Computational Intelligence, Cyber Security and Computational Models: Proceedings of ICC3, 2013
Gespeichert in:
Format: | Elektronisch E-Book |
---|---|
Sprache: | English |
Veröffentlicht: |
New Delhi
Springer India
2014
|
Schriftenreihe: | Advances in Intelligent Systems and Computing
246 |
Schlagworte: | |
Online-Zugang: | BTU01 FHA01 FHI01 FHN01 FHR01 FKE01 FRO01 FWS01 FWS02 UBY01 Volltext Inhaltsverzeichnis Abstract |
Beschreibung: | 1 Online Ressource (XV, 416 p. 125 illus) |
ISBN: | 9788132216803 |
ISSN: | 2194-5357 |
DOI: | 10.1007/978-81-322-1680-3 |
Internformat
MARC
LEADER | 00000nmm a2200000zcb4500 | ||
---|---|---|---|
001 | BV043209281 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 151215s2014 |||| o||u| ||||||eng d | ||
020 | |a 9788132216803 |c Online |9 978-81-322-1680-3 | ||
024 | 7 | |a 10.1007/978-81-322-1680-3 |2 doi | |
035 | |a (OCoLC)1195535372 | ||
035 | |a (DE-599)BVBBV043209281 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
049 | |a DE-Aug4 |a DE-898 |a DE-861 |a DE-573 |a DE-859 |a DE-634 |a DE-92 |a DE-706 |a DE-863 |a DE-862 | ||
082 | 0 | |a 006.3 |2 23 | |
245 | 1 | 0 | |a Computational Intelligence, Cyber Security and Computational Models |b Proceedings of ICC3, 2013 |c edited by G. Sai Sundara Krishnan, R. Anitha, R. S. Lekshmi, M. Senthil Kumar, Anthony Bonato, Manuel Graña |
264 | 1 | |a New Delhi |b Springer India |c 2014 | |
300 | |a 1 Online Ressource (XV, 416 p. 125 illus) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
490 | 0 | |a Advances in Intelligent Systems and Computing |v 246 |x 2194-5357 | |
650 | 4 | |a Engineering | |
650 | 4 | |a Computer security | |
650 | 4 | |a Artificial intelligence | |
650 | 4 | |a Computer science / Mathematics | |
650 | 4 | |a Computer mathematics | |
650 | 4 | |a Computational intelligence | |
650 | 4 | |a Computational Intelligence | |
650 | 4 | |a Systems and Data Security | |
650 | 4 | |a Computational Mathematics and Numerical Analysis | |
650 | 4 | |a Artificial Intelligence (incl. Robotics) | |
650 | 4 | |a Mathematical Applications in Computer Science | |
650 | 4 | |a Informatik | |
650 | 4 | |a Ingenieurwissenschaften | |
650 | 4 | |a Künstliche Intelligenz | |
650 | 4 | |a Mathematik | |
700 | 1 | |a Krishnan, G. Sai Sundara |e Sonstige |4 oth | |
700 | 1 | |a Anitha, R. |e Sonstige |4 oth | |
700 | 1 | |a Lekshmi, R. S. |e Sonstige |4 oth | |
700 | 1 | |a Kumar, M. Senthil |e Sonstige |4 oth | |
700 | 1 | |a Bonato, Anthony |e Sonstige |4 oth | |
700 | 1 | |a Graña, Manuel |e Sonstige |4 oth | |
776 | 0 | 8 | |i Erscheint auch als |n Druckausgabe |z 978-81-322-1679-7 |
856 | 4 | 0 | |u https://doi.org/10.1007/978-81-322-1680-3 |x Verlag |3 Volltext |
856 | 4 | 2 | |m Springer Fremddatenuebernahme |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028632442&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
856 | 4 | 2 | |m Springer Fremddatenuebernahme |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028632442&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA |3 Abstract |
912 | |a ZDB-2-ENG | ||
940 | 1 | |q ZDB-2-ENG_2014_Fremddaten | |
999 | |a oai:aleph.bib-bvb.de:BVB01-028632442 | ||
966 | e | |u https://doi.org/10.1007/978-81-322-1680-3 |l BTU01 |p ZDB-2-ENG |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-81-322-1680-3 |l FHA01 |p ZDB-2-ENG |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-81-322-1680-3 |l FHI01 |p ZDB-2-ENG |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-81-322-1680-3 |l FHN01 |p ZDB-2-ENG |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-81-322-1680-3 |l FHR01 |p ZDB-2-ENG |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-81-322-1680-3 |l FKE01 |p ZDB-2-ENG |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-81-322-1680-3 |l FRO01 |p ZDB-2-ENG |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-81-322-1680-3 |l FWS01 |p ZDB-2-ENG |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-81-322-1680-3 |l FWS02 |p ZDB-2-ENG |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-81-322-1680-3 |l UBY01 |p ZDB-2-ENG |x Verlag |3 Volltext |
Datensatz im Suchindex
DE-BY-FWS_katkey | 1015416 |
---|---|
_version_ | 1806174832197369856 |
adam_text | COMPUTATIONAL INTELLIGENCE, CYBER SECURITY AND COMPUTATIONAL MODELS
/
: 2014
TABLE OF CONTENTS / INHALTSVERZEICHNIS
THE ROBBER STRIKES BACK
SOME APPLICATIONS OF COLLECTIVE LEARNING
SUBCONSCIOUS SOCIAL COMPUTATIONAL INTELLIGENCE
MODELING HEAVY-TAILS IN TRAFFIC SOURCES FOR NETWORK PERFORMANCE
EVALUATION
THE FUTURE OF ACCESS CONTROL: ATTRIBUTES, AUTOMATION AND ADAPTATION
OPTIMAL CONTROL FOR AN MX/G/1/N + 1 QUEUE WITH TWO SERVICE MODES
A NOVEL APPROACH FOR GENE SELECTION OF LEUKEMIA DATASET USING DIFFERENT
CLUSTERING METHODS
A STUDY ON ENHANCING NETWORK STABILITY IN VANET WITH ENERGY CONSERVATION
OF ROAD SIDE INFRASTRUCTURES USING LPMA AGENT
AN INTUITIONISTIC FUZZY APPROACH TO FUZZY CLUSTERING OF NUMERICAL
DATASET
ELM BASED ENSEMBLE CLASSIFIER FOR GAS SENSOR ARRAY DRIFT DATASET
HIPPOCAMPUS ATROPHY DETECTION USING HYBRID SEMANTIC CATEGORIZATION
HYPER QUADTREE BASED K-MEANS ALGORITHM FOR SOFTWARE FAULT PREDICTION
IMPLEMENTATION OF LOCALIZED REGION BASED ACTIVE CONTOUR SEGMENTATION FOR
VOLUME MEASUREMENT OF URINARY BLADDER USING ULTRASOUND IMAGES
IMPROVED BIJECTIVE SOFT SET BASED CLASSIFICATION FOR GENE EXPRESSION
DATA
MAMMOGRAM IMAGE CLASSIFICATION USING ROUGH NEURAL NETWORK
PERFORMANCE ASSESSMENT OF KERNEL BASED CLUSTERING
REGISTRATION OF ULTRASOUND LIVER IMAGES USING MUTUAL INFORMATION
TECHNIQUE
SENTIMENT MINING USING SVM BASED HYBRID CLASSIFICATION MODEL
SHAPE BASED IMAGE CLASSIFICATION AND RETRIEVAL WITH MULTI-RESOLUTION
ENHANCED ORTHOGONAL POLYNOMIALS MODEL
USING FUZZY LOGIC FOR PRODUCT MATCHING
A NOVEL NON-REPUDIATE SCHEME WITH VOICE FEATURE MARKING.-A STUDY OF SPAM
DETECTION ALGORITHM ON SOCIAL MEDIA NETWORKS
BOTNETS: A STUDY AND ANALYSIS
COMPARATIVE STUDY OF TWO AND MULTI CLASS CLASSIFICATION BASED DETECTION
OF MALICIOUS EXECUTABLES USING SOFT COMPUTING TECHNIQUES ON EXHAUSTIVE
FEATURE SET
CRHA: AN EFFICIENT HA REVITALIZATION TO SUSTAIN BINDING INFORMATION OF
HOME AGENT IN MIPV6 NETWORK
INTERACTION COUPLING: A MODERN COUPLING EXTRACTOR
SECURE MULTICASTING PROTOCOLS IN WIRELESS MESH NETWORKS - A SURVEY
A NEW REVERSIBLE SMG GATE AND ITS APPLICATION FOR DESIGNING TWO’S
COMPLEMENT ADDER/SUBTRACTOR WITH OVERFLOW DETECTION LOGIC FOR QUANTUM
COMPUTER BASED SYSTEMS
AN ALGORITHM FOR CONSTRUCTION OF GRACEFUL TREE FROM AN ARBITRARY TREE
CHARACTERIZATION OF SEMI-OPEN SUBCOMPLEXES IN ABSTRACT CELLULAR COMPLEX
FLUID QUEUE DRIVEN BY AN M/M/1 QUEUE SUBJECT TO CATASTROPHES
FUZZY VEISV EPIDEMIC PROPAGATION MODELING FOR NETWORK WORM ATTACK
HEXAGONAL PRUSA GRAMMAR MODEL FOR CONTEXT FREE HEXAGONAL PICTURE
LANGUAGES
ISO-TRIANGULAR PICTURES AND RECOGNISABILITY
JOB BLOCK SCHEDULING WITH DUAL CRITERIA AND SEQUENCE DEPENDENT SETUP
TIME INVOLVING TRANSPORTATION TIMES
MODULAR CHROMATIC NUMBER OF CMCN
NETWORK ANALYSIS OF BI-SERIAL QUEUES LINKED WITH A FLOWSHOP SCHEDULING
SYSTEM
SOLVING MULTI-OBJECTIVE LINEAR FRACTIONAL PROGRAMMING PROBLEM USING
FIRST ORDER
TAYLOR’S SERIES APPROXIMATION
VORONOI DIAGRAM BASED GEOMETRIC APPROACH FOR SOCIAL NETWORK ANALYSIS
COMPARATIVE ANALYSIS OF DISCRETIZATION METHODS FOR GENE SELECTION OF
BREAST CANCER GENE EXPRESSION DATA
MODIFIED SOFT ROUGH SET FOR MULTICLASS CLASSIFICATION
A NOVEL GENETIC ALGORITHM FOR EFFECTIVE JOB SCHEDULING IN GRID
ENVIRONMENT
A MULTIFACTOR BIOMETRIC AUTHENTICATION FOR THE CLOUD
ACCELERATING THE PERFORMANCE OF DES ON GPU AND A VISUALIZATION TOOL IN
MICROSOFT EXCEL SPREADSHEET
DIESES SCHRIFTSTUECK WURDE MASCHINELL ERZEUGT.
COMPUTATIONAL INTELLIGENCE, CYBER SECURITY AND COMPUTATIONAL MODELS
/
: 2014
ABSTRACT / INHALTSTEXT
THIS BOOK CONTAINS CUTTING-EDGE RESEARCH MATERIAL PRESENTED BY
RESEARCHERS, ENGINEERS, DEVELOPERS, AND PRACTITIONERS FROM ACADEMIA AND
INDUSTRY AT THE INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE,
CYBER SECURITY AND COMPUTATIONAL MODELS (ICC3) ORGANIZED BY PSG COLLEGE
OF TECHNOLOGY, COIMBATORE, INDIA DURING DECEMBER 19–21, 2013. THE
MATERIALS IN THE BOOK INCLUDE THEORY AND APPLICATIONS FOR DESIGN,
ANALYSIS, AND MODELING OF COMPUTATIONAL INTELLIGENCE AND SECURITY. THE
BOOK WILL BE USEFUL MATERIAL FOR STUDENTS, RESEARCHERS, PROFESSIONALS,
AND ACADEMICIANS. IT WILL HELP IN UNDERSTANDING CURRENT RESEARCH TRENDS
AND FINDINGS AND FUTURE SCOPE OF RESEARCH IN COMPUTATIONAL INTELLIGENCE,
CYBER SECURITY, AND COMPUTATIONAL MODELS
DIESES SCHRIFTSTUECK WURDE MASCHINELL ERZEUGT.
|
any_adam_object | 1 |
building | Verbundindex |
bvnumber | BV043209281 |
collection | ZDB-2-ENG |
ctrlnum | (OCoLC)1195535372 (DE-599)BVBBV043209281 |
dewey-full | 006.3 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 006 - Special computer methods |
dewey-raw | 006.3 |
dewey-search | 006.3 |
dewey-sort | 16.3 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
doi_str_mv | 10.1007/978-81-322-1680-3 |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03651nmm a2200721zcb4500</leader><controlfield tag="001">BV043209281</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">151215s2014 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9788132216803</subfield><subfield code="c">Online</subfield><subfield code="9">978-81-322-1680-3</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1007/978-81-322-1680-3</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1195535372</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV043209281</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-Aug4</subfield><subfield code="a">DE-898</subfield><subfield code="a">DE-861</subfield><subfield code="a">DE-573</subfield><subfield code="a">DE-859</subfield><subfield code="a">DE-634</subfield><subfield code="a">DE-92</subfield><subfield code="a">DE-706</subfield><subfield code="a">DE-863</subfield><subfield code="a">DE-862</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">006.3</subfield><subfield code="2">23</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Computational Intelligence, Cyber Security and Computational Models</subfield><subfield code="b">Proceedings of ICC3, 2013</subfield><subfield code="c">edited by G. Sai Sundara Krishnan, R. Anitha, R. S. Lekshmi, M. Senthil Kumar, Anthony Bonato, Manuel Graña</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">New Delhi</subfield><subfield code="b">Springer India</subfield><subfield code="c">2014</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online Ressource (XV, 416 p. 125 illus)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">Advances in Intelligent Systems and Computing</subfield><subfield code="v">246</subfield><subfield code="x">2194-5357</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Engineering</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Artificial intelligence</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer science / Mathematics</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer mathematics</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computational intelligence</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computational Intelligence</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Systems and Data Security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computational Mathematics and Numerical Analysis</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Artificial Intelligence (incl. Robotics)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Mathematical Applications in Computer Science</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Informatik</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Ingenieurwissenschaften</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Künstliche Intelligenz</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Mathematik</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Krishnan, G. Sai Sundara</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Anitha, R.</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Lekshmi, R. S.</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Kumar, M. Senthil</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Bonato, Anthony</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Graña, Manuel</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druckausgabe</subfield><subfield code="z">978-81-322-1679-7</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1007/978-81-322-1680-3</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Springer Fremddatenuebernahme</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028632442&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Springer Fremddatenuebernahme</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028632442&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Abstract</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-2-ENG</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">ZDB-2-ENG_2014_Fremddaten</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-028632442</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-81-322-1680-3</subfield><subfield code="l">BTU01</subfield><subfield code="p">ZDB-2-ENG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-81-322-1680-3</subfield><subfield code="l">FHA01</subfield><subfield code="p">ZDB-2-ENG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-81-322-1680-3</subfield><subfield code="l">FHI01</subfield><subfield code="p">ZDB-2-ENG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-81-322-1680-3</subfield><subfield code="l">FHN01</subfield><subfield code="p">ZDB-2-ENG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-81-322-1680-3</subfield><subfield code="l">FHR01</subfield><subfield code="p">ZDB-2-ENG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-81-322-1680-3</subfield><subfield code="l">FKE01</subfield><subfield code="p">ZDB-2-ENG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-81-322-1680-3</subfield><subfield code="l">FRO01</subfield><subfield code="p">ZDB-2-ENG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-81-322-1680-3</subfield><subfield code="l">FWS01</subfield><subfield code="p">ZDB-2-ENG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-81-322-1680-3</subfield><subfield code="l">FWS02</subfield><subfield code="p">ZDB-2-ENG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-81-322-1680-3</subfield><subfield code="l">UBY01</subfield><subfield code="p">ZDB-2-ENG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV043209281 |
illustrated | Not Illustrated |
indexdate | 2024-08-01T10:55:48Z |
institution | BVB |
isbn | 9788132216803 |
issn | 2194-5357 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-028632442 |
oclc_num | 1195535372 |
open_access_boolean | |
owner | DE-Aug4 DE-898 DE-BY-UBR DE-861 DE-573 DE-859 DE-634 DE-92 DE-706 DE-863 DE-BY-FWS DE-862 DE-BY-FWS |
owner_facet | DE-Aug4 DE-898 DE-BY-UBR DE-861 DE-573 DE-859 DE-634 DE-92 DE-706 DE-863 DE-BY-FWS DE-862 DE-BY-FWS |
physical | 1 Online Ressource (XV, 416 p. 125 illus) |
psigel | ZDB-2-ENG ZDB-2-ENG_2014_Fremddaten |
publishDate | 2014 |
publishDateSearch | 2014 |
publishDateSort | 2014 |
publisher | Springer India |
record_format | marc |
series2 | Advances in Intelligent Systems and Computing |
spellingShingle | Computational Intelligence, Cyber Security and Computational Models Proceedings of ICC3, 2013 Engineering Computer security Artificial intelligence Computer science / Mathematics Computer mathematics Computational intelligence Computational Intelligence Systems and Data Security Computational Mathematics and Numerical Analysis Artificial Intelligence (incl. Robotics) Mathematical Applications in Computer Science Informatik Ingenieurwissenschaften Künstliche Intelligenz Mathematik |
title | Computational Intelligence, Cyber Security and Computational Models Proceedings of ICC3, 2013 |
title_auth | Computational Intelligence, Cyber Security and Computational Models Proceedings of ICC3, 2013 |
title_exact_search | Computational Intelligence, Cyber Security and Computational Models Proceedings of ICC3, 2013 |
title_full | Computational Intelligence, Cyber Security and Computational Models Proceedings of ICC3, 2013 edited by G. Sai Sundara Krishnan, R. Anitha, R. S. Lekshmi, M. Senthil Kumar, Anthony Bonato, Manuel Graña |
title_fullStr | Computational Intelligence, Cyber Security and Computational Models Proceedings of ICC3, 2013 edited by G. Sai Sundara Krishnan, R. Anitha, R. S. Lekshmi, M. Senthil Kumar, Anthony Bonato, Manuel Graña |
title_full_unstemmed | Computational Intelligence, Cyber Security and Computational Models Proceedings of ICC3, 2013 edited by G. Sai Sundara Krishnan, R. Anitha, R. S. Lekshmi, M. Senthil Kumar, Anthony Bonato, Manuel Graña |
title_short | Computational Intelligence, Cyber Security and Computational Models |
title_sort | computational intelligence cyber security and computational models proceedings of icc3 2013 |
title_sub | Proceedings of ICC3, 2013 |
topic | Engineering Computer security Artificial intelligence Computer science / Mathematics Computer mathematics Computational intelligence Computational Intelligence Systems and Data Security Computational Mathematics and Numerical Analysis Artificial Intelligence (incl. Robotics) Mathematical Applications in Computer Science Informatik Ingenieurwissenschaften Künstliche Intelligenz Mathematik |
topic_facet | Engineering Computer security Artificial intelligence Computer science / Mathematics Computer mathematics Computational intelligence Computational Intelligence Systems and Data Security Computational Mathematics and Numerical Analysis Artificial Intelligence (incl. Robotics) Mathematical Applications in Computer Science Informatik Ingenieurwissenschaften Künstliche Intelligenz Mathematik |
url | https://doi.org/10.1007/978-81-322-1680-3 http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028632442&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028632442&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA |
work_keys_str_mv | AT krishnangsaisundara computationalintelligencecybersecurityandcomputationalmodelsproceedingsoficc32013 AT anithar computationalintelligencecybersecurityandcomputationalmodelsproceedingsoficc32013 AT lekshmirs computationalintelligencecybersecurityandcomputationalmodelsproceedingsoficc32013 AT kumarmsenthil computationalintelligencecybersecurityandcomputationalmodelsproceedingsoficc32013 AT bonatoanthony computationalintelligencecybersecurityandcomputationalmodelsproceedingsoficc32013 AT granamanuel computationalintelligencecybersecurityandcomputationalmodelsproceedingsoficc32013 |