Computer network security: 6th International Conference on Mathematical Methods, Models and Architectures for Computer Network Security, MMM-ACNS 2012, St. Petersburg, Russia, October 17 - 19, 2012 ; proceedings
Gespeichert in:
Format: | Tagungsbericht Buch |
---|---|
Sprache: | English |
Veröffentlicht: |
Berlin [u.a.]
Springer
2012
|
Schriftenreihe: | Lecture notes in computer science
7531 |
Schlagworte: | |
Online-Zugang: | Inhaltstext Inhaltsverzeichnis |
Beschreibung: | XIII, 318 S. graph. Darst. |
ISBN: | 9783642337031 |
Internformat
MARC
LEADER | 00000nam a2200000 cb4500 | ||
---|---|---|---|
001 | BV040487446 | ||
003 | DE-604 | ||
005 | 20130227 | ||
007 | t| | ||
008 | 121017s2012 gw d||| |||| 10||| eng d | ||
015 | |a 12,N35 |2 dnb | ||
016 | 7 | |a 1025399196 |2 DE-101 | |
020 | |a 9783642337031 |9 978-3-642-33703-1 | ||
020 | |a 9783642337031 |c Pb. : ca. EUR 57.78 (DE) (freier Pr.), ca. EUR 59.40 (AT) (freier Pr.), ca. sfr 72.00 (freier Pr.) |9 978-3-642-33703-1 | ||
024 | 3 | |a 9783642337031 | |
028 | 5 | 2 | |a Best.-Nr.: 86159698 |
035 | |a (OCoLC)816252836 | ||
035 | |a (DE-599)DNB1025399196 | ||
040 | |a DE-604 |b ger |e rakddb | ||
041 | 0 | |a eng | |
044 | |a gw |c XA-DE-BE | ||
049 | |a DE-706 |a DE-83 |a DE-11 |a DE-91G | ||
082 | 0 | |a 005.8 |2 22/ger | |
084 | |a DAT 462f |2 stub | ||
084 | |a 004 |2 sdnb | ||
084 | |a DAT 461f |2 stub | ||
084 | |a DAT 465f |2 stub | ||
245 | 1 | 0 | |a Computer network security |b 6th International Conference on Mathematical Methods, Models and Architectures for Computer Network Security, MMM-ACNS 2012, St. Petersburg, Russia, October 17 - 19, 2012 ; proceedings |c Igor Kotenko ... (eds.) |
264 | 1 | |a Berlin [u.a.] |b Springer |c 2012 | |
300 | |a XIII, 318 S. |b graph. Darst. | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
490 | 1 | |a Lecture notes in computer science |v 7531 | |
650 | 0 | 7 | |a Datensicherung |0 (DE-588)4011144-1 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Rechnernetz |0 (DE-588)4070085-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
655 | 7 | |0 (DE-588)1071861417 |a Konferenzschrift |y 2012 |z Sankt Petersburg |2 gnd-content | |
689 | 0 | 0 | |a Rechnernetz |0 (DE-588)4070085-9 |D s |
689 | 0 | 1 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 0 | 2 | |a Datensicherung |0 (DE-588)4011144-1 |D s |
689 | 0 | |5 DE-604 | |
700 | 1 | |a Kotenko, Igor |e Sonstige |0 (DE-588)142070238 |4 oth | |
711 | 2 | |a International Conference on Mathematical Methods, Models and Architectures for Computer Network Security |n 6 |d 2012 |c Sankt Petersburg |j Sonstige |0 (DE-588)1026925223 |4 oth | |
776 | 0 | 8 | |i Erscheint auch als |n Online-Ausgabe |z 978-3-642-33704-8 |
830 | 0 | |a Lecture notes in computer science |v 7531 |w (DE-604)BV000000607 |9 7531 | |
856 | 4 | 2 | |m X:MVB |q text/html |u http://deposit.dnb.de/cgi-bin/dokserv?id=4107686&prov=M&dok_var=1&dok_ext=htm |3 Inhaltstext |
856 | 4 | 2 | |m DNB Datenaustausch |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=025334535&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
943 | 1 | |a oai:aleph.bib-bvb.de:BVB01-025334535 |
Datensatz im Suchindex
_version_ | 1820875428019044352 |
---|---|
adam_text |
IMAGE 1
TABLE O F C O N T E N T S
INVITED P A P E R S FINDING MALWARE ON A WEB SCALE 1
BENJAMIN LIVSHITS
EXPOSING SECURITY RISKS FOR COMMERCIAL MOBILE DEVICES 3
ZHAOHUI WANG, RYAN JOHNSON, RAHUL MURMURIA, AND ANGELOS STAVROU
FROM QUALITATIVE TO QUANTITATIVE ENFORCEMENT OF SECURITY POLICY 22
FABIO MARTINELLI, ILARIA MATTEUCCI, AND CHARLES MORISSET
DESIGN AND IMPLEMENTATION OF A CLOUD-BASED ASSURED INFORMATION SHARING
SYSTEM 36
TYRONE CADENHEAD, MURAT KANTARCIOGLU, VAIBHAV KHADILKAR, AND BHAVANI
THURAISINGHAM
A P P L I E D C R Y P T O G R A P H Y A N D S E C U R I T Y P R O T O C
O L S
OPTIMIZATION OF KEY DISTRIBUTION PROTOCOLS BASED ON EXTRACTORS FOR NOISY
CHANNELS WITHIN ACTIVE ADVERSARIES 51
VICTOR YAKOVLEV, VALERY KORZHIK, MIHAIL BAKAEV. AND, GUILLERMO
MORALES-LUNA
A VULNERABILITY IN THE UMTS AND LTE AUTHENTICATION AND KEY AGREEMENT
PROTOCOLS 65
JOE-KAI TSAY AND STIG F. MJ0LSNES
BLIND 384-BIT DIGITAL SIGNATURE SCHEME 77
ALEXANDR MOLDOVYAN, NIKOLAY MOLDOVYAN, AND EUGENIA NOUIKOUA
A C C E S S C O N T R O L A N D I N F O R M A T I O N P R O T E C T I O
N
RABAC: ROLE-CENTRIC ATTRIBUTE-BASED ACCESS CONTROL 84
X I N JIN, RAUI SANDHU, AND R A M KRISHNAN
TRUST-AWARE RBAC 97
VLADIMIR OLESHCHUK
ALTERNATIVE MECHANISMS FOR INFORMATION SECURITY 108
ALEXANDER GRUSHO, NICK GRUSHO, AND ELENA TIMONINA
HTTP://D-NB.INFO/1025399196
IMAGE 2
S E C U R I T Y POLICIES
ENFORCING INFORMATION FLOW POLICIES BY A THREE-VALUED ANALYSIS 114 JOSEE
DESHARNAIS, ERWANNE P. KANYABWERO, AND NADIA TAWBI
TOWARDS THE ORCHESTRATION OF SECURED SERVICES UNDER NON-DISCLOSURE
POLICIES 130
TIGRAN AVANESOV, YANNICK CHEVALIER, MICHAEL RUSINOWITCH, AND MATHIEU
TURUANI
AN APPROACH FOR NETWORK INFORMATION FLOW ANALYSIS FOR SYSTEMS OF
EMBEDDED COMPONENTS 146
AUDREY CHECHULIN, IGOR KOTENKO, AND VASILY DESNITSKY
S E C U R I T Y E V E N T A N D I N F O R M A T I O N M A N A G E M E N
T
INDIVIDUAL COUNTERMEASURE SELECTION BASED ON T H E RETURN O N RESPONSE
INVESTMENT INDEX 156
GUSTAVO GONZALEZ GRANADILLO, HERUE DEBAR, GREGOIRE JACOB, CHRYSTEL
GABER, AND MOHAMMED ACHEMLAL
SECURITY AND RELIABILITY REQUIREMENTS FOR ADVANCED SECURITY EVENT
MANAGEMENT 171
ROLAND RIEKE, LUIGI COPPOLINO, ANDREW HUTCHISON, ELSA PNETO, AND
CHRYSTEL GABER
MODEL-BASED SECURITY EVENT MANAGEMENT 181
JULIAN SCHIITTE, ROLAND RIEKE, AND TIMO WINKELVOS
I N T R U S I O N P R E V E N T I O N , D E T E C T I O N , A N D R E S
P O N S E
USING BEHAVIORAL MODELING AND CUSTOMIZED NORMALCY PROFILES AS PROTECTION
AGAINST TARGETED CYBER-ATTACKS 191
ANDREY DOLGIKH, TOMAS NYKODYM, VICTOR SKORMIN, AND ZACHARY BIRNBAUM
LIMITATION OF HONEYPOT/HONEYNET DATABASES T O ENHANCE ALERT CORRELATION
203
YOSRA BEN MUSTAPHA, HERVE DEBAR, AND GREGOIRE JACOB
STOCHASTIC MODEL OF INTERACTION BETWEEN BOTNETS AND DISTRIBUTED COMPUTER
DEFENSE SYSTEMS 218
DMITRY P. ZEGZHDA AND TATIANA V. STEPANOVA
IMAGE 3
A N T I - M A L W A R E T E C H N I Q U E S
MALWARE CHARACTERIZATION USING BEHAVIORAL COMPONENTS 226
CHAITANYA YAVVARI, A M U R TOKHTABAYEV, HUZEFA RANGWALA, AND ANGELOS
STAVROU
MADAM: A MULTI-LEVEL ANOMALY DETECTOR FOR ANDROID MALWARE 240 GIANLUCA
DINI, FABIO MARTINELLI, ANDREA SARACINO, AND DANIELE SGANDURRA
USING LOW-LEVEL DYNAMIC ATTRIBUTES FOR MALWARE DETECTION BASED ON DATA
MINING METHODS 254
DMITRY KOMASHINSKIY AND IGOR KOTENKO
S E C U R I T Y M O D E L I N G A N D C L O U D S E C U R I T Y
CONFIGURATION-BASED APPROACH T O EMBEDDED DEVICE SECURITY 270
VASILY DESNITSKY, IGOR KOTENKO, AND ANDREY CHECHULIN
A STUDY OF ENTROPY SOURCES IN CLOUD COMPUTERS: RANDOM NUMBER GENERATION
ON CLOUD HOSTS 286
BRENDAN KERRIGAN AND YU CHEN
SECURITY MODELING OF GRID SYSTEMS USING PETRI NETS 299
PETER D. ZEGZHDA, DMITRY P. ZEGZHDA, MAXIM 0 . KALININ, AND ARTEM S.
KONOPLEV
USING GRAPH THEORY FOR CLOUD SYSTEM SECURITY MODELING 309
PETER D. ZEGZHDA, DMITRY P. ZEGZHDA, AND ALEXEY V. NIKOLSKIY
A U T H O R I N D E X 319 |
any_adam_object | 1 |
author_GND | (DE-588)142070238 |
building | Verbundindex |
bvnumber | BV040487446 |
classification_rvk | SS 4800 |
classification_tum | DAT 462f DAT 461f DAT 465f |
ctrlnum | (OCoLC)816252836 (DE-599)DNB1025399196 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Conference Proceeding Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>00000nam a2200000 cb4500</leader><controlfield tag="001">BV040487446</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20130227</controlfield><controlfield tag="007">t|</controlfield><controlfield tag="008">121017s2012 gw d||| |||| 10||| eng d</controlfield><datafield tag="015" ind1=" " ind2=" "><subfield code="a">12,N35</subfield><subfield code="2">dnb</subfield></datafield><datafield tag="016" ind1="7" ind2=" "><subfield code="a">1025399196</subfield><subfield code="2">DE-101</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783642337031</subfield><subfield code="9">978-3-642-33703-1</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783642337031</subfield><subfield code="c">Pb. : ca. EUR 57.78 (DE) (freier Pr.), ca. EUR 59.40 (AT) (freier Pr.), ca. sfr 72.00 (freier Pr.)</subfield><subfield code="9">978-3-642-33703-1</subfield></datafield><datafield tag="024" ind1="3" ind2=" "><subfield code="a">9783642337031</subfield></datafield><datafield tag="028" ind1="5" ind2="2"><subfield code="a">Best.-Nr.: 86159698</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)816252836</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)DNB1025399196</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rakddb</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="044" ind1=" " ind2=" "><subfield code="a">gw</subfield><subfield code="c">XA-DE-BE</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-706</subfield><subfield code="a">DE-83</subfield><subfield code="a">DE-11</subfield><subfield code="a">DE-91G</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">22/ger</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 462f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">004</subfield><subfield code="2">sdnb</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 461f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 465f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Computer network security</subfield><subfield code="b">6th International Conference on Mathematical Methods, Models and Architectures for Computer Network Security, MMM-ACNS 2012, St. Petersburg, Russia, October 17 - 19, 2012 ; proceedings</subfield><subfield code="c">Igor Kotenko ... (eds.)</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Berlin [u.a.]</subfield><subfield code="b">Springer</subfield><subfield code="c">2012</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">XIII, 318 S.</subfield><subfield code="b">graph. Darst.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">Lecture notes in computer science</subfield><subfield code="v">7531</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Rechnernetz</subfield><subfield code="0">(DE-588)4070085-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)1071861417</subfield><subfield code="a">Konferenzschrift</subfield><subfield code="y">2012</subfield><subfield code="z">Sankt Petersburg</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Rechnernetz</subfield><subfield code="0">(DE-588)4070085-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Kotenko, Igor</subfield><subfield code="e">Sonstige</subfield><subfield code="0">(DE-588)142070238</subfield><subfield code="4">oth</subfield></datafield><datafield tag="711" ind1="2" ind2=" "><subfield code="a">International Conference on Mathematical Methods, Models and Architectures for Computer Network Security</subfield><subfield code="n">6</subfield><subfield code="d">2012</subfield><subfield code="c">Sankt Petersburg</subfield><subfield code="j">Sonstige</subfield><subfield code="0">(DE-588)1026925223</subfield><subfield code="4">oth</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Online-Ausgabe</subfield><subfield code="z">978-3-642-33704-8</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">Lecture notes in computer science</subfield><subfield code="v">7531</subfield><subfield code="w">(DE-604)BV000000607</subfield><subfield code="9">7531</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">X:MVB</subfield><subfield code="q">text/html</subfield><subfield code="u">http://deposit.dnb.de/cgi-bin/dokserv?id=4107686&prov=M&dok_var=1&dok_ext=htm</subfield><subfield code="3">Inhaltstext</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">DNB Datenaustausch</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=025334535&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-025334535</subfield></datafield></record></collection> |
genre | (DE-588)1071861417 Konferenzschrift 2012 Sankt Petersburg gnd-content |
genre_facet | Konferenzschrift 2012 Sankt Petersburg |
id | DE-604.BV040487446 |
illustrated | Illustrated |
indexdate | 2025-01-10T15:15:27Z |
institution | BVB |
institution_GND | (DE-588)1026925223 |
isbn | 9783642337031 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-025334535 |
oclc_num | 816252836 |
open_access_boolean | |
owner | DE-706 DE-83 DE-11 DE-91G DE-BY-TUM |
owner_facet | DE-706 DE-83 DE-11 DE-91G DE-BY-TUM |
physical | XIII, 318 S. graph. Darst. |
publishDate | 2012 |
publishDateSearch | 2012 |
publishDateSort | 2012 |
publisher | Springer |
record_format | marc |
series | Lecture notes in computer science |
series2 | Lecture notes in computer science |
spelling | Computer network security 6th International Conference on Mathematical Methods, Models and Architectures for Computer Network Security, MMM-ACNS 2012, St. Petersburg, Russia, October 17 - 19, 2012 ; proceedings Igor Kotenko ... (eds.) Berlin [u.a.] Springer 2012 XIII, 318 S. graph. Darst. txt rdacontent n rdamedia nc rdacarrier Lecture notes in computer science 7531 Datensicherung (DE-588)4011144-1 gnd rswk-swf Rechnernetz (DE-588)4070085-9 gnd rswk-swf Computersicherheit (DE-588)4274324-2 gnd rswk-swf (DE-588)1071861417 Konferenzschrift 2012 Sankt Petersburg gnd-content Rechnernetz (DE-588)4070085-9 s Computersicherheit (DE-588)4274324-2 s Datensicherung (DE-588)4011144-1 s DE-604 Kotenko, Igor Sonstige (DE-588)142070238 oth International Conference on Mathematical Methods, Models and Architectures for Computer Network Security 6 2012 Sankt Petersburg Sonstige (DE-588)1026925223 oth Erscheint auch als Online-Ausgabe 978-3-642-33704-8 Lecture notes in computer science 7531 (DE-604)BV000000607 7531 X:MVB text/html http://deposit.dnb.de/cgi-bin/dokserv?id=4107686&prov=M&dok_var=1&dok_ext=htm Inhaltstext DNB Datenaustausch application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=025334535&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis |
spellingShingle | Computer network security 6th International Conference on Mathematical Methods, Models and Architectures for Computer Network Security, MMM-ACNS 2012, St. Petersburg, Russia, October 17 - 19, 2012 ; proceedings Lecture notes in computer science Datensicherung (DE-588)4011144-1 gnd Rechnernetz (DE-588)4070085-9 gnd Computersicherheit (DE-588)4274324-2 gnd |
subject_GND | (DE-588)4011144-1 (DE-588)4070085-9 (DE-588)4274324-2 (DE-588)1071861417 |
title | Computer network security 6th International Conference on Mathematical Methods, Models and Architectures for Computer Network Security, MMM-ACNS 2012, St. Petersburg, Russia, October 17 - 19, 2012 ; proceedings |
title_auth | Computer network security 6th International Conference on Mathematical Methods, Models and Architectures for Computer Network Security, MMM-ACNS 2012, St. Petersburg, Russia, October 17 - 19, 2012 ; proceedings |
title_exact_search | Computer network security 6th International Conference on Mathematical Methods, Models and Architectures for Computer Network Security, MMM-ACNS 2012, St. Petersburg, Russia, October 17 - 19, 2012 ; proceedings |
title_full | Computer network security 6th International Conference on Mathematical Methods, Models and Architectures for Computer Network Security, MMM-ACNS 2012, St. Petersburg, Russia, October 17 - 19, 2012 ; proceedings Igor Kotenko ... (eds.) |
title_fullStr | Computer network security 6th International Conference on Mathematical Methods, Models and Architectures for Computer Network Security, MMM-ACNS 2012, St. Petersburg, Russia, October 17 - 19, 2012 ; proceedings Igor Kotenko ... (eds.) |
title_full_unstemmed | Computer network security 6th International Conference on Mathematical Methods, Models and Architectures for Computer Network Security, MMM-ACNS 2012, St. Petersburg, Russia, October 17 - 19, 2012 ; proceedings Igor Kotenko ... (eds.) |
title_short | Computer network security |
title_sort | computer network security 6th international conference on mathematical methods models and architectures for computer network security mmm acns 2012 st petersburg russia october 17 19 2012 proceedings |
title_sub | 6th International Conference on Mathematical Methods, Models and Architectures for Computer Network Security, MMM-ACNS 2012, St. Petersburg, Russia, October 17 - 19, 2012 ; proceedings |
topic | Datensicherung (DE-588)4011144-1 gnd Rechnernetz (DE-588)4070085-9 gnd Computersicherheit (DE-588)4274324-2 gnd |
topic_facet | Datensicherung Rechnernetz Computersicherheit Konferenzschrift 2012 Sankt Petersburg |
url | http://deposit.dnb.de/cgi-bin/dokserv?id=4107686&prov=M&dok_var=1&dok_ext=htm http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=025334535&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
volume_link | (DE-604)BV000000607 |
work_keys_str_mv | AT kotenkoigor computernetworksecurity6thinternationalconferenceonmathematicalmethodsmodelsandarchitecturesforcomputernetworksecuritymmmacns2012stpetersburgrussiaoctober17192012proceedings AT internationalconferenceonmathematicalmethodsmodelsandarchitecturesforcomputernetworksecuritysanktpetersburg computernetworksecurity6thinternationalconferenceonmathematicalmethodsmodelsandarchitecturesforcomputernetworksecuritymmmacns2012stpetersburgrussiaoctober17192012proceedings |