Intelligence and security informatics: Pacific Asia Workshop, PAISI 2013, Beijing, China, August 3, 2013. Proceedings
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Tagungsbericht Buch |
Sprache: | English |
Veröffentlicht: |
Berlin [u.a.]
Springer
2013
|
Schriftenreihe: | Lecture notes in computer science
8039 |
Schlagworte: | |
Beschreibung: | X, 115 S. Ill., graph. Darst. |
ISBN: | 9783642396922 |
Internformat
MARC
LEADER | 00000nam a2200000 cb4500 | ||
---|---|---|---|
001 | BV041205668 | ||
003 | DE-604 | ||
005 | 20210129 | ||
007 | t| | ||
008 | 130806s2013 xx ad|| |||| 10||| eng d | ||
020 | |a 9783642396922 |c Print |9 978-3-642-39692-2 | ||
035 | |a (OCoLC)876875889 | ||
035 | |a (DE-599)BVBBV041205668 | ||
040 | |a DE-604 |b ger |e rakwb | ||
041 | 0 | |a eng | |
049 | |a DE-83 |a DE-11 |a DE-91G | ||
084 | |a DAT 055f |2 stub | ||
084 | |a DAT 460f |2 stub | ||
084 | |a MED 730f |2 stub | ||
100 | 1 | |a Wang, G. Alan |e Verfasser |4 aut | |
245 | 1 | 0 | |a Intelligence and security informatics |b Pacific Asia Workshop, PAISI 2013, Beijing, China, August 3, 2013. Proceedings |c G. Alan Wang ... (eds.) |
264 | 1 | |a Berlin [u.a.] |b Springer |c 2013 | |
300 | |a X, 115 S. |b Ill., graph. Darst. | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
490 | 1 | |a Lecture notes in computer science |v 8039 | |
650 | 0 | 7 | |a Schutz |0 (DE-588)4180271-8 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Objektverfolgung |0 (DE-588)4311226-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Data Mining |0 (DE-588)4428654-5 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Kryptoanalyse |0 (DE-588)4830502-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Internetkriminalität |0 (DE-588)7864395-8 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Kryptologie |0 (DE-588)4033329-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Computerkriminalität |0 (DE-588)4010452-7 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Maschinelles Sehen |0 (DE-588)4129594-8 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Datensicherung |0 (DE-588)4011144-1 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Authentifikation |0 (DE-588)4330656-1 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Zugriffskontrolle |0 (DE-588)4293034-0 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a World Wide Web 2.0 |0 (DE-588)7548364-6 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Privatsphäre |0 (DE-588)4123980-5 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Internet |0 (DE-588)4308416-3 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Innere Sicherheit |0 (DE-588)4127888-4 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Social Media |0 (DE-588)4639271-3 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Wissensextraktion |0 (DE-588)4546354-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Kamera |0 (DE-588)4366655-3 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Soziales Netzwerk |0 (DE-588)4055762-5 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Kritische Informationsinfrastruktur |0 (DE-588)7636254-1 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Soft Computing |0 (DE-588)4455833-8 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Content Management |0 (DE-588)4673954-3 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Automatische Identifikation |0 (DE-588)4206098-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Bilderkennung |0 (DE-588)4264283-8 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Computerforensik |0 (DE-588)4774034-6 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Terrorismus |0 (DE-588)4059534-1 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Text Mining |0 (DE-588)4728093-1 |2 gnd |9 rswk-swf |
655 | 7 | |0 (DE-588)1071861417 |a Konferenzschrift |y 2013 |z Peking |2 gnd-content | |
689 | 0 | 0 | |a Soft Computing |0 (DE-588)4455833-8 |D s |
689 | 0 | |5 DE-604 | |
689 | 1 | 0 | |a Computerkriminalität |0 (DE-588)4010452-7 |D s |
689 | 1 | 1 | |a World Wide Web 2.0 |0 (DE-588)7548364-6 |D s |
689 | 1 | 2 | |a Data Mining |0 (DE-588)4428654-5 |D s |
689 | 1 | 3 | |a Text Mining |0 (DE-588)4728093-1 |D s |
689 | 1 | 4 | |a Kryptologie |0 (DE-588)4033329-2 |D s |
689 | 1 | 5 | |a Datensicherung |0 (DE-588)4011144-1 |D s |
689 | 1 | 6 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 1 | |8 1\p |5 DE-604 | |
689 | 2 | 0 | |a Internet |0 (DE-588)4308416-3 |D s |
689 | 2 | 1 | |a Soziales Netzwerk |0 (DE-588)4055762-5 |D s |
689 | 2 | 2 | |a Social Media |0 (DE-588)4639271-3 |D s |
689 | 2 | 3 | |a Wissensextraktion |0 (DE-588)4546354-2 |D s |
689 | 2 | 4 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 2 | 5 | |a Datensicherung |0 (DE-588)4011144-1 |D s |
689 | 2 | |8 2\p |5 DE-604 | |
689 | 3 | 0 | |a Computerkriminalität |0 (DE-588)4010452-7 |D s |
689 | 3 | 1 | |a Computerforensik |0 (DE-588)4774034-6 |D s |
689 | 3 | 2 | |a Data Mining |0 (DE-588)4428654-5 |D s |
689 | 3 | 3 | |a Wissensextraktion |0 (DE-588)4546354-2 |D s |
689 | 3 | 4 | |a Kryptoanalyse |0 (DE-588)4830502-9 |D s |
689 | 3 | 5 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 3 | |8 3\p |5 DE-604 | |
689 | 4 | 0 | |a Kritische Informationsinfrastruktur |0 (DE-588)7636254-1 |D s |
689 | 4 | 1 | |a Schutz |0 (DE-588)4180271-8 |D s |
689 | 4 | 2 | |a Privatsphäre |0 (DE-588)4123980-5 |D s |
689 | 4 | 3 | |a Zugriffskontrolle |0 (DE-588)4293034-0 |D s |
689 | 4 | 4 | |a Authentifikation |0 (DE-588)4330656-1 |D s |
689 | 4 | |8 4\p |5 DE-604 | |
689 | 5 | 0 | |a Maschinelles Sehen |0 (DE-588)4129594-8 |D s |
689 | 5 | 1 | |a Bilderkennung |0 (DE-588)4264283-8 |D s |
689 | 5 | 2 | |a Automatische Identifikation |0 (DE-588)4206098-9 |D s |
689 | 5 | 3 | |a Objektverfolgung |0 (DE-588)4311226-2 |D s |
689 | 5 | 4 | |a Kamera |0 (DE-588)4366655-3 |D s |
689 | 5 | |8 5\p |5 DE-604 | |
689 | 6 | 0 | |a Internet |0 (DE-588)4308416-3 |D s |
689 | 6 | 1 | |a Terrorismus |0 (DE-588)4059534-1 |D s |
689 | 6 | 2 | |a Content Management |0 (DE-588)4673954-3 |D s |
689 | 6 | 3 | |a Data Mining |0 (DE-588)4428654-5 |D s |
689 | 6 | 4 | |a Innere Sicherheit |0 (DE-588)4127888-4 |D s |
689 | 6 | |8 6\p |5 DE-604 | |
689 | 7 | 0 | |a Internetkriminalität |0 (DE-588)7864395-8 |D s |
689 | 7 | 1 | |a Kryptoanalyse |0 (DE-588)4830502-9 |D s |
689 | 7 | 2 | |a Datensicherung |0 (DE-588)4011144-1 |D s |
689 | 7 | 3 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 7 | |8 7\p |5 DE-604 | |
711 | 2 | |a PAISI |d 2013 |c Peking |j Sonstige |0 (DE-588)1041261373 |4 oth | |
776 | 0 | 8 | |i Erscheint auch als |n Online-Ausgabe |z 978-3-642-39693-9 |
830 | 0 | |a Lecture notes in computer science |v 8039 |w (DE-604)BV000000607 |9 8039 | |
883 | 1 | |8 1\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk | |
883 | 1 | |8 2\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk | |
883 | 1 | |8 3\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk | |
883 | 1 | |8 4\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk | |
883 | 1 | |8 5\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk | |
883 | 1 | |8 6\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk | |
883 | 1 | |8 7\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk | |
943 | 1 | |a oai:aleph.bib-bvb.de:BVB01-026180465 |
Datensatz im Suchindex
_version_ | 1820875470226325504 |
---|---|
adam_text | |
any_adam_object | |
author | Wang, G. Alan |
author_facet | Wang, G. Alan |
author_role | aut |
author_sort | Wang, G. Alan |
author_variant | g a w ga gaw |
building | Verbundindex |
bvnumber | BV041205668 |
classification_rvk | SS 4800 |
classification_tum | DAT 055f DAT 460f MED 730f |
ctrlnum | (OCoLC)876875889 (DE-599)BVBBV041205668 |
discipline | Informatik Medizin |
format | Conference Proceeding Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>00000nam a2200000 cb4500</leader><controlfield tag="001">BV041205668</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20210129</controlfield><controlfield tag="007">t|</controlfield><controlfield tag="008">130806s2013 xx ad|| |||| 10||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783642396922</subfield><subfield code="c">Print</subfield><subfield code="9">978-3-642-39692-2</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)876875889</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV041205668</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rakwb</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-83</subfield><subfield code="a">DE-11</subfield><subfield code="a">DE-91G</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 055f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 460f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">MED 730f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Wang, G. Alan</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Intelligence and security informatics</subfield><subfield code="b">Pacific Asia Workshop, PAISI 2013, Beijing, China, August 3, 2013. Proceedings</subfield><subfield code="c">G. Alan Wang ... (eds.)</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Berlin [u.a.]</subfield><subfield code="b">Springer</subfield><subfield code="c">2013</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">X, 115 S.</subfield><subfield code="b">Ill., graph. Darst.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">Lecture notes in computer science</subfield><subfield code="v">8039</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Schutz</subfield><subfield code="0">(DE-588)4180271-8</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Objektverfolgung</subfield><subfield code="0">(DE-588)4311226-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Data Mining</subfield><subfield code="0">(DE-588)4428654-5</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kryptoanalyse</subfield><subfield code="0">(DE-588)4830502-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Internetkriminalität</subfield><subfield code="0">(DE-588)7864395-8</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kryptologie</subfield><subfield code="0">(DE-588)4033329-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computerkriminalität</subfield><subfield code="0">(DE-588)4010452-7</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Maschinelles Sehen</subfield><subfield code="0">(DE-588)4129594-8</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Authentifikation</subfield><subfield code="0">(DE-588)4330656-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Zugriffskontrolle</subfield><subfield code="0">(DE-588)4293034-0</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">World Wide Web 2.0</subfield><subfield code="0">(DE-588)7548364-6</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Privatsphäre</subfield><subfield code="0">(DE-588)4123980-5</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Internet</subfield><subfield code="0">(DE-588)4308416-3</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Innere Sicherheit</subfield><subfield code="0">(DE-588)4127888-4</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Social Media</subfield><subfield code="0">(DE-588)4639271-3</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Wissensextraktion</subfield><subfield code="0">(DE-588)4546354-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kamera</subfield><subfield code="0">(DE-588)4366655-3</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Soziales Netzwerk</subfield><subfield code="0">(DE-588)4055762-5</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kritische Informationsinfrastruktur</subfield><subfield code="0">(DE-588)7636254-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Soft Computing</subfield><subfield code="0">(DE-588)4455833-8</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Content Management</subfield><subfield code="0">(DE-588)4673954-3</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Automatische Identifikation</subfield><subfield code="0">(DE-588)4206098-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Bilderkennung</subfield><subfield code="0">(DE-588)4264283-8</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computerforensik</subfield><subfield code="0">(DE-588)4774034-6</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Terrorismus</subfield><subfield code="0">(DE-588)4059534-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Text Mining</subfield><subfield code="0">(DE-588)4728093-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)1071861417</subfield><subfield code="a">Konferenzschrift</subfield><subfield code="y">2013</subfield><subfield code="z">Peking</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Soft Computing</subfield><subfield code="0">(DE-588)4455833-8</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="1" ind2="0"><subfield code="a">Computerkriminalität</subfield><subfield code="0">(DE-588)4010452-7</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="1"><subfield code="a">World Wide Web 2.0</subfield><subfield code="0">(DE-588)7548364-6</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="2"><subfield code="a">Data Mining</subfield><subfield code="0">(DE-588)4428654-5</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="3"><subfield code="a">Text Mining</subfield><subfield code="0">(DE-588)4728093-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="4"><subfield code="a">Kryptologie</subfield><subfield code="0">(DE-588)4033329-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="5"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="6"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2=" "><subfield code="8">1\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="2" ind2="0"><subfield code="a">Internet</subfield><subfield code="0">(DE-588)4308416-3</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="2" ind2="1"><subfield code="a">Soziales Netzwerk</subfield><subfield code="0">(DE-588)4055762-5</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="2" ind2="2"><subfield code="a">Social Media</subfield><subfield code="0">(DE-588)4639271-3</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="2" ind2="3"><subfield code="a">Wissensextraktion</subfield><subfield code="0">(DE-588)4546354-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="2" ind2="4"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="2" ind2="5"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="2" ind2=" "><subfield code="8">2\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="3" ind2="0"><subfield code="a">Computerkriminalität</subfield><subfield code="0">(DE-588)4010452-7</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="3" ind2="1"><subfield code="a">Computerforensik</subfield><subfield code="0">(DE-588)4774034-6</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="3" ind2="2"><subfield code="a">Data Mining</subfield><subfield code="0">(DE-588)4428654-5</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="3" ind2="3"><subfield code="a">Wissensextraktion</subfield><subfield code="0">(DE-588)4546354-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="3" ind2="4"><subfield code="a">Kryptoanalyse</subfield><subfield code="0">(DE-588)4830502-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="3" ind2="5"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="3" ind2=" "><subfield code="8">3\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="4" ind2="0"><subfield code="a">Kritische Informationsinfrastruktur</subfield><subfield code="0">(DE-588)7636254-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="4" ind2="1"><subfield code="a">Schutz</subfield><subfield code="0">(DE-588)4180271-8</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="4" ind2="2"><subfield code="a">Privatsphäre</subfield><subfield code="0">(DE-588)4123980-5</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="4" ind2="3"><subfield code="a">Zugriffskontrolle</subfield><subfield code="0">(DE-588)4293034-0</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="4" ind2="4"><subfield code="a">Authentifikation</subfield><subfield code="0">(DE-588)4330656-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="4" ind2=" "><subfield code="8">4\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="5" ind2="0"><subfield code="a">Maschinelles Sehen</subfield><subfield code="0">(DE-588)4129594-8</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="5" ind2="1"><subfield code="a">Bilderkennung</subfield><subfield code="0">(DE-588)4264283-8</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="5" ind2="2"><subfield code="a">Automatische Identifikation</subfield><subfield code="0">(DE-588)4206098-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="5" ind2="3"><subfield code="a">Objektverfolgung</subfield><subfield code="0">(DE-588)4311226-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="5" ind2="4"><subfield code="a">Kamera</subfield><subfield code="0">(DE-588)4366655-3</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="5" ind2=" "><subfield code="8">5\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="6" ind2="0"><subfield code="a">Internet</subfield><subfield code="0">(DE-588)4308416-3</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="6" ind2="1"><subfield code="a">Terrorismus</subfield><subfield code="0">(DE-588)4059534-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="6" ind2="2"><subfield code="a">Content Management</subfield><subfield code="0">(DE-588)4673954-3</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="6" ind2="3"><subfield code="a">Data Mining</subfield><subfield code="0">(DE-588)4428654-5</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="6" ind2="4"><subfield code="a">Innere Sicherheit</subfield><subfield code="0">(DE-588)4127888-4</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="6" ind2=" "><subfield code="8">6\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="7" ind2="0"><subfield code="a">Internetkriminalität</subfield><subfield code="0">(DE-588)7864395-8</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="7" ind2="1"><subfield code="a">Kryptoanalyse</subfield><subfield code="0">(DE-588)4830502-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="7" ind2="2"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="7" ind2="3"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="7" ind2=" "><subfield code="8">7\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="711" ind1="2" ind2=" "><subfield code="a">PAISI</subfield><subfield code="d">2013</subfield><subfield code="c">Peking</subfield><subfield code="j">Sonstige</subfield><subfield code="0">(DE-588)1041261373</subfield><subfield code="4">oth</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Online-Ausgabe</subfield><subfield code="z">978-3-642-39693-9</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">Lecture notes in computer science</subfield><subfield code="v">8039</subfield><subfield code="w">(DE-604)BV000000607</subfield><subfield code="9">8039</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">1\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">2\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">3\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">4\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">5\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">6\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">7\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-026180465</subfield></datafield></record></collection> |
genre | (DE-588)1071861417 Konferenzschrift 2013 Peking gnd-content |
genre_facet | Konferenzschrift 2013 Peking |
id | DE-604.BV041205668 |
illustrated | Illustrated |
indexdate | 2025-01-10T15:16:08Z |
institution | BVB |
institution_GND | (DE-588)1041261373 |
isbn | 9783642396922 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-026180465 |
oclc_num | 876875889 |
open_access_boolean | |
owner | DE-83 DE-11 DE-91G DE-BY-TUM |
owner_facet | DE-83 DE-11 DE-91G DE-BY-TUM |
physical | X, 115 S. Ill., graph. Darst. |
publishDate | 2013 |
publishDateSearch | 2013 |
publishDateSort | 2013 |
publisher | Springer |
record_format | marc |
series | Lecture notes in computer science |
series2 | Lecture notes in computer science |
spelling | Wang, G. Alan Verfasser aut Intelligence and security informatics Pacific Asia Workshop, PAISI 2013, Beijing, China, August 3, 2013. Proceedings G. Alan Wang ... (eds.) Berlin [u.a.] Springer 2013 X, 115 S. Ill., graph. Darst. txt rdacontent n rdamedia nc rdacarrier Lecture notes in computer science 8039 Schutz (DE-588)4180271-8 gnd rswk-swf Objektverfolgung (DE-588)4311226-2 gnd rswk-swf Data Mining (DE-588)4428654-5 gnd rswk-swf Kryptoanalyse (DE-588)4830502-9 gnd rswk-swf Internetkriminalität (DE-588)7864395-8 gnd rswk-swf Computersicherheit (DE-588)4274324-2 gnd rswk-swf Kryptologie (DE-588)4033329-2 gnd rswk-swf Computerkriminalität (DE-588)4010452-7 gnd rswk-swf Maschinelles Sehen (DE-588)4129594-8 gnd rswk-swf Datensicherung (DE-588)4011144-1 gnd rswk-swf Authentifikation (DE-588)4330656-1 gnd rswk-swf Zugriffskontrolle (DE-588)4293034-0 gnd rswk-swf World Wide Web 2.0 (DE-588)7548364-6 gnd rswk-swf Privatsphäre (DE-588)4123980-5 gnd rswk-swf Internet (DE-588)4308416-3 gnd rswk-swf Innere Sicherheit (DE-588)4127888-4 gnd rswk-swf Social Media (DE-588)4639271-3 gnd rswk-swf Wissensextraktion (DE-588)4546354-2 gnd rswk-swf Kamera (DE-588)4366655-3 gnd rswk-swf Soziales Netzwerk (DE-588)4055762-5 gnd rswk-swf Kritische Informationsinfrastruktur (DE-588)7636254-1 gnd rswk-swf Soft Computing (DE-588)4455833-8 gnd rswk-swf Content Management (DE-588)4673954-3 gnd rswk-swf Automatische Identifikation (DE-588)4206098-9 gnd rswk-swf Bilderkennung (DE-588)4264283-8 gnd rswk-swf Computerforensik (DE-588)4774034-6 gnd rswk-swf Terrorismus (DE-588)4059534-1 gnd rswk-swf Text Mining (DE-588)4728093-1 gnd rswk-swf (DE-588)1071861417 Konferenzschrift 2013 Peking gnd-content Soft Computing (DE-588)4455833-8 s DE-604 Computerkriminalität (DE-588)4010452-7 s World Wide Web 2.0 (DE-588)7548364-6 s Data Mining (DE-588)4428654-5 s Text Mining (DE-588)4728093-1 s Kryptologie (DE-588)4033329-2 s Datensicherung (DE-588)4011144-1 s Computersicherheit (DE-588)4274324-2 s 1\p DE-604 Internet (DE-588)4308416-3 s Soziales Netzwerk (DE-588)4055762-5 s Social Media (DE-588)4639271-3 s Wissensextraktion (DE-588)4546354-2 s 2\p DE-604 Computerforensik (DE-588)4774034-6 s Kryptoanalyse (DE-588)4830502-9 s 3\p DE-604 Kritische Informationsinfrastruktur (DE-588)7636254-1 s Schutz (DE-588)4180271-8 s Privatsphäre (DE-588)4123980-5 s Zugriffskontrolle (DE-588)4293034-0 s Authentifikation (DE-588)4330656-1 s 4\p DE-604 Maschinelles Sehen (DE-588)4129594-8 s Bilderkennung (DE-588)4264283-8 s Automatische Identifikation (DE-588)4206098-9 s Objektverfolgung (DE-588)4311226-2 s Kamera (DE-588)4366655-3 s 5\p DE-604 Terrorismus (DE-588)4059534-1 s Content Management (DE-588)4673954-3 s Innere Sicherheit (DE-588)4127888-4 s 6\p DE-604 Internetkriminalität (DE-588)7864395-8 s 7\p DE-604 PAISI 2013 Peking Sonstige (DE-588)1041261373 oth Erscheint auch als Online-Ausgabe 978-3-642-39693-9 Lecture notes in computer science 8039 (DE-604)BV000000607 8039 1\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk 2\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk 3\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk 4\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk 5\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk 6\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk 7\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk |
spellingShingle | Wang, G. Alan Intelligence and security informatics Pacific Asia Workshop, PAISI 2013, Beijing, China, August 3, 2013. Proceedings Lecture notes in computer science Schutz (DE-588)4180271-8 gnd Objektverfolgung (DE-588)4311226-2 gnd Data Mining (DE-588)4428654-5 gnd Kryptoanalyse (DE-588)4830502-9 gnd Internetkriminalität (DE-588)7864395-8 gnd Computersicherheit (DE-588)4274324-2 gnd Kryptologie (DE-588)4033329-2 gnd Computerkriminalität (DE-588)4010452-7 gnd Maschinelles Sehen (DE-588)4129594-8 gnd Datensicherung (DE-588)4011144-1 gnd Authentifikation (DE-588)4330656-1 gnd Zugriffskontrolle (DE-588)4293034-0 gnd World Wide Web 2.0 (DE-588)7548364-6 gnd Privatsphäre (DE-588)4123980-5 gnd Internet (DE-588)4308416-3 gnd Innere Sicherheit (DE-588)4127888-4 gnd Social Media (DE-588)4639271-3 gnd Wissensextraktion (DE-588)4546354-2 gnd Kamera (DE-588)4366655-3 gnd Soziales Netzwerk (DE-588)4055762-5 gnd Kritische Informationsinfrastruktur (DE-588)7636254-1 gnd Soft Computing (DE-588)4455833-8 gnd Content Management (DE-588)4673954-3 gnd Automatische Identifikation (DE-588)4206098-9 gnd Bilderkennung (DE-588)4264283-8 gnd Computerforensik (DE-588)4774034-6 gnd Terrorismus (DE-588)4059534-1 gnd Text Mining (DE-588)4728093-1 gnd |
subject_GND | (DE-588)4180271-8 (DE-588)4311226-2 (DE-588)4428654-5 (DE-588)4830502-9 (DE-588)7864395-8 (DE-588)4274324-2 (DE-588)4033329-2 (DE-588)4010452-7 (DE-588)4129594-8 (DE-588)4011144-1 (DE-588)4330656-1 (DE-588)4293034-0 (DE-588)7548364-6 (DE-588)4123980-5 (DE-588)4308416-3 (DE-588)4127888-4 (DE-588)4639271-3 (DE-588)4546354-2 (DE-588)4366655-3 (DE-588)4055762-5 (DE-588)7636254-1 (DE-588)4455833-8 (DE-588)4673954-3 (DE-588)4206098-9 (DE-588)4264283-8 (DE-588)4774034-6 (DE-588)4059534-1 (DE-588)4728093-1 (DE-588)1071861417 |
title | Intelligence and security informatics Pacific Asia Workshop, PAISI 2013, Beijing, China, August 3, 2013. Proceedings |
title_auth | Intelligence and security informatics Pacific Asia Workshop, PAISI 2013, Beijing, China, August 3, 2013. Proceedings |
title_exact_search | Intelligence and security informatics Pacific Asia Workshop, PAISI 2013, Beijing, China, August 3, 2013. Proceedings |
title_full | Intelligence and security informatics Pacific Asia Workshop, PAISI 2013, Beijing, China, August 3, 2013. Proceedings G. Alan Wang ... (eds.) |
title_fullStr | Intelligence and security informatics Pacific Asia Workshop, PAISI 2013, Beijing, China, August 3, 2013. Proceedings G. Alan Wang ... (eds.) |
title_full_unstemmed | Intelligence and security informatics Pacific Asia Workshop, PAISI 2013, Beijing, China, August 3, 2013. Proceedings G. Alan Wang ... (eds.) |
title_short | Intelligence and security informatics |
title_sort | intelligence and security informatics pacific asia workshop paisi 2013 beijing china august 3 2013 proceedings |
title_sub | Pacific Asia Workshop, PAISI 2013, Beijing, China, August 3, 2013. Proceedings |
topic | Schutz (DE-588)4180271-8 gnd Objektverfolgung (DE-588)4311226-2 gnd Data Mining (DE-588)4428654-5 gnd Kryptoanalyse (DE-588)4830502-9 gnd Internetkriminalität (DE-588)7864395-8 gnd Computersicherheit (DE-588)4274324-2 gnd Kryptologie (DE-588)4033329-2 gnd Computerkriminalität (DE-588)4010452-7 gnd Maschinelles Sehen (DE-588)4129594-8 gnd Datensicherung (DE-588)4011144-1 gnd Authentifikation (DE-588)4330656-1 gnd Zugriffskontrolle (DE-588)4293034-0 gnd World Wide Web 2.0 (DE-588)7548364-6 gnd Privatsphäre (DE-588)4123980-5 gnd Internet (DE-588)4308416-3 gnd Innere Sicherheit (DE-588)4127888-4 gnd Social Media (DE-588)4639271-3 gnd Wissensextraktion (DE-588)4546354-2 gnd Kamera (DE-588)4366655-3 gnd Soziales Netzwerk (DE-588)4055762-5 gnd Kritische Informationsinfrastruktur (DE-588)7636254-1 gnd Soft Computing (DE-588)4455833-8 gnd Content Management (DE-588)4673954-3 gnd Automatische Identifikation (DE-588)4206098-9 gnd Bilderkennung (DE-588)4264283-8 gnd Computerforensik (DE-588)4774034-6 gnd Terrorismus (DE-588)4059534-1 gnd Text Mining (DE-588)4728093-1 gnd |
topic_facet | Schutz Objektverfolgung Data Mining Kryptoanalyse Internetkriminalität Computersicherheit Kryptologie Computerkriminalität Maschinelles Sehen Datensicherung Authentifikation Zugriffskontrolle World Wide Web 2.0 Privatsphäre Internet Innere Sicherheit Social Media Wissensextraktion Kamera Soziales Netzwerk Kritische Informationsinfrastruktur Soft Computing Content Management Automatische Identifikation Bilderkennung Computerforensik Terrorismus Text Mining Konferenzschrift 2013 Peking |
volume_link | (DE-604)BV000000607 |
work_keys_str_mv | AT wanggalan intelligenceandsecurityinformaticspacificasiaworkshoppaisi2013beijingchinaaugust32013proceedings AT paisipeking intelligenceandsecurityinformaticspacificasiaworkshoppaisi2013beijingchinaaugust32013proceedings |