Research in attacks, intrusions, and defenses: 16th international symposium, RAID 2013, Rodney Bay, St. Lucia, October 23 - 25, 2013 ; proceedings
Gespeichert in:
Format: | Elektronisch Tagungsbericht E-Book |
---|---|
Sprache: | English |
Veröffentlicht: |
Berlin [u.a.]
Springer
2013
|
Schriftenreihe: | Lecture notes in computer science
8145 |
Schlagworte: | |
Online-Zugang: | Volltext Inhaltsverzeichnis Abstract |
Beschreibung: | 1 Online-Ressource (XI, 476 S.) graph. Darst. |
ISBN: | 3642412831 9783642412844 |
DOI: | 10.1007/978-3-642-41284-4 |
Internformat
MARC
LEADER | 00000nam a2200000 cb4500 | ||
---|---|---|---|
001 | BV041588191 | ||
003 | DE-604 | ||
005 | 20200514 | ||
007 | cr|uuu---uuuuu | ||
008 | 140124s2013 gw d||| o|||| 10||| eng d | ||
020 | |a 3642412831 |9 3-642-41283-1 | ||
020 | |a 9783642412844 |c eISBN |9 978-3-642-41284-4 | ||
024 | 7 | |a 10.1007/978-3-642-41284-4 |2 doi | |
024 | 3 | |a 9783642412837 | |
028 | 5 | 2 | |a Best.-Nr.: 86326265 |
035 | |a (OCoLC)865039920 | ||
035 | |a (DE-599)BVBBV041588191 | ||
040 | |a DE-604 |b ger |e rakddb | ||
041 | 0 | |a eng | |
044 | |a gw |c XA-DE-BE | ||
049 | |a DE-473 |a DE-M347 |a DE-20 |a DE-703 |a DE-Aug4 |a DE-92 |a DE-29 |a DE-859 |a DE-91 |a DE-706 |a DE-739 |a DE-384 |a DE-634 |a DE-355 | ||
082 | 0 | |a 005.8 | |
084 | |a DAT 462f |2 stub | ||
084 | |a DAT 055f |2 stub | ||
084 | |a 004 |2 sdnb | ||
084 | |a DAT 000 |2 stub | ||
084 | |a DAT 465f |2 stub | ||
245 | 1 | 0 | |a Research in attacks, intrusions, and defenses |b 16th international symposium, RAID 2013, Rodney Bay, St. Lucia, October 23 - 25, 2013 ; proceedings |c Salvatore J. Stolfo ... (eds.) |
264 | 1 | |a Berlin [u.a.] |b Springer |c 2013 | |
300 | |a 1 Online-Ressource (XI, 476 S.) |b graph. Darst. | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
490 | 1 | |a Lecture notes in computer science |v 8145 | |
650 | 0 | 7 | |a Cloud Computing |0 (DE-588)7623494-0 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Rechnernetz |0 (DE-588)4070085-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Kryptoanalyse |0 (DE-588)4830502-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Eindringerkennung |0 (DE-588)4706627-1 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Malware |0 (DE-588)4687059-3 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Trusted Computing |0 (DE-588)7562931-8 |2 gnd |9 rswk-swf |
655 | 7 | |0 (DE-588)1071861417 |a Konferenzschrift |2 gnd-content | |
689 | 0 | 0 | |a Eindringerkennung |0 (DE-588)4706627-1 |D s |
689 | 0 | 1 | |a Kryptoanalyse |0 (DE-588)4830502-9 |D s |
689 | 0 | 2 | |a Malware |0 (DE-588)4687059-3 |D s |
689 | 0 | 3 | |a Trusted Computing |0 (DE-588)7562931-8 |D s |
689 | 0 | 4 | |a Rechnernetz |0 (DE-588)4070085-9 |D s |
689 | 0 | 5 | |a Cloud Computing |0 (DE-588)7623494-0 |D s |
689 | 0 | |8 1\p |5 DE-604 | |
700 | 1 | |a Stolfo, Salvatore J. |e Sonstige |0 (DE-588)134280008 |4 oth | |
711 | 2 | |a RAID |n 16 |d 2013 |c Saint Lucia |j Sonstige |0 (DE-588)1043617256 |4 oth | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe, Paperback |z 978-3-642-41283-7 |
830 | 0 | |a Lecture notes in computer science |v 8145 |w (DE-604)BV014880109 |9 8145 | |
856 | 4 | 0 | |u https://doi.org/10.1007/978-3-642-41284-4 |x Verlag |3 Volltext |
856 | 4 | 2 | |m Springer Fremddatenuebernahme |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027033309&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
856 | 4 | 2 | |m Springer Fremddatenuebernahme |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027033309&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA |3 Abstract |
883 | 1 | |8 1\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk | |
912 | |a ZDB-2-SCS | ||
912 | |a ZDB-2-LNC | ||
943 | 1 | |a oai:aleph.bib-bvb.de:BVB01-027033309 |
Datensatz im Suchindex
_version_ | 1820875555642277888 |
---|---|
adam_text |
RESEARCH IN ATTACKS, INTRUSIONS, AND DEFENSES
/
: 2013
TABLE OF CONTENTS / INHALTSVERZEICHNIS
BUILDING COMPANIONSHIP THROUGH HUMAN-ROBOT COLLABORATION
OLDER PEOPLE’S INVOLVEMENT IN THE DEVELOPMENT OF A SOCIAL ASSISTIVE
ROBOT
WHAT OLDER PEOPLE EXPECT OF ROBOTS: A MIXED METHODS APPROACH
MODELLING HUMAN GAME PLAY AT POOL AND COUNTERING IT WITH AN
ANTHROPOMORPHIC ROBOT
AUTOMATED ASSISTANCE ROBOT SYSTEM FOR TRANSFERRING MODEL-FREE OBJECTS
FROM/TO HUMAN HAND USING VISION/FORCE CONTROL
ROBOT-MEDIATED INTERVIEWS: DO ROBOTS POSSESS ADVANTAGES OVER HUMAN
INTERVIEWERS WHEN TALKING TO CHILDREN WITH SPECIAL NEEDS?
MULTI DOMAIN VOICE ACTIVITY DETECTION DURING HUMAN-ROBOT INTERACTION
A LOW-COST CLASSROOM-ORIENTED EDUCATIONAL ROBOTICS SYSTEM
SOCIAL NAVIGATION - IDENTIFYING ROBOT NAVIGATION PATTERNS IN A PATH
CROSSING SCENARIO
AFFORDANCE-BASED ACTIVITY PLACEMENT IN HUMAN-ROBOT SHARED ENVIRONMENTS
EXPLORING REQUIREMENTS AND ALTERNATIVE PET ROBOTS FOR ROBOT ASSISTED
THERAPY WITH OLDER ADULTS WITH DEMENTIA
SMOOTH REACHING AND HUMAN-LIKE COMPLIANCE IN PHYSICAL INTERACTIONS FOR
REDUNDANT ARMS
RECOGNITION AND REPRESENTATION OF ROBOT SKILLS IN REAL TIME: A
THEORETICAL ANALYSIS
ROBOTS IN TIME: HOW USER EXPERIENCE IN HUMAN-ROBOT INTERACTION CHANGES
OVER TIME
INTERPRETING ROBOT POINTING BEHAVIOR
COPING WITH STRESS USING SOCIAL ROBOTS AS EMOTION-ORIENTED TOOL:
POTENTIAL FACTORS DISCOVERED FROM STRESS GAME EXPERIMENT
STUDY OF A SOCIAL ROBOT’S APPEARANCE USING INTERVIEWS AND A MOBILE
EYE-TRACKING DEVICE
PLAYFUL INTERACTION WITH VOICE SENSING MODULAR ROBOTS
SOCIAL COMPARISON BETWEEN THE SELF AND A HUMANOID SELF-EVALUATION
MAINTENANCE MODEL IN HRI AND PSYCHOLOGICAL SAFETY
PSYCHOLOGICAL ANTHROPOMORPHISM OF ROBOTS MEASURING MIND PERCEPTION AND
HUMANITY IN JAPANESE CONTEXT
THE ULTIMATUM GAME AS MEASUREMENT TOOL FOR ANTHROPOMORPHISM IN
HUMAN–ROBOT INTERACTION
HUMAN-ROBOT UPPER BODY GESTURE IMITATION ANALYSIS FOR AUTISM SPECTRUM
DISORDERS
LOW-COST WHOLE-BODY TOUCH INTERACTION FOR MANUAL MOTION CONTROL OF A
MOBILE SERVICE ROBOT
HUMAN-ROBOT INTERACTION BETWEEN VIRTUAL AND REAL WORLDS: MOTIVATION FROM
ROBOCUP @HOME
HABITUATION AND SENSITISATION LEARNING IN ASMO COGNITIVE ARCHITECTURE
EFFECTS OF DIFFERENT KINDS OF ROBOT FEEDBACK
THE FRANKENSTEIN SYNDROME QUESTIONNAIRE – RESULTS FROM A QUANTITATIVE
CROSS-CULTURAL SURVEY
REGION OF EYE CONTACT OF HUMANOID NAO ROBOT IS SIMILAR TO THAT OF A
HUMAN
EXPLORING ROBOT ETIQUETTE: REFINING A HRI HOME COMPANION SCENARIO BASED
ON FEEDBACK FROM TWO ARTISTS WHO LIVED WITH ROBOTS IN THE UH ROBOT HOUSE
THE GOOD, THE BAD, THE WEIRD: AUDIENCE EVALUATION OF A “REAL” ROBOT
IN RELATION TO SCIENCE FICTION AND MASS MEDIA
SYSTEMS OVERVIEW OF ONO: A DIY REPRODUCIBLE OPEN SOURCE SOCIAL ROBOT
SHARING SPACES, SHARING LIVES – THE IMPACT OF ROBOT MOBILITY ON USER
PERCEPTION OF A HOME COMPANION ROBOT
QUALITATIVE DESIGN AND IMPLEMENTATION OF HUMAN-ROBOT SPATIAL
INTERACTIONS
UNSUPERVISED LEARNING SPATIO-TEMPORAL FEATURES FOR HUMAN ACTIVITY
RECOGNITION FROM RGB-D VIDEO DATA
HEAD POSE PATTERNS IN MULTIPARTY HUMAN-ROBOT TEAM-BUILDING INTERACTIONS
I WOULD LIKE SOME FOOD: ANCHORING OBJECTS TO SEMANTIC WEB INFORMATION IN
HUMAN-ROBOT DIALOGUE INTERACTIONS
SITUATED ANALYSIS OF INTERACTIONS BETWEEN COGNITIVELY IMPAIRED OLDER
ADULTS AND THE THERAPEUTIC ROBOT PARO
CLOSING THE LOOP: TOWARDS TIGHTLY SYNCHRONIZED ROBOT GESTURE AND SPEECH
TELEOPERATION OF DOMESTIC SERVICE ROBOTS: EFFECTS OF GLOBAL 3D
ENVIRONMENT MAPS IN THE USER INTERFACE ON OPERATORS’ COGNITIVE AND
PERFORMANCE METRICS
ARTISTS AS HRI PIONEERS: A CREATIVE APPROACH TO DEVELOPING NOVEL
INTERACTIONS FOR LIVING WITH ROBOTS
ICHARIBOT: DESIGN AND FIELD TRIALS OF A FUNDRAISING ROBOT
“IT DON’T MATTER IF YOU’RE BLACK OR WHITE”?- EFFECTS OF ROBOT
APPEARANCE AND USER PREJUDICE ON EVALUATIONS OF A NEWLY DEVELOPED ROBOT
COMPANION
A HUMANOID ROBOT COMPANION FOR WHEELCHAIR USERS
TUNING COST FUNCTIONS FOR SOCIAL NAVIGATION
CHILD-ROBOT INTERACTION: PERSPECTIVES AND CHALLENGES
TRAINING A ROBOT VIA HUMAN FEEDBACK: A CASE STUDY
REAL TIME PEOPLE TRACKING IN CROWDED ENVIRONMENTS WITH RANGE
MEASUREMENTS
WHO, HOW, WHERE: USING EXEMPLARS TO LEARN SOCIAL CONCEPTS
AN ASYNCHRONOUS RGB-D SENSOR FUSION FRAMEWORK USING MONTE-CARLO METHODS
FOR HAND TRACKING ON A MOBILE ROBOT IN CROWDED ENVIRONMENTS
USING SPATIAL SEMANTIC AND PRAGMATIC FIELDS TO INTERPRET NATURAL
LANGUAGE PICK-AND-PLACE INSTRUCTIONS FOR A MOBILE SERVICE ROBOT
BODILY MOOD EXPRESSION: RECOGNIZE MOODS FROM FUNCTIONAL BEHAVIORS OF
HUMANOID ROBOTS
COOPERATIVE ROBOT MANIPULATOR CONTROL WITH HUMAN ‘PINNING’ FOR ROBOT
ASSISTIVE TASK EXECUTION
EFFECTS OF POLITENESS AND INTERACTION CONTEXT ON PERCEPTION AND
EXPERIENCE OF HRI
FACIAL EXPRESSIONS AND GESTURES TO CONVEY EMOTIONS WITH A HUMANOID ROBOT
PEPITA: A DESIGN OF ROBOT PET INTERFACE FOR PROMOTING INTERACTION
A SOCIALLY ASSISTIVE ROBOT TO SUPPORT PHYSICAL TRAINING OF OLDER PEOPLE
– AN END USER ACCEPTANCE STUDY
HOW DO COMPANION-TYPE SERVICE-ROBOTS FIT INTO DAILY ROUTINES OF THE
ELDERLY TO IMPROVE QUALITY OF LIFE?
DO CHILDREN BEHAVE DIFFERENTLY WITH A SOCIAL ROBOT IF WITH PEERS?
IS A FURRY PET MORE ENGAGING? COMPARING THE EFFECT OF THE MATERIAL ON
THE BODY SURFACE OF ROBOT PETS
CAN YOU TRUST YOUR ROBOTIC ASSISTANT?
A ROBOTIC SOCIAL RECIPROCITY IN CHILDREN WITH AUTISM SPECTRUM DISORDER
LEARNING COMPLEX TRAJECTORIES BY IMITATION USING ORTHOGONAL BASIS
FUNCTIONS AND TEMPLATE MATCHING
DOES PHYSICAL INTERACTION ESCALATE?
BEING THERE: HUMANS AND ROBOTS IN PUBLIC SPACES
SIGNALING ROBOT TRUSTWORTHINESS: EFFECTS OF BEHAVIORAL CUES AS WARNINGS
ACTIVITY SWITCHING IN CHILD-ROBOT INTERACTION: A HOSPITAL CASE STUDY
ADDRESSING MULTIPLE PARTICIPANTS: A MUSEUM ROBOT’S GAZE SHAPES VISITOR
PARTICIPATION
TOWARDS A ROBOTIC SPORTS INSTRUCTOR FOR HIGH-INTERACTION SPORTS
DIESES SCHRIFTSTUECK WURDE MASCHINELL ERZEUGT.
RESEARCH IN ATTACKS, INTRUSIONS, AND DEFENSES
/
: 2013
ABSTRACT / INHALTSTEXT
THIS BOOK CONSTITUTES THE PROCEEDINGS OF THE 16TH INTERNATIONAL
SYMPOSIUM ON RESEARCH IN ATTACKS, INTRUSIONS AND DEFENSES, FORMER RECENT
ADVANCES IN INTRUSION DETECTION, RAID 2013, HELD IN RODNEY BAY, ST.
LUCIA IN OCTOBER 2013. THE VOLUME CONTAINS 22 FULL PAPERS THAT WERE
CAREFULLY REVIEWED AND SELECTED FROM 95 SUBMISSIONS, AS WELL AS 10
POSTER PAPERS SELECTED FROM THE 23 SUBMISSIONS. THE PAPERS ADDRESS ALL
CURRENT TOPICS IN COMPUTER SECURITY RANGED FROM HARDWARE-LEVEL SECURITY,
SERVER, WEB, MOBILE, AND CLOUD-BASED SECURITY, MALWARE ANALYSIS, AND WEB
AND NETWORK PRIVACY
DIESES SCHRIFTSTUECK WURDE MASCHINELL ERZEUGT. |
any_adam_object | 1 |
author_GND | (DE-588)134280008 |
building | Verbundindex |
bvnumber | BV041588191 |
classification_rvk | SS 4800 |
classification_tum | DAT 462f DAT 055f DAT 000 DAT 465f |
collection | ZDB-2-SCS ZDB-2-LNC |
ctrlnum | (OCoLC)865039920 (DE-599)BVBBV041588191 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
doi_str_mv | 10.1007/978-3-642-41284-4 |
format | Electronic Conference Proceeding eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>00000nam a2200000 cb4500</leader><controlfield tag="001">BV041588191</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20200514</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">140124s2013 gw d||| o|||| 10||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">3642412831</subfield><subfield code="9">3-642-41283-1</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783642412844</subfield><subfield code="c">eISBN</subfield><subfield code="9">978-3-642-41284-4</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1007/978-3-642-41284-4</subfield><subfield code="2">doi</subfield></datafield><datafield tag="024" ind1="3" ind2=" "><subfield code="a">9783642412837</subfield></datafield><datafield tag="028" ind1="5" ind2="2"><subfield code="a">Best.-Nr.: 86326265</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)865039920</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV041588191</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rakddb</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="044" ind1=" " ind2=" "><subfield code="a">gw</subfield><subfield code="c">XA-DE-BE</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-473</subfield><subfield code="a">DE-M347</subfield><subfield code="a">DE-20</subfield><subfield code="a">DE-703</subfield><subfield code="a">DE-Aug4</subfield><subfield code="a">DE-92</subfield><subfield code="a">DE-29</subfield><subfield code="a">DE-859</subfield><subfield code="a">DE-91</subfield><subfield code="a">DE-706</subfield><subfield code="a">DE-739</subfield><subfield code="a">DE-384</subfield><subfield code="a">DE-634</subfield><subfield code="a">DE-355</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 462f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 055f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">004</subfield><subfield code="2">sdnb</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 000</subfield><subfield code="2">stub</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 465f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Research in attacks, intrusions, and defenses</subfield><subfield code="b">16th international symposium, RAID 2013, Rodney Bay, St. Lucia, October 23 - 25, 2013 ; proceedings</subfield><subfield code="c">Salvatore J. Stolfo ... (eds.)</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Berlin [u.a.]</subfield><subfield code="b">Springer</subfield><subfield code="c">2013</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (XI, 476 S.)</subfield><subfield code="b">graph. Darst.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">Lecture notes in computer science</subfield><subfield code="v">8145</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Cloud Computing</subfield><subfield code="0">(DE-588)7623494-0</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Rechnernetz</subfield><subfield code="0">(DE-588)4070085-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kryptoanalyse</subfield><subfield code="0">(DE-588)4830502-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Eindringerkennung</subfield><subfield code="0">(DE-588)4706627-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Malware</subfield><subfield code="0">(DE-588)4687059-3</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Trusted Computing</subfield><subfield code="0">(DE-588)7562931-8</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)1071861417</subfield><subfield code="a">Konferenzschrift</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Eindringerkennung</subfield><subfield code="0">(DE-588)4706627-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Kryptoanalyse</subfield><subfield code="0">(DE-588)4830502-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Malware</subfield><subfield code="0">(DE-588)4687059-3</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="3"><subfield code="a">Trusted Computing</subfield><subfield code="0">(DE-588)7562931-8</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="4"><subfield code="a">Rechnernetz</subfield><subfield code="0">(DE-588)4070085-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="5"><subfield code="a">Cloud Computing</subfield><subfield code="0">(DE-588)7623494-0</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="8">1\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Stolfo, Salvatore J.</subfield><subfield code="e">Sonstige</subfield><subfield code="0">(DE-588)134280008</subfield><subfield code="4">oth</subfield></datafield><datafield tag="711" ind1="2" ind2=" "><subfield code="a">RAID</subfield><subfield code="n">16</subfield><subfield code="d">2013</subfield><subfield code="c">Saint Lucia</subfield><subfield code="j">Sonstige</subfield><subfield code="0">(DE-588)1043617256</subfield><subfield code="4">oth</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe, Paperback</subfield><subfield code="z">978-3-642-41283-7</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">Lecture notes in computer science</subfield><subfield code="v">8145</subfield><subfield code="w">(DE-604)BV014880109</subfield><subfield code="9">8145</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1007/978-3-642-41284-4</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Springer Fremddatenuebernahme</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027033309&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Springer Fremddatenuebernahme</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027033309&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Abstract</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">1\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-2-SCS</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-2-LNC</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-027033309</subfield></datafield></record></collection> |
genre | (DE-588)1071861417 Konferenzschrift gnd-content |
genre_facet | Konferenzschrift |
id | DE-604.BV041588191 |
illustrated | Illustrated |
indexdate | 2025-01-10T15:17:29Z |
institution | BVB |
institution_GND | (DE-588)1043617256 |
isbn | 3642412831 9783642412844 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-027033309 |
oclc_num | 865039920 |
open_access_boolean | |
owner | DE-473 DE-BY-UBG DE-M347 DE-20 DE-703 DE-Aug4 DE-92 DE-29 DE-859 DE-91 DE-BY-TUM DE-706 DE-739 DE-384 DE-634 DE-355 DE-BY-UBR |
owner_facet | DE-473 DE-BY-UBG DE-M347 DE-20 DE-703 DE-Aug4 DE-92 DE-29 DE-859 DE-91 DE-BY-TUM DE-706 DE-739 DE-384 DE-634 DE-355 DE-BY-UBR |
physical | 1 Online-Ressource (XI, 476 S.) graph. Darst. |
psigel | ZDB-2-SCS ZDB-2-LNC |
publishDate | 2013 |
publishDateSearch | 2013 |
publishDateSort | 2013 |
publisher | Springer |
record_format | marc |
series | Lecture notes in computer science |
series2 | Lecture notes in computer science |
spelling | Research in attacks, intrusions, and defenses 16th international symposium, RAID 2013, Rodney Bay, St. Lucia, October 23 - 25, 2013 ; proceedings Salvatore J. Stolfo ... (eds.) Berlin [u.a.] Springer 2013 1 Online-Ressource (XI, 476 S.) graph. Darst. txt rdacontent c rdamedia cr rdacarrier Lecture notes in computer science 8145 Cloud Computing (DE-588)7623494-0 gnd rswk-swf Rechnernetz (DE-588)4070085-9 gnd rswk-swf Kryptoanalyse (DE-588)4830502-9 gnd rswk-swf Eindringerkennung (DE-588)4706627-1 gnd rswk-swf Malware (DE-588)4687059-3 gnd rswk-swf Trusted Computing (DE-588)7562931-8 gnd rswk-swf (DE-588)1071861417 Konferenzschrift gnd-content Eindringerkennung (DE-588)4706627-1 s Kryptoanalyse (DE-588)4830502-9 s Malware (DE-588)4687059-3 s Trusted Computing (DE-588)7562931-8 s Rechnernetz (DE-588)4070085-9 s Cloud Computing (DE-588)7623494-0 s 1\p DE-604 Stolfo, Salvatore J. Sonstige (DE-588)134280008 oth RAID 16 2013 Saint Lucia Sonstige (DE-588)1043617256 oth Erscheint auch als Druck-Ausgabe, Paperback 978-3-642-41283-7 Lecture notes in computer science 8145 (DE-604)BV014880109 8145 https://doi.org/10.1007/978-3-642-41284-4 Verlag Volltext Springer Fremddatenuebernahme application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027033309&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis Springer Fremddatenuebernahme application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027033309&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA Abstract 1\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk |
spellingShingle | Research in attacks, intrusions, and defenses 16th international symposium, RAID 2013, Rodney Bay, St. Lucia, October 23 - 25, 2013 ; proceedings Lecture notes in computer science Cloud Computing (DE-588)7623494-0 gnd Rechnernetz (DE-588)4070085-9 gnd Kryptoanalyse (DE-588)4830502-9 gnd Eindringerkennung (DE-588)4706627-1 gnd Malware (DE-588)4687059-3 gnd Trusted Computing (DE-588)7562931-8 gnd |
subject_GND | (DE-588)7623494-0 (DE-588)4070085-9 (DE-588)4830502-9 (DE-588)4706627-1 (DE-588)4687059-3 (DE-588)7562931-8 (DE-588)1071861417 |
title | Research in attacks, intrusions, and defenses 16th international symposium, RAID 2013, Rodney Bay, St. Lucia, October 23 - 25, 2013 ; proceedings |
title_auth | Research in attacks, intrusions, and defenses 16th international symposium, RAID 2013, Rodney Bay, St. Lucia, October 23 - 25, 2013 ; proceedings |
title_exact_search | Research in attacks, intrusions, and defenses 16th international symposium, RAID 2013, Rodney Bay, St. Lucia, October 23 - 25, 2013 ; proceedings |
title_full | Research in attacks, intrusions, and defenses 16th international symposium, RAID 2013, Rodney Bay, St. Lucia, October 23 - 25, 2013 ; proceedings Salvatore J. Stolfo ... (eds.) |
title_fullStr | Research in attacks, intrusions, and defenses 16th international symposium, RAID 2013, Rodney Bay, St. Lucia, October 23 - 25, 2013 ; proceedings Salvatore J. Stolfo ... (eds.) |
title_full_unstemmed | Research in attacks, intrusions, and defenses 16th international symposium, RAID 2013, Rodney Bay, St. Lucia, October 23 - 25, 2013 ; proceedings Salvatore J. Stolfo ... (eds.) |
title_short | Research in attacks, intrusions, and defenses |
title_sort | research in attacks intrusions and defenses 16th international symposium raid 2013 rodney bay st lucia october 23 25 2013 proceedings |
title_sub | 16th international symposium, RAID 2013, Rodney Bay, St. Lucia, October 23 - 25, 2013 ; proceedings |
topic | Cloud Computing (DE-588)7623494-0 gnd Rechnernetz (DE-588)4070085-9 gnd Kryptoanalyse (DE-588)4830502-9 gnd Eindringerkennung (DE-588)4706627-1 gnd Malware (DE-588)4687059-3 gnd Trusted Computing (DE-588)7562931-8 gnd |
topic_facet | Cloud Computing Rechnernetz Kryptoanalyse Eindringerkennung Malware Trusted Computing Konferenzschrift |
url | https://doi.org/10.1007/978-3-642-41284-4 http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027033309&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027033309&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA |
volume_link | (DE-604)BV014880109 |
work_keys_str_mv | AT stolfosalvatorej researchinattacksintrusionsanddefenses16thinternationalsymposiumraid2013rodneybaystluciaoctober23252013proceedings AT raidsaintlucia researchinattacksintrusionsanddefenses16thinternationalsymposiumraid2013rodneybaystluciaoctober23252013proceedings |