Computational intelligence, cyber security and computational models: proceedings of ICC3 2015
Gespeichert in:
Körperschaft: | |
---|---|
Weitere Verfasser: | , , , , |
Format: | Elektronisch Tagungsbericht E-Book |
Sprache: | English |
Veröffentlicht: |
Singapore
Springer Singapore
[2016]
|
Schriftenreihe: | Advances in intelligent systems and computing
volume 412 |
Schlagworte: | |
Online-Zugang: | BTU01 FAB01 FAW01 FHA01 FHI01 FHN01 FHR01 FKE01 FRO01 FWS01 FWS02 UBY01 URL des Erstveröffentlichers Inhaltsverzeichnis Abstract |
Beschreibung: | 1 Online Ressource (xvi, 586 Seiten) |
ISBN: | 9789811002519 |
DOI: | 10.1007/978-981-10-0251-9 |
Internformat
MARC
LEADER | 00000nmm a2200000zcb4500 | ||
---|---|---|---|
001 | BV043309035 | ||
003 | DE-604 | ||
005 | 20180718 | ||
007 | cr|uuu---uuuuu | ||
008 | 160125s2016 |||| o||u| ||||||eng d | ||
020 | |a 9789811002519 |c Online |9 978-981-10-0251-9 | ||
024 | 7 | |a 10.1007/978-981-10-0251-9 |2 doi | |
035 | |a (OCoLC)934201347 | ||
035 | |a (DE-599)BVBBV043309035 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
049 | |a DE-1043 |a DE-Aug4 |a DE-898 |a DE-573 |a DE-859 |a DE-863 |a DE-634 |a DE-92 |a DE-862 |a DE-1046 |a DE-861 |a DE-706 | ||
082 | 0 | |a 006.3 |2 23 | |
111 | 2 | |a ICC3 |n 2 |d 2015 |c Coimbatore |j Verfasser |0 (DE-588)1162961872 |4 aut | |
245 | 1 | 0 | |a Computational intelligence, cyber security and computational models |b proceedings of ICC3 2015 |c Muthukrishnan Senthilkumar, Vijayalakshmi Ramasamy, Shina Sheen, C. Veeramani, Anthony Bonato, Lynn Batten editors |
264 | 1 | |a Singapore |b Springer Singapore |c [2016] | |
264 | 4 | |c © 2016 | |
300 | |a 1 Online Ressource (xvi, 586 Seiten) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
490 | 1 | |a Advances in intelligent systems and computing |v volume 412 | |
650 | 4 | |a Engineering | |
650 | 4 | |a Computer security | |
650 | 4 | |a Artificial intelligence | |
650 | 4 | |a Computer science / Mathematics | |
650 | 4 | |a Computer mathematics | |
650 | 4 | |a Computational intelligence | |
650 | 4 | |a Computational Intelligence | |
650 | 4 | |a Systems and Data Security | |
650 | 4 | |a Mathematical Applications in Computer Science | |
650 | 4 | |a Artificial Intelligence (incl. Robotics) | |
650 | 4 | |a Informatik | |
650 | 4 | |a Ingenieurwissenschaften | |
650 | 4 | |a Künstliche Intelligenz | |
650 | 4 | |a Mathematik | |
700 | 1 | |a Senthil Kumar, Muthukrishnan |0 (DE-588)1126128473 |4 edt | |
700 | 1 | |a Ramasamy, Vijayalakshmi |4 edt | |
700 | 1 | |a Sheen, Shina |4 edt | |
700 | 1 | |a Veeramani, C. |4 edt | |
700 | 1 | |a Bonato, Anthony |d 1971- |0 (DE-588)1029584354 |4 edt | |
700 | 1 | |a Batten, Lynn Margaret |d 1948- |e Sonstige |0 (DE-588)123824710 |4 oth | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 978-981-10-0250-2 |
830 | 0 | |a Advances in intelligent systems and computing |v volume 412 |w (DE-604)BV040889154 |9 412 | |
856 | 4 | 0 | |u https://doi.org/10.1007/978-981-10-0251-9 |x Verlag |z URL des Erstveröffentlichers |3 Volltext |
856 | 4 | 2 | |m Springer Fremddatenuebernahme |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028729731&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
856 | 4 | 2 | |m Springer Fremddatenuebernahme |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028729731&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA |3 Abstract |
912 | |a ZDB-2-ENG | ||
940 | 1 | |q ZDB-2-ENG_2016 | |
999 | |a oai:aleph.bib-bvb.de:BVB01-028729731 | ||
966 | e | |u https://doi.org/10.1007/978-981-10-0251-9 |l BTU01 |p ZDB-2-ENG |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-981-10-0251-9 |l FAB01 |p ZDB-2-ENG |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-981-10-0251-9 |l FAW01 |p ZDB-2-ENG |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-981-10-0251-9 |l FHA01 |p ZDB-2-ENG |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-981-10-0251-9 |l FHI01 |p ZDB-2-ENG |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-981-10-0251-9 |l FHN01 |p ZDB-2-ENG |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-981-10-0251-9 |l FHR01 |p ZDB-2-ENG |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-981-10-0251-9 |l FKE01 |p ZDB-2-ENG |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-981-10-0251-9 |l FRO01 |p ZDB-2-ENG |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-981-10-0251-9 |l FWS01 |p ZDB-2-ENG |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-981-10-0251-9 |l FWS02 |p ZDB-2-ENG |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-981-10-0251-9 |l UBY01 |p ZDB-2-ENG |x Verlag |3 Volltext |
Datensatz im Suchindex
DE-BY-FWS_katkey | 592501 |
---|---|
_version_ | 1806179648260800512 |
adam_text | COMPUTATIONAL INTELLIGENCE, CYBER SECURITY AND COMPUTATIONAL MODELS
/
: 2016
TABLE OF CONTENTS / INHALTSVERZEICHNIS
PART I_KEYNOTE ADDRESS: 1. THE GAME OF WALL COPS AND ROBBERS
2. SMARTPHONE APPLICATIONS, MALWARE AND DATA THEFT
3. TOWARDS EVOLUTIONARY MULTITASKING: A NEW PARADIGM IN EVOLUTIONARY
COMPUTATION
4. GENERATING A STANDARDIZED UPPER ONTOLOGY FOR SECURITY OF INFORMATION
AND NETWORKS
PART II_COMPUTATIONAL INTELLIGENCE: CHAPTER 1. ANALYSIS OF THROAT
MICROPHONE USING MFCC FEATURES FOR SPEAKER RECOGNITION
CHAPTER 2. SINGLE-PIXEL BASED DOUBLE RANDOM-PHASE ENCODING TECHNIQUE
CHAPTER 3. KERNEL ONLINE MULTI-TASK LEARNING
CHAPTER 4. PERFORMANCE EVALUATION OF SENTIMENT CLASSIFICATION USING
QUERY STRATEGIES IN A POOL BASED ACTIVE LEARNING SCENARIO
CHAPTER 5. AN ENHANCED IMAGE WATERMARKING SCHEME USING BLOCKS WITH
HOMOGENEOUS FEATURE DISTRIBUTION
CHAPTER 6. PERFORMANCE ANALYSIS OF APEN AS A FEATURE EXTRACTION
TECHNIQUE AND TIME DELAY NEURAL NETWORKS, MULTI-LAYER PERCEPTRON AS POST
CLASSIFIERS FOR THE CLASSIFICATION OF EPILEPSY RISK LEVELS FROM EEG
SIGNALS
CHAPTER 7. SUSPICIOUS HUMAN ACTIVITY DETECTION IN CLASSROOM EXAMINATION
CHAPTER 8. H ∞ STATE ESTIMATION OF DISCRETE TIME DELAYED NEURAL
NETWORKS WITH MULTIPLE MISSING MEASUREMENTS USING SECOND ORDER
RECIPROCAL CONVEX APPROACH
CHAPTER 9. A FUZZY METHODOLOGY FOR CLUSTERING TEXT DOCUMENTS WITH
UNCERTAIN SPATIAL REFERENCES
CHAPTER 10. A NOVEL FEATURE EXTRACTION ALGORITHM FROM FINGERPRINT IMAGE
IN WAVELET DOMAIN
CHAPTER 11. MOTOR IMAGERY CLASSIFICATION BASED ON VARIABLE PRECISION
MULTIGRANULATION ROUGH SET
CHAPTER 12. FAULT TOLERANT AND ENERGY EFFICIENT SIGNAL PROCESSING ON
FPGA USING EVOLUTIONARY TECHNIQUES
CHAPTER 13. A TWO PHASE APPROACH FOR EFFICIENT CLUSTERING OF WEB
SERVICES
CHAPTER 14. ELIMINATION OF REDUNDANT ASSOCIATION RULES – AN EFFICIENT
LINEAR APPROACH
CHAPTER 15. CLUSTERING TECHNIQUES FROM SIGNIFICANCE ANALYSIS OF
MICROARRAYS
CHAPTER 16. BREAST REGION EXTRACTION AND PECTORAL REMOVAL BY PIXEL
CONSTANCY CONSTRAINT APPROACH IN MAMMOGRAMS
CHAPTER 17. BRIDGING THE SEMANTIC GAP IN IMAGE SEARCH VIA VISUAL
SEMANTIC DESCRIPTORS BY INTEGRATING TEXT AND VISUAL FEATURES
CHAPTER 18. ADAPTIVE EQUALIZATION ALGORITHM FOR ELECTROCARDIOGRAM SIGNAL
TRANSMISSION
CHAPTER 19. AN EFFICIENT APPROACH FOR MAPREDUCE RESULT VERIFICATION
CHAPTER 20. IMPROVING LIFETIME OF MEMORY DEVICES USING EVOLUTIONARY
COMPUTING BASED ERROR CORRECTION CODING
CHAPTER 21. COMPARISON OF MACHINE LEARNING TECHNIQUES FOR THE
IDENTIFICATION OF THE STAGES OF PARKINSON S DISEASE
CHAPTER 22. SECURITY CONSTRAINED UNIT COMMITMENT PROBLEM EMPLOYING
ARTIFICIAL COMPUTATIONAL INTELLIGENCE FOR WIND-THERMAL POWER SYSTEM
CHAPTER 23. HUMAN GAIT RECOGNITION USING FUZZY LOGIC
CHAPTER 24. DETECTION AND DIAGNOSIS OF DILATED AND HYPERTROPHIC
CARDIOMYOPATHY BY ECHOCARDIOGRAM SEQUENCES ANALYSIS
CHAPTER 25. AN ELITIST GENETIC ALGORITHM BASED EXTREME LEARNING MACHINE
CHAPTER 26. FORMULATION AND ENHANCEMENT OF USER ADAPTIVE ACCESS TO THE
LEARNING RESOURCES IN E-LEARNING USING FUZZY INFERENCE ENGINE
PART III_CYBER SECURITY: CHAPTER 27. A ROBUST USER ANONYMITY PRESERVING
BIOMETRIC BASED MULTI-SERVER AUTHENTICATED KEY AGREEMENT SCHEME
CHAPTER 28. EXTENDED GAME THEORETIC DIRICHLET BASED COLLABORATIVE
INTRUSION DETECTION SYSTEMS
CHAPTER 29. IMPLEMENTATION OF ECDSA USING SPONGE BASED HASH FUNCTION
CHAPTER 30. CONTRAST-ENHANCED VISUAL CRYPTOGRAPHY SCHEMES BASED ON
PERFECT RECONSTRUCTION OF WHITE PIXELS AND ADDITIONAL BASIS MATRIX
CHAPTER 31. HASH BASED TWO GATEWAY PAYMENT PROTOCOL ENSURING
ACCOUNTABILITY WITH DYNAMIC ID-VERIFIER FOR DIGITAL GOODS PROVIDERS
CHAPTER 32. DECRYPTING SHARED ENCRYPTED DATA FILES STORED IN A CLOUD
USING DYNAMIC KEY AGGREGATION
CHAPTER 33. A LOCK AND KEY SHARE (2,M,N) RANDOM GRID VISUAL SECRET
SHARING SCHEME WITH XOR AND OR DECRYPTIONS
CHAPTER 34. MULTILEVEL MULTIMEDIA SECURITY BY INTEGRATING VISUAL
CRYPTOGRAPHY AND STEGANOGRAPHY TECHNIQUES
CHAPTER 35. K OUT OF N SECRET SHARING SCHEME WITH STEGANOGRAPHY AND
AUTHENTICATION
CHAPTER 36. A CENTRALIZED TRUST COMPUTATION MODEL (CTC) FOR SECURE GROUP
FORMATION IN MILITARY BASED MOBILE AD-HOC NETWORKS USING STEREOTYPES
CHAPTER 37. COST EFFECTIVE RE-KEYING APPROACH FOR DYNAMIC MEMBERSHIP
CHANGES IN GROUP KEY MANAGEMENT
CHAPTER 38. A MULTIPATH ROUTING PROTOCOL WHICH PRESERVES SECURITY AND
ANONYMITY OF DATA IN MOBILE AD-HOC NETWORKS
CHAPTER 39. AN EFFICIENT CONTINUOUS AUDITING METHODOLOGY FOR OUTSOURCED
DATA STORAGE IN CLOUD COMPUTING
PART IV_COMPUTATIONAL MODELS: CHAPTER 40. A STUDY ON BUILDING SEAMLESS
COMMUNICATION AMONG VEHICLES IN VANET USING THE INTEGRATED AGENT
COMMUNICATION MODEL (IACM)
CHAPTER 41. A HYBRID APPROACH FOR DATA HIDING THROUGH CHAOS THEORY AND
REVERSIBLE INTEGER MAPPING
CHAPTER 42. FLUID QUEUE DRIVEN BY AN M/E2/1 QUEUING MODEL
CHAPTER 43. AN EFFECTIVE TOOL FOR OPTIMIZING THE NUMBER OF TEST PATHS IN
DATA FLOW TESTING FOR ANOMALY DETECTION
CHAPTER 44. VENUS FLYTRAP OPTIMIZATION
CHAPTER 45. ZUMKELLER CORDIAL LABELING OF GRAPHS
CHAPTER 46. CUCKOO BASED RESOURCE ALLOCATION FOR MOBILE CLOUD
ENVIRONMENTS
CHAPTER 47. TRANSIENT ANALYSIS OF AN M/M/C QUEUE SUBJECT TO MULTIPLE
EXPONENTIAL VACATION
CHAPTER 48. FRACTIONAL FILTER BASED INTERNAL MODEL CONTROLLER FOR
NONLINEAR PROCESS
CHAPTER 49. A NOVEL METHOD FOR SOLVING TRIANGULAR AND TRAPEZOIDAL
INTUITIONISTIC FUZZY GAMES USING DOMINANCE PROPERTY AND ODDMENT METHOD
DIESES SCHRIFTSTUECK WURDE MASCHINELL ERZEUGT.
COMPUTATIONAL INTELLIGENCE, CYBER SECURITY AND COMPUTATIONAL MODELS
/
: 2016
ABSTRACT / INHALTSTEXT
THIS BOOK AIMS AT PROMOTING HIGH-QUALITY RESEARCH BY RESEARCHERS AND
PRACTITIONERS FROM ACADEMIA AND INDUSTRY AT THE INTERNATIONAL CONFERENCE
ON COMPUTATIONAL INTELLIGENCE, CYBER SECURITY, AND COMPUTATIONAL MODELS
ICC3 2015 ORGANIZED BY PSG COLLEGE OF TECHNOLOGY, COIMBATORE, INDIA
DURING DECEMBER 17 – 19, 2015. THIS BOOK ENRICHES WITH INNOVATIONS IN
BROAD AREAS OF RESEARCH LIKE COMPUTATIONAL MODELING, COMPUTATIONAL
INTELLIGENCE AND CYBER SECURITY. THESE EMERGING INTER DISCIPLINARY
RESEARCH AREAS HAVE HELPED TO SOLVE MULTIFACETED PROBLEMS AND GAINED LOT
OF ATTENTION IN RECENT YEARS. THIS ENCOMPASSES THEORY AND APPLICATIONS,
TO PROVIDE DESIGN, ANALYSIS AND MODELING OF THE AFOREMENTIONED KEY AREAS
DIESES SCHRIFTSTUECK WURDE MASCHINELL ERZEUGT.
|
any_adam_object | 1 |
author2 | Senthil Kumar, Muthukrishnan Ramasamy, Vijayalakshmi Sheen, Shina Veeramani, C. Bonato, Anthony 1971- |
author2_role | edt edt edt edt edt |
author2_variant | k m s km kms v r vr s s ss c v cv a b ab |
author_GND | (DE-588)1126128473 (DE-588)1029584354 (DE-588)123824710 |
author_corporate | ICC3 Coimbatore |
author_corporate_role | aut |
author_facet | Senthil Kumar, Muthukrishnan Ramasamy, Vijayalakshmi Sheen, Shina Veeramani, C. Bonato, Anthony 1971- ICC3 Coimbatore |
author_sort | ICC3 Coimbatore |
building | Verbundindex |
bvnumber | BV043309035 |
collection | ZDB-2-ENG |
ctrlnum | (OCoLC)934201347 (DE-599)BVBBV043309035 |
dewey-full | 006.3 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 006 - Special computer methods |
dewey-raw | 006.3 |
dewey-search | 006.3 |
dewey-sort | 16.3 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
doi_str_mv | 10.1007/978-981-10-0251-9 |
format | Electronic Conference Proceeding eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>04058nmm a2200769zcb4500</leader><controlfield tag="001">BV043309035</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20180718 </controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">160125s2016 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9789811002519</subfield><subfield code="c">Online</subfield><subfield code="9">978-981-10-0251-9</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1007/978-981-10-0251-9</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)934201347</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV043309035</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-1043</subfield><subfield code="a">DE-Aug4</subfield><subfield code="a">DE-898</subfield><subfield code="a">DE-573</subfield><subfield code="a">DE-859</subfield><subfield code="a">DE-863</subfield><subfield code="a">DE-634</subfield><subfield code="a">DE-92</subfield><subfield code="a">DE-862</subfield><subfield code="a">DE-1046</subfield><subfield code="a">DE-861</subfield><subfield code="a">DE-706</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">006.3</subfield><subfield code="2">23</subfield></datafield><datafield tag="111" ind1="2" ind2=" "><subfield code="a">ICC3</subfield><subfield code="n">2</subfield><subfield code="d">2015</subfield><subfield code="c">Coimbatore</subfield><subfield code="j">Verfasser</subfield><subfield code="0">(DE-588)1162961872</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Computational intelligence, cyber security and computational models</subfield><subfield code="b">proceedings of ICC3 2015</subfield><subfield code="c">Muthukrishnan Senthilkumar, Vijayalakshmi Ramasamy, Shina Sheen, C. Veeramani, Anthony Bonato, Lynn Batten editors</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Singapore</subfield><subfield code="b">Springer Singapore</subfield><subfield code="c">[2016]</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">© 2016</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online Ressource (xvi, 586 Seiten)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">Advances in intelligent systems and computing</subfield><subfield code="v">volume 412</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Engineering</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Artificial intelligence</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer science / Mathematics</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer mathematics</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computational intelligence</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computational Intelligence</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Systems and Data Security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Mathematical Applications in Computer Science</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Artificial Intelligence (incl. Robotics)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Informatik</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Ingenieurwissenschaften</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Künstliche Intelligenz</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Mathematik</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Senthil Kumar, Muthukrishnan</subfield><subfield code="0">(DE-588)1126128473</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Ramasamy, Vijayalakshmi</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Sheen, Shina</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Veeramani, C.</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Bonato, Anthony</subfield><subfield code="d">1971-</subfield><subfield code="0">(DE-588)1029584354</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Batten, Lynn Margaret</subfield><subfield code="d">1948-</subfield><subfield code="e">Sonstige</subfield><subfield code="0">(DE-588)123824710</subfield><subfield code="4">oth</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">978-981-10-0250-2</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">Advances in intelligent systems and computing</subfield><subfield code="v">volume 412</subfield><subfield code="w">(DE-604)BV040889154</subfield><subfield code="9">412</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1007/978-981-10-0251-9</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Erstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Springer Fremddatenuebernahme</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028729731&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Springer Fremddatenuebernahme</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028729731&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Abstract</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-2-ENG</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">ZDB-2-ENG_2016</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-028729731</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-981-10-0251-9</subfield><subfield code="l">BTU01</subfield><subfield code="p">ZDB-2-ENG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-981-10-0251-9</subfield><subfield code="l">FAB01</subfield><subfield code="p">ZDB-2-ENG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-981-10-0251-9</subfield><subfield code="l">FAW01</subfield><subfield code="p">ZDB-2-ENG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-981-10-0251-9</subfield><subfield code="l">FHA01</subfield><subfield code="p">ZDB-2-ENG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-981-10-0251-9</subfield><subfield code="l">FHI01</subfield><subfield code="p">ZDB-2-ENG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-981-10-0251-9</subfield><subfield code="l">FHN01</subfield><subfield code="p">ZDB-2-ENG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-981-10-0251-9</subfield><subfield code="l">FHR01</subfield><subfield code="p">ZDB-2-ENG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-981-10-0251-9</subfield><subfield code="l">FKE01</subfield><subfield code="p">ZDB-2-ENG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-981-10-0251-9</subfield><subfield code="l">FRO01</subfield><subfield code="p">ZDB-2-ENG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-981-10-0251-9</subfield><subfield code="l">FWS01</subfield><subfield code="p">ZDB-2-ENG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-981-10-0251-9</subfield><subfield code="l">FWS02</subfield><subfield code="p">ZDB-2-ENG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-981-10-0251-9</subfield><subfield code="l">UBY01</subfield><subfield code="p">ZDB-2-ENG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV043309035 |
illustrated | Not Illustrated |
indexdate | 2024-08-01T12:12:20Z |
institution | BVB |
institution_GND | (DE-588)1162961872 |
isbn | 9789811002519 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-028729731 |
oclc_num | 934201347 |
open_access_boolean | |
owner | DE-1043 DE-Aug4 DE-898 DE-BY-UBR DE-573 DE-859 DE-863 DE-BY-FWS DE-634 DE-92 DE-862 DE-BY-FWS DE-1046 DE-861 DE-706 |
owner_facet | DE-1043 DE-Aug4 DE-898 DE-BY-UBR DE-573 DE-859 DE-863 DE-BY-FWS DE-634 DE-92 DE-862 DE-BY-FWS DE-1046 DE-861 DE-706 |
physical | 1 Online Ressource (xvi, 586 Seiten) |
psigel | ZDB-2-ENG ZDB-2-ENG_2016 |
publishDate | 2016 |
publishDateSearch | 2016 |
publishDateSort | 2016 |
publisher | Springer Singapore |
record_format | marc |
series | Advances in intelligent systems and computing |
series2 | Advances in intelligent systems and computing |
spellingShingle | Computational intelligence, cyber security and computational models proceedings of ICC3 2015 Advances in intelligent systems and computing Engineering Computer security Artificial intelligence Computer science / Mathematics Computer mathematics Computational intelligence Computational Intelligence Systems and Data Security Mathematical Applications in Computer Science Artificial Intelligence (incl. Robotics) Informatik Ingenieurwissenschaften Künstliche Intelligenz Mathematik |
title | Computational intelligence, cyber security and computational models proceedings of ICC3 2015 |
title_auth | Computational intelligence, cyber security and computational models proceedings of ICC3 2015 |
title_exact_search | Computational intelligence, cyber security and computational models proceedings of ICC3 2015 |
title_full | Computational intelligence, cyber security and computational models proceedings of ICC3 2015 Muthukrishnan Senthilkumar, Vijayalakshmi Ramasamy, Shina Sheen, C. Veeramani, Anthony Bonato, Lynn Batten editors |
title_fullStr | Computational intelligence, cyber security and computational models proceedings of ICC3 2015 Muthukrishnan Senthilkumar, Vijayalakshmi Ramasamy, Shina Sheen, C. Veeramani, Anthony Bonato, Lynn Batten editors |
title_full_unstemmed | Computational intelligence, cyber security and computational models proceedings of ICC3 2015 Muthukrishnan Senthilkumar, Vijayalakshmi Ramasamy, Shina Sheen, C. Veeramani, Anthony Bonato, Lynn Batten editors |
title_short | Computational intelligence, cyber security and computational models |
title_sort | computational intelligence cyber security and computational models proceedings of icc3 2015 |
title_sub | proceedings of ICC3 2015 |
topic | Engineering Computer security Artificial intelligence Computer science / Mathematics Computer mathematics Computational intelligence Computational Intelligence Systems and Data Security Mathematical Applications in Computer Science Artificial Intelligence (incl. Robotics) Informatik Ingenieurwissenschaften Künstliche Intelligenz Mathematik |
topic_facet | Engineering Computer security Artificial intelligence Computer science / Mathematics Computer mathematics Computational intelligence Computational Intelligence Systems and Data Security Mathematical Applications in Computer Science Artificial Intelligence (incl. Robotics) Informatik Ingenieurwissenschaften Künstliche Intelligenz Mathematik |
url | https://doi.org/10.1007/978-981-10-0251-9 http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028729731&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028729731&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA |
volume_link | (DE-604)BV040889154 |
work_keys_str_mv | AT icc3coimbatore computationalintelligencecybersecurityandcomputationalmodelsproceedingsoficc32015 AT senthilkumarmuthukrishnan computationalintelligencecybersecurityandcomputationalmodelsproceedingsoficc32015 AT ramasamyvijayalakshmi computationalintelligencecybersecurityandcomputationalmodelsproceedingsoficc32015 AT sheenshina computationalintelligencecybersecurityandcomputationalmodelsproceedingsoficc32015 AT veeramanic computationalintelligencecybersecurityandcomputationalmodelsproceedingsoficc32015 AT bonatoanthony computationalintelligencecybersecurityandcomputationalmodelsproceedingsoficc32015 AT battenlynnmargaret computationalintelligencecybersecurityandcomputationalmodelsproceedingsoficc32015 |