Cybersecurity Systems for Human Cognition Augmentation:
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Cham ; s.l.
Springer International Publishing
2014
Imprint: Springer |
Schriftenreihe: | Advances in Information Security
61 |
Schlagworte: | |
Online-Zugang: | BFB01 BTU01 FHA01 FHM01 FHN01 FKE01 FRO01 UBG01 UBR01 UBT01 UBW01 UER01 UPA01 Volltext Inhaltsverzeichnis Abstract |
Beschreibung: | 1 Online-Ressource (XVI, 209 p.) Ill. |
ISBN: | 9783319103747 |
DOI: | 10.1007/978-3-319-10374-7 |
Internformat
MARC
LEADER | 00000nmm a2200000 cb4500 | ||
---|---|---|---|
001 | BV042202015 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 141121s2014 |||| o||u| ||||||eng d | ||
020 | |a 9783319103747 |c Online |9 978-3-319-10374-7 | ||
024 | 7 | |a 10.1007/978-3-319-10374-7 |2 doi | |
035 | |a (OCoLC)894708630 | ||
035 | |a (DE-599)BVBBV042202015 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
049 | |a DE-703 |a DE-20 |a DE-92 |a DE-859 |a DE-M347 |a DE-473 |a DE-522 |a DE-29 |a DE-861 |a DE-Aug4 |a DE-634 |a DE-739 |a DE-355 | ||
082 | 0 | |a 004 | |
100 | 1 | |a Pino, Robinson E. |e Verfasser |4 aut | |
245 | 1 | 0 | |a Cybersecurity Systems for Human Cognition Augmentation |c edited by Robinson E. Pino, Alexander Kott, Michael Shevenell |
264 | 1 | |a Cham ; s.l. |b Springer International Publishing |c 2014 | |
264 | 1 | |b Imprint: Springer | |
300 | |a 1 Online-Ressource (XVI, 209 p.) |b Ill. | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
490 | 1 | |a Advances in Information Security |v 61 | |
533 | |a Online-Ausgabe |f Springer eBook Collection / Computer Science | ||
650 | 0 | 7 | |a Datenschutz |0 (DE-588)4011134-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Künstliche Intelligenz |0 (DE-588)4033447-8 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Neurowissenschaften |0 (DE-588)7555119-6 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Neurowissenschaften |0 (DE-588)7555119-6 |D s |
689 | 0 | 1 | |a Datenschutz |0 (DE-588)4011134-9 |D s |
689 | 0 | 2 | |a Künstliche Intelligenz |0 (DE-588)4033447-8 |D s |
689 | 0 | |5 DE-604 | |
700 | 1 | |a Kott, Alexander |e Sonstige |4 oth | |
700 | 1 | |a Shevenell, Michael |e Sonstige |4 oth | |
776 | 0 | 8 | |i Reproduktion von |a Pino, Robinson E. |t Cybersecurity Systems for Human Cognition Augmentation |d 2014 |
776 | 0 | 8 | |i Erscheint auch als |n Druckausgabe |z 978-3-319-10373-0 |
830 | 0 | |a Advances in Information Security |v 61 |w (DE-604)BV022281064 |9 61 | |
856 | 4 | 0 | |u https://doi.org/10.1007/978-3-319-10374-7 |x Verlag |3 Volltext |
856 | 4 | 2 | |m Springer Fremddatenuebernahme |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027640886&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
856 | 4 | 2 | |m Springer Fremddatenuebernahme |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027640886&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA |3 Abstract |
912 | |a ZDB-2-SCS | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-027640886 | ||
966 | e | |u https://doi.org/10.1007/978-3-319-10374-7 |l BFB01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-10374-7 |l BTU01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-10374-7 |l FHA01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-10374-7 |l FHM01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-10374-7 |l FHN01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-10374-7 |l FKE01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-10374-7 |l FRO01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-10374-7 |l UBG01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-10374-7 |l UBR01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-10374-7 |l UBT01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-10374-7 |l UBW01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-10374-7 |l UER01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-10374-7 |l UPA01 |p ZDB-2-SCS |x Verlag |3 Volltext |
Datensatz im Suchindex
_version_ | 1804152719545466880 |
---|---|
adam_text | CYBERSECURITY SYSTEMS FOR HUMAN COGNITION AUGMENTATION
/
: 2014
TABLE OF CONTENTS / INHALTSVERZEICHNIS
SITUATIONAL AWARENESS, SENSEMAKING, AND SITUATION UNDERSTANDING IN CYBER
WARFARE
NEUROMORPHIC COMPUTING FOR COGNITIVE AUGMENTATION IN CYBER DEFENSE
AUTOMATED CYBER SITUATION AWARENESS TOOLS AND MODELS FOR IMPROVING
ANALYST PERFORMANCE
DATA MINING IN CYBER OPERATIONS
TRUSTED COMPUTATION THROUGH BIOLOGICALLY INSPIRED PROCESSES
DYNAMIC LOGIC MACHINE LEARNING FOR CYBERSECURITY
TOWARDS NEURAL NETWORK BASED MALWARE DETECTION ON ANDROID MOBILE DEVICES
SUSTAINABILITY PROBLEMS AND A NOVELTY IN THE CONCEPT OF ENERGY
MEMRISTORS AS SYNAPSES IN ARTIFICIAL NEURAL NETWORKS: BIOMIMICRY BEYOND
WEIGHT CHANGE
LOW POWER NEUROMORPHIC ARCHITECTURES TO ENABLE PERVASIVE DEPLOYMENT OF
INTRUSION DETECTION SYSTEMS
MEMRISTOR SPICE MODEL SIMULATION AND DEVICE HARDWARE CORRELATION
RECONFIGURABLE MEMRISTOR BASED COMPUTING LOGIC
CYBER SECURITY CONSIDERATIONS FOR RECONFIGURABLE SYSTEMS
DIESES SCHRIFTSTUECK WURDE MASCHINELL ERZEUGT.
CYBERSECURITY SYSTEMS FOR HUMAN COGNITION AUGMENTATION
/
: 2014
ABSTRACT / INHALTSTEXT
THIS BOOK EXPLORES CYBERSECURITY RESEARCH AND DEVELOPMENT EFFORTS,
INCLUDING IDEAS THAT DEAL WITH THE GROWING CHALLENGE OF HOW COMPUTING
ENGINEERING CAN MERGE WITH NEUROSCIENCE. THE CONTRIBUTING AUTHORS, WHO
ARE RENOWNED LEADERS IN THIS FIELD, THOROUGHLY EXAMINE NEW TECHNOLOGIES
THAT WILL AUTOMATE SECURITY PROCEDURES AND PERFORM AUTONOMOUS FUNCTIONS
WITH DECISION MAKING CAPABILITIES. TO MAXIMIZE READER INSIGHT INTO THE
RANGE OF PROFESSIONS DEALING WITH INCREASED CYBERSECURITY ISSUES, THIS
BOOK PRESENTS WORK PERFORMED BY GOVERNMENT, INDUSTRY, AND ACADEMIC
RESEARCH INSTITUTIONS WORKING AT THE FRONTIER OF CYBERSECURITY AND
NETWORK SCIENCES. CYBERSECURITY SYSTEMS FOR HUMAN COGNITION AUGMENTATION
IS DESIGNED AS A REFERENCE FOR PRACTITIONERS OR GOVERNMENT EMPLOYEES
WORKING IN CYBERSECURITY. ADVANCED-LEVEL STUDENTS OR RESEARCHERS FOCUSED
ON COMPUTER ENGINEERING OR NEUROSCIENCE WILL ALSO FIND THIS BOOK A
USEFUL RESOURCE
DIESES SCHRIFTSTUECK WURDE MASCHINELL ERZEUGT.
|
any_adam_object | 1 |
author | Pino, Robinson E. |
author_facet | Pino, Robinson E. |
author_role | aut |
author_sort | Pino, Robinson E. |
author_variant | r e p re rep |
building | Verbundindex |
bvnumber | BV042202015 |
collection | ZDB-2-SCS |
ctrlnum | (OCoLC)894708630 (DE-599)BVBBV042202015 |
dewey-full | 004 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 004 - Computer science |
dewey-raw | 004 |
dewey-search | 004 |
dewey-sort | 14 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
doi_str_mv | 10.1007/978-3-319-10374-7 |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03744nmm a2200661 cb4500</leader><controlfield tag="001">BV042202015</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">141121s2014 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783319103747</subfield><subfield code="c">Online</subfield><subfield code="9">978-3-319-10374-7</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1007/978-3-319-10374-7</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)894708630</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV042202015</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-703</subfield><subfield code="a">DE-20</subfield><subfield code="a">DE-92</subfield><subfield code="a">DE-859</subfield><subfield code="a">DE-M347</subfield><subfield code="a">DE-473</subfield><subfield code="a">DE-522</subfield><subfield code="a">DE-29</subfield><subfield code="a">DE-861</subfield><subfield code="a">DE-Aug4</subfield><subfield code="a">DE-634</subfield><subfield code="a">DE-739</subfield><subfield code="a">DE-355</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">004</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Pino, Robinson E.</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Cybersecurity Systems for Human Cognition Augmentation</subfield><subfield code="c">edited by Robinson E. Pino, Alexander Kott, Michael Shevenell</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Cham ; s.l.</subfield><subfield code="b">Springer International Publishing</subfield><subfield code="c">2014</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="b">Imprint: Springer</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (XVI, 209 p.)</subfield><subfield code="b">Ill.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">Advances in Information Security</subfield><subfield code="v">61</subfield></datafield><datafield tag="533" ind1=" " ind2=" "><subfield code="a">Online-Ausgabe</subfield><subfield code="f">Springer eBook Collection / Computer Science</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Datenschutz</subfield><subfield code="0">(DE-588)4011134-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Künstliche Intelligenz</subfield><subfield code="0">(DE-588)4033447-8</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Neurowissenschaften</subfield><subfield code="0">(DE-588)7555119-6</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Neurowissenschaften</subfield><subfield code="0">(DE-588)7555119-6</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Datenschutz</subfield><subfield code="0">(DE-588)4011134-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Künstliche Intelligenz</subfield><subfield code="0">(DE-588)4033447-8</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Kott, Alexander</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Shevenell, Michael</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Reproduktion von</subfield><subfield code="a">Pino, Robinson E.</subfield><subfield code="t">Cybersecurity Systems for Human Cognition Augmentation</subfield><subfield code="d">2014</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druckausgabe</subfield><subfield code="z">978-3-319-10373-0</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">Advances in Information Security</subfield><subfield code="v">61</subfield><subfield code="w">(DE-604)BV022281064</subfield><subfield code="9">61</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1007/978-3-319-10374-7</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Springer Fremddatenuebernahme</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027640886&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Springer Fremddatenuebernahme</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027640886&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Abstract</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-2-SCS</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-027640886</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-10374-7</subfield><subfield code="l">BFB01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-10374-7</subfield><subfield code="l">BTU01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-10374-7</subfield><subfield code="l">FHA01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-10374-7</subfield><subfield code="l">FHM01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-10374-7</subfield><subfield code="l">FHN01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-10374-7</subfield><subfield code="l">FKE01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-10374-7</subfield><subfield code="l">FRO01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-10374-7</subfield><subfield code="l">UBG01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-10374-7</subfield><subfield code="l">UBR01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-10374-7</subfield><subfield code="l">UBT01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-10374-7</subfield><subfield code="l">UBW01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-10374-7</subfield><subfield code="l">UER01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-10374-7</subfield><subfield code="l">UPA01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV042202015 |
illustrated | Illustrated |
indexdate | 2024-07-10T01:15:11Z |
institution | BVB |
isbn | 9783319103747 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-027640886 |
oclc_num | 894708630 |
open_access_boolean | |
owner | DE-703 DE-20 DE-92 DE-859 DE-M347 DE-473 DE-BY-UBG DE-522 DE-29 DE-861 DE-Aug4 DE-634 DE-739 DE-355 DE-BY-UBR |
owner_facet | DE-703 DE-20 DE-92 DE-859 DE-M347 DE-473 DE-BY-UBG DE-522 DE-29 DE-861 DE-Aug4 DE-634 DE-739 DE-355 DE-BY-UBR |
physical | 1 Online-Ressource (XVI, 209 p.) Ill. |
psigel | ZDB-2-SCS |
publishDate | 2014 |
publishDateSearch | 2014 |
publishDateSort | 2014 |
publisher | Springer International Publishing Imprint: Springer |
record_format | marc |
series | Advances in Information Security |
series2 | Advances in Information Security |
spelling | Pino, Robinson E. Verfasser aut Cybersecurity Systems for Human Cognition Augmentation edited by Robinson E. Pino, Alexander Kott, Michael Shevenell Cham ; s.l. Springer International Publishing 2014 Imprint: Springer 1 Online-Ressource (XVI, 209 p.) Ill. txt rdacontent c rdamedia cr rdacarrier Advances in Information Security 61 Online-Ausgabe Springer eBook Collection / Computer Science Datenschutz (DE-588)4011134-9 gnd rswk-swf Künstliche Intelligenz (DE-588)4033447-8 gnd rswk-swf Neurowissenschaften (DE-588)7555119-6 gnd rswk-swf Neurowissenschaften (DE-588)7555119-6 s Datenschutz (DE-588)4011134-9 s Künstliche Intelligenz (DE-588)4033447-8 s DE-604 Kott, Alexander Sonstige oth Shevenell, Michael Sonstige oth Reproduktion von Pino, Robinson E. Cybersecurity Systems for Human Cognition Augmentation 2014 Erscheint auch als Druckausgabe 978-3-319-10373-0 Advances in Information Security 61 (DE-604)BV022281064 61 https://doi.org/10.1007/978-3-319-10374-7 Verlag Volltext Springer Fremddatenuebernahme application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027640886&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis Springer Fremddatenuebernahme application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027640886&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA Abstract |
spellingShingle | Pino, Robinson E. Cybersecurity Systems for Human Cognition Augmentation Advances in Information Security Datenschutz (DE-588)4011134-9 gnd Künstliche Intelligenz (DE-588)4033447-8 gnd Neurowissenschaften (DE-588)7555119-6 gnd |
subject_GND | (DE-588)4011134-9 (DE-588)4033447-8 (DE-588)7555119-6 |
title | Cybersecurity Systems for Human Cognition Augmentation |
title_auth | Cybersecurity Systems for Human Cognition Augmentation |
title_exact_search | Cybersecurity Systems for Human Cognition Augmentation |
title_full | Cybersecurity Systems for Human Cognition Augmentation edited by Robinson E. Pino, Alexander Kott, Michael Shevenell |
title_fullStr | Cybersecurity Systems for Human Cognition Augmentation edited by Robinson E. Pino, Alexander Kott, Michael Shevenell |
title_full_unstemmed | Cybersecurity Systems for Human Cognition Augmentation edited by Robinson E. Pino, Alexander Kott, Michael Shevenell |
title_short | Cybersecurity Systems for Human Cognition Augmentation |
title_sort | cybersecurity systems for human cognition augmentation |
topic | Datenschutz (DE-588)4011134-9 gnd Künstliche Intelligenz (DE-588)4033447-8 gnd Neurowissenschaften (DE-588)7555119-6 gnd |
topic_facet | Datenschutz Künstliche Intelligenz Neurowissenschaften |
url | https://doi.org/10.1007/978-3-319-10374-7 http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027640886&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027640886&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA |
volume_link | (DE-604)BV022281064 |
work_keys_str_mv | AT pinorobinsone cybersecuritysystemsforhumancognitionaugmentation AT kottalexander cybersecuritysystemsforhumancognitionaugmentation AT shevenellmichael cybersecuritysystemsforhumancognitionaugmentation |