(DE-588)4129594-8</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Authentifikation</subfield><subfield code="0">(DE-588)4330656-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Zugriffskontrolle</subfield><subfield code="0">(DE-588)4293034-0</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Privatsphäre</subfield><subfield code="0">(DE-588)4123980-5</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Internet</subfield><subfield code="0">(DE-588)4308416-3</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Social Media</subfield><subfield code="0">(DE-588)4639271-3</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Innere Sicherheit</subfield><subfield code="0">(DE-588)4127888-4</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Wissensextraktion</subfield><subfield code="0">(DE-588)4546354-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kamera</subfield><subfield code="0">(DE-588)4366655-3</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Soziales Netzwerk</subfield><subfield code="0">(DE-588)4055762-5</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Content Management</subfield><subfield code="0">(DE-588)4673954-3</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Automatische Identifikation</subfield><subfield code="0">(DE-588)4206098-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Technische Infrastruktur</subfield><subfield code="0">(DE-588)4774721-3</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Bilderkennung</subfield><subfield code="0">(DE-588)4264283-8</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computerforensik</subfield><subfield code="0">(DE-588)4774034-6</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Terrorismus</subfield><subfield code="0">(DE-588)4059534-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)4143413-4</subfield><subfield code="a">Aufsatzsammlung</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Internet</subfield><subfield code="0">(DE-588)4308416-3</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Terrorismus</subfield><subfield code="0">(DE-588)4059534-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Content Management</subfield><subfield code="0">(DE-588)4673954-3</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="3"><subfield code="a">Data Mining</subfield><subfield code="0">(DE-588)4428654-5</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="4"><subfield code="a">Innere Sicherheit</subfield><subfield code="0">(DE-588)4127888-4</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="1" ind2="0"><subfield code="a">Computerkriminalität</subfield><subfield code="0">(DE-588)4010452-7</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="1"><subfield code="a">Computerforensik</subfield><subfield code="0">(DE-588)4774034-6</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="2"><subfield code="a">Data Mining</subfield><subfield code="0">(DE-588)4428654-5</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="3"><subfield code="a">Wissensextraktion</subfield><subfield code="0">(DE-588)4546354-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="4"><subfield code="a">Kryptoanalyse</subfield><subfield code="0">(DE-588)4830502-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="5"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="2" ind2="0"><subfield code="a">Technische Infrastruktur</subfield><subfield code="0">(DE-588)4774721-3</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="2" ind2="1"><subfield code="a">Infrastruktureinrichtung</subfield><subfield code="0">(DE-588)4225796-7</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="2" ind2="2"><subfield code="a">Schutz</subfield><subfield code="0">(DE-588)4180271-8</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="2" ind2="3"><subfield code="a">Privatsphäre</subfield><subfield code="0">(DE-588)4123980-5</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="2" ind2="4"><subfield code="a">Zugriffskontrolle</subfield><subfield code="0">(DE-588)4293034-0</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="2" ind2="5"><subfield code="a">Authentifikation</subfield><subfield code="0">(DE-588)4330656-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="2" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="3" ind2="0"><subfield code="a">Internet</subfield><subfield code="0">(DE-588)4308416-3</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="3" ind2="1"><subfield code="a">Soziales Netzwerk</subfield><subfield code="0">(DE-588)4055762-5</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="3" ind2="2"><subfield code="a">Social Media</subfield><subfield code="0">(DE-588)4639271-3</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="3" ind2="3"><subfield code="a">Wissensextraktion</subfield><subfield code="0">(DE-588)4546354-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="3" ind2="4"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="3" ind2="5"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="3" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="4" ind2="0"><subfield code="a">Maschinelles Sehen</subfield><subfield code="0">(DE-588)4129594-8</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="4" ind2="1"><subfield code="a">Bilderkennung</subfield><subfield code="0">(DE-588)4264283-8</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="4" ind2="2"><subfield code="a">Automatische Identifikation</subfield><subfield code="0">(DE-588)4206098-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="4" ind2="3"><subfield code="a">Objektverfolgung</subfield><subfield code="0">(DE-588)4311226-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="4" ind2="4"><subfield code="a">Kamera</subfield><subfield code="0">(DE-588)4366655-3</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="4" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Chen, Hsinchun</subfield><subfield code="4">edt</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">Studies in computational intelligence</subfield><subfield code="v">135</subfield><subfield code="w">(DE-604)BV020822171</subfield><subfield code="9">135</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1007/978-3-540-69209-6</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-2-ENG</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-016653815</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-540-69209-6</subfield><subfield code="l">DE-634</subfield><subfield code="p">ZDB-2-ENG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-540-69209-6</subfield><subfield code="l">DE-898</subfield><subfield code="p">ZDB-2-ENG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
genre | (DE-588)4143413-4 Aufsatzsammlung gnd-content |
genre_facet | Aufsatzsammlung |
id | DE-604.BV023471487 |
illustrated | Illustrated |
index_date | 2024-07-02T21:34:31Z |
indexdate | 2024-12-05T15:02:50Z |
institution | BVB |
isbn | 9783540692072 9783540692096 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-016653815 |
oclc_num | 1184252797 |
open_access_boolean | |
owner | DE-898 DE-BY-UBR DE-634 DE-83 |
owner_facet | DE-898 DE-BY-UBR DE-634 DE-83 |
physical | 1 Online-Ressource (XIII, 460 S.) Ill., graph. Darst. |
psigel | ZDB-2-ENG |
publishDate | 2008 |
publishDateSearch | 2008 |
publishDateSort | 2008 |
publisher | Springer |
record_format | marc |
series | Studies in computational intelligence |
series2 | Studies in computational intelligence |
spelling | Intelligence and security informatics techniques and applications Hsinchun Chen ... (ed.) Berlin ; Heidelberg Springer 2008 1 Online-Ressource (XIII, 460 S.) Ill., graph. Darst. txt rdacontent c rdamedia cr rdacarrier Studies in computational intelligence 135 Literaturangaben Schutz (DE-588)4180271-8 gnd rswk-swf Objektverfolgung (DE-588)4311226-2 gnd rswk-swf Data Mining (DE-588)4428654-5 gnd rswk-swf Kryptoanalyse (DE-588)4830502-9 gnd rswk-swf Computersicherheit (DE-588)4274324-2 gnd rswk-swf Infrastruktureinrichtung (DE-588)4225796-7 gnd rswk-swf Computerkriminalität (DE-588)4010452-7 gnd rswk-swf Maschinelles Sehen (DE-588)4129594-8 gnd rswk-swf Datensicherung (DE-588)4011144-1 gnd rswk-swf Authentifikation (DE-588)4330656-1 gnd rswk-swf Zugriffskontrolle (DE-588)4293034-0 gnd rswk-swf Privatsphäre (DE-588)4123980-5 gnd rswk-swf Internet (DE-588)4308416-3 gnd rswk-swf Social Media (DE-588)4639271-3 gnd rswk-swf Innere Sicherheit (DE-588)4127888-4 gnd rswk-swf Wissensextraktion (DE-588)4546354-2 gnd rswk-swf Kamera (DE-588)4366655-3 gnd rswk-swf Soziales Netzwerk (DE-588)4055762-5 gnd rswk-swf Content Management (DE-588)4673954-3 gnd rswk-swf Automatische Identifikation (DE-588)4206098-9 gnd rswk-swf Technische Infrastruktur (DE-588)4774721-3 gnd rswk-swf Bilderkennung (DE-588)4264283-8 gnd rswk-swf Computerforensik (DE-588)4774034-6 gnd rswk-swf Terrorismus (DE-588)4059534-1 gnd rswk-swf (DE-588)4143413-4 Aufsatzsammlung gnd-content Internet (DE-588)4308416-3 s Terrorismus (DE-588)4059534-1 s Content Management (DE-588)4673954-3 s Data Mining (DE-588)4428654-5 s Innere Sicherheit (DE-588)4127888-4 s DE-604 Computerkriminalität (DE-588)4010452-7 s Computerforensik (DE-588)4774034-6 s Wissensextraktion (DE-588)4546354-2 s Kryptoanalyse (DE-588)4830502-9 s Computersicherheit (DE-588)4274324-2 s Technische Infrastruktur (DE-588)4774721-3 s Infrastruktureinrichtung (DE-588)4225796-7 s Schutz (DE-588)4180271-8 s Privatsphäre (DE-588)4123980-5 s Zugriffskontrolle (DE-588)4293034-0 s Authentifikation (DE-588)4330656-1 s Soziales Netzwerk (DE-588)4055762-5 s Social Media (DE-588)4639271-3 s Datensicherung (DE-588)4011144-1 s Maschinelles Sehen (DE-588)4129594-8 s Bilderkennung (DE-588)4264283-8 s Automatische Identifikation (DE-588)4206098-9 s Objektverfolgung (DE-588)4311226-2 s Kamera (DE-588)4366655-3 s Chen, Hsinchun edt Studies in computational intelligence 135 (DE-604)BV020822171 135 https://doi.org/10.1007/978-3-540-69209-6 Verlag Volltext |
spellingShingle | Intelligence and security informatics techniques and applications Studies in computational intelligence Schutz (DE-588)4180271-8 gnd Objektverfolgung (DE-588)4311226-2 gnd Data Mining (DE-588)4428654-5 gnd Kryptoanalyse (DE-588)4830502-9 gnd Computersicherheit (DE-588)4274324-2 gnd Infrastruktureinrichtung (DE-588)4225796-7 gnd Computerkriminalität (DE-588)4010452-7 gnd Maschinelles Sehen (DE-588)4129594-8 gnd Datensicherung (DE-588)4011144-1 gnd Authentifikation (DE-588)4330656-1 gnd Zugriffskontrolle (DE-588)4293034-0 gnd Privatsphäre (DE-588)4123980-5 gnd Internet (DE-588)4308416-3 gnd Social Media (DE-588)4639271-3 gnd Innere Sicherheit (DE-588)4127888-4 gnd Wissensextraktion (DE-588)4546354-2 gnd Kamera (DE-588)4366655-3 gnd Soziales Netzwerk (DE-588)4055762-5 gnd Content Management (DE-588)4673954-3 gnd Automatische Identifikation (DE-588)4206098-9 gnd Technische Infrastruktur (DE-588)4774721-3 gnd Bilderkennung (DE-588)4264283-8 gnd Computerforensik (DE-588)4774034-6 gnd Terrorismus (DE-588)4059534-1 gnd |
subject_GND | (DE-588)4180271-8 (DE-588)4311226-2 (DE-588)4428654-5 (DE-588)4830502-9 (DE-588)4274324-2 (DE-588)4225796-7 (DE-588)4010452-7 (DE-588)4129594-8 (DE-588)4011144-1 (DE-588)4330656-1 (DE-588)4293034-0 (DE-588)4123980-5 (DE-588)4308416-3 (DE-588)4639271-3 (DE-588)4127888-4 (DE-588)4546354-2 (DE-588)4366655-3 (DE-588)4055762-5 (DE-588)4673954-3 (DE-588)4206098-9 (DE-588)4774721-3 (DE-588)4264283-8 (DE-588)4774034-6 (DE-588)4059534-1 (DE-588)4143413-4 |
title | Intelligence and security informatics techniques and applications |
title_auth | Intelligence and security informatics techniques and applications |
title_exact_search | Intelligence and security informatics techniques and applications |
title_exact_search_txtP | Intelligence and security informatics techniques and applications |
title_full | Intelligence and security informatics techniques and applications Hsinchun Chen ... (ed.) |
title_fullStr | Intelligence and security informatics techniques and applications Hsinchun Chen ... (ed.) |
title_full_unstemmed | Intelligence and security informatics techniques and applications Hsinchun Chen ... (ed.) |
title_short | Intelligence and security informatics |
title_sort | intelligence and security informatics techniques and applications |
title_sub | techniques and applications |
topic | Schutz (DE-588)4180271-8 gnd Objektverfolgung (DE-588)4311226-2 gnd Data Mining (DE-588)4428654-5 gnd Kryptoanalyse (DE-588)4830502-9 gnd Computersicherheit (DE-588)4274324-2 gnd Infrastruktureinrichtung (DE-588)4225796-7 gnd Computerkriminalität (DE-588)4010452-7 gnd Maschinelles Sehen (DE-588)4129594-8 gnd Datensicherung (DE-588)4011144-1 gnd Authentifikation (DE-588)4330656-1 gnd Zugriffskontrolle (DE-588)4293034-0 gnd Privatsphäre (DE-588)4123980-5 gnd Internet (DE-588)4308416-3 gnd Social Media (DE-588)4639271-3 gnd Innere Sicherheit (DE-588)4127888-4 gnd Wissensextraktion (DE-588)4546354-2 gnd Kamera (DE-588)4366655-3 gnd Soziales Netzwerk (DE-588)4055762-5 gnd Content Management (DE-588)4673954-3 gnd Automatische Identifikation (DE-588)4206098-9 gnd Technische Infrastruktur (DE-588)4774721-3 gnd Bilderkennung (DE-588)4264283-8 gnd Computerforensik (DE-588)4774034-6 gnd Terrorismus (DE-588)4059534-1 gnd |
topic_facet | Schutz Objektverfolgung Data Mining Kryptoanalyse Computersicherheit Infrastruktureinrichtung Computerkriminalität Maschinelles Sehen Datensicherung Authentifikation Zugriffskontrolle Privatsphäre Internet Social Media Innere Sicherheit Wissensextraktion Kamera Soziales Netzwerk Content Management Automatische Identifikation Technische Infrastruktur Bilderkennung Computerforensik Terrorismus Aufsatzsammlung |
url | https://doi.org/10.1007/978-3-540-69209-6 |
volume_link | (DE-604)BV020822171 |
work_keys_str_mv | AT chenhsinchun intelligenceandsecurityinformaticstechniquesandapplications |