Transactions on computational science XXVIII: Special issue on cyberworlds and cybersecurity
Gespeichert in:
Weitere Verfasser: | , , |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Berlin, Heidelberg
Springer
[2016]
|
Schriftenreihe: | Lecture Notes in Computer Science
9590 |
Schlagworte: | |
Online-Zugang: | BTU01 FHA01 FHI01 FHM01 FHN01 FHR01 FKE01 FRO01 HTW01 TUM01 UBA01 UBG01 UBM01 UBR01 UBT01 UBW01 UBY01 UER01 UPA01 Volltext |
Beschreibung: | 1 Online-Ressource XIII, 177Seiten Illustrationen, Diagramme |
ISBN: | 9783662530900 9783662530894 |
ISSN: | 0302-9743 |
DOI: | 10.1007/978-3-662-53090-0 |
Internformat
MARC
LEADER | 00000nmm a2200000zcb4500 | ||
---|---|---|---|
001 | BV043706345 | ||
003 | DE-604 | ||
005 | 20160831 | ||
006 | a |||| 10||| | ||
007 | cr|uuu---uuuuu | ||
008 | 160809s2016 |||| o||u| ||||||eng d | ||
020 | |a 9783662530900 |c Online |9 978-3-662-53090-0 | ||
020 | |a 9783662530894 |c Print |9 978-3-662-53089-4 | ||
024 | 7 | |a 10.1007/978-3-662-53090-0 |2 doi | |
035 | |a (ZDB-2-SCS)9783662530900 | ||
035 | |a (ZDB-2-LNC)9783662530900 | ||
035 | |a (OCoLC)955035530 | ||
035 | |a (DE-599)BVBBV043706345 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-706 |a DE-91 |a DE-19 |a DE-Aug4 |a DE-898 |a DE-861 |a DE-523 |a DE-859 |a DE-473 |a DE-29 |a DE-20 |a DE-92 |a DE-384 |a DE-573 |a DE-M347 |a DE-703 |a DE-739 |a DE-634 |a DE-355 | ||
082 | 0 | |a 005.8 |2 23 | |
084 | |a DAT 000 |2 stub | ||
245 | 1 | 0 | |a Transactions on computational science XXVIII |b Special issue on cyberworlds and cybersecurity |c edited by Marina L. Gavrilova, C.J. Kenneth Tan, Alexei Sourin |
264 | 1 | |a Berlin, Heidelberg |b Springer |c [2016] | |
264 | 4 | |c © 2016 | |
300 | |a 1 Online-Ressource XIII, 177Seiten |b Illustrationen, Diagramme | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
490 | 1 | |a Lecture Notes in Computer Science |v Volume 9590 |x 0302-9743 | |
650 | 4 | |a Computer science | |
650 | 4 | |a Computer security | |
650 | 4 | |a User interfaces (Computer systems) | |
650 | 4 | |a Image processing | |
650 | 4 | |a Pattern recognition | |
650 | 4 | |a Biometrics (Biology) | |
650 | 4 | |a Computer Science | |
650 | 4 | |a Systems and Data Security | |
650 | 4 | |a Biometrics | |
650 | 4 | |a Pattern Recognition | |
650 | 4 | |a User Interfaces and Human Computer Interaction | |
650 | 4 | |a Image Processing and Computer Vision | |
650 | 4 | |a Information Systems Applications (incl. Internet) | |
650 | 4 | |a Informatik | |
700 | 1 | |a Gavrilova, Marina L. |4 edt | |
700 | 1 | |a Tan, C. J. Kenneth |4 edt | |
700 | 1 | |a Sourin, Alexei |0 (DE-588)1013992415 |4 edt | |
830 | 0 | |a Lecture Notes in Computer Science |v 9590 |w (DE-604)BV014880109 |9 9590 | |
856 | 4 | 0 | |u https://doi.org/10.1007/978-3-662-53090-0 |x Verlag |z URL des Erstveröffentlichers |3 Volltext |
912 | |a ZDB-2-SCS |a ZDB-2-LNC | ||
940 | 1 | |q ZDB-2-SCS_2016 | |
999 | |a oai:aleph.bib-bvb.de:BVB01-029118658 | ||
966 | e | |u https://doi.org/10.1007/978-3-662-53090-0 |l BTU01 |p ZDB-2-LNC |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-662-53090-0 |l FHA01 |p ZDB-2-LNC |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-662-53090-0 |l FHI01 |p ZDB-2-LNC |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-662-53090-0 |l FHM01 |p ZDB-2-LNC |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-662-53090-0 |l FHN01 |p ZDB-2-LNC |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-662-53090-0 |l FHR01 |p ZDB-2-LNC |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-662-53090-0 |l FKE01 |p ZDB-2-LNC |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-662-53090-0 |l FRO01 |p ZDB-2-LNC |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-662-53090-0 |l HTW01 |p ZDB-2-LNC |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-662-53090-0 |l TUM01 |p ZDB-2-LNC |q ZDB-2-LNC_2016 |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-662-53090-0 |l UBA01 |p ZDB-2-LNC |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-662-53090-0 |l UBG01 |p ZDB-2-LNC |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-662-53090-0 |l UBM01 |p ZDB-2-LNC |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-662-53090-0 |l UBR01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-662-53090-0 |l UBT01 |p ZDB-2-LNC |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-662-53090-0 |l UBW01 |p ZDB-2-LNC |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-662-53090-0 |l UBY01 |p ZDB-2-LNC |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-662-53090-0 |l UER01 |p ZDB-2-LNC |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-662-53090-0 |l UPA01 |p ZDB-2-LNC |x Verlag |3 Volltext |
Datensatz im Suchindex
_version_ | 1804176491837128704 |
---|---|
any_adam_object | |
author2 | Gavrilova, Marina L. Tan, C. J. Kenneth Sourin, Alexei |
author2_role | edt edt edt |
author2_variant | m l g ml mlg c j k t cjk cjkt a s as |
author_GND | (DE-588)1013992415 |
author_facet | Gavrilova, Marina L. Tan, C. J. Kenneth Sourin, Alexei |
building | Verbundindex |
bvnumber | BV043706345 |
classification_tum | DAT 000 |
collection | ZDB-2-SCS ZDB-2-LNC |
ctrlnum | (ZDB-2-SCS)9783662530900 (ZDB-2-LNC)9783662530900 (OCoLC)955035530 (DE-599)BVBBV043706345 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
doi_str_mv | 10.1007/978-3-662-53090-0 |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>04112nmm a2200829zcb4500</leader><controlfield tag="001">BV043706345</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20160831 </controlfield><controlfield tag="006">a |||| 10||| </controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">160809s2016 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783662530900</subfield><subfield code="c">Online</subfield><subfield code="9">978-3-662-53090-0</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783662530894</subfield><subfield code="c">Print</subfield><subfield code="9">978-3-662-53089-4</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1007/978-3-662-53090-0</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-2-SCS)9783662530900</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-2-LNC)9783662530900</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)955035530</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV043706345</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-706</subfield><subfield code="a">DE-91</subfield><subfield code="a">DE-19</subfield><subfield code="a">DE-Aug4</subfield><subfield code="a">DE-898</subfield><subfield code="a">DE-861</subfield><subfield code="a">DE-523</subfield><subfield code="a">DE-859</subfield><subfield code="a">DE-473</subfield><subfield code="a">DE-29</subfield><subfield code="a">DE-20</subfield><subfield code="a">DE-92</subfield><subfield code="a">DE-384</subfield><subfield code="a">DE-573</subfield><subfield code="a">DE-M347</subfield><subfield code="a">DE-703</subfield><subfield code="a">DE-739</subfield><subfield code="a">DE-634</subfield><subfield code="a">DE-355</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 000</subfield><subfield code="2">stub</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Transactions on computational science XXVIII</subfield><subfield code="b">Special issue on cyberworlds and cybersecurity</subfield><subfield code="c">edited by Marina L. Gavrilova, C.J. Kenneth Tan, Alexei Sourin</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Berlin, Heidelberg</subfield><subfield code="b">Springer</subfield><subfield code="c">[2016]</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">© 2016</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource XIII, 177Seiten</subfield><subfield code="b">Illustrationen, Diagramme</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">Lecture Notes in Computer Science</subfield><subfield code="v">Volume 9590</subfield><subfield code="x">0302-9743</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer science</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">User interfaces (Computer systems)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Image processing</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Pattern recognition</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Biometrics (Biology)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer Science</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Systems and Data Security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Biometrics</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Pattern Recognition</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">User Interfaces and Human Computer Interaction</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Image Processing and Computer Vision</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Information Systems Applications (incl. Internet)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Informatik</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Gavrilova, Marina L.</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Tan, C. J. Kenneth</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Sourin, Alexei</subfield><subfield code="0">(DE-588)1013992415</subfield><subfield code="4">edt</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">Lecture Notes in Computer Science</subfield><subfield code="v">9590</subfield><subfield code="w">(DE-604)BV014880109</subfield><subfield code="9">9590</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1007/978-3-662-53090-0</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Erstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-2-SCS</subfield><subfield code="a">ZDB-2-LNC</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">ZDB-2-SCS_2016</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-029118658</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-662-53090-0</subfield><subfield code="l">BTU01</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-662-53090-0</subfield><subfield code="l">FHA01</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-662-53090-0</subfield><subfield code="l">FHI01</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-662-53090-0</subfield><subfield code="l">FHM01</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-662-53090-0</subfield><subfield code="l">FHN01</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-662-53090-0</subfield><subfield code="l">FHR01</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-662-53090-0</subfield><subfield code="l">FKE01</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-662-53090-0</subfield><subfield code="l">FRO01</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-662-53090-0</subfield><subfield code="l">HTW01</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-662-53090-0</subfield><subfield code="l">TUM01</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="q">ZDB-2-LNC_2016</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-662-53090-0</subfield><subfield code="l">UBA01</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-662-53090-0</subfield><subfield code="l">UBG01</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-662-53090-0</subfield><subfield code="l">UBM01</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-662-53090-0</subfield><subfield code="l">UBR01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-662-53090-0</subfield><subfield code="l">UBT01</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-662-53090-0</subfield><subfield code="l">UBW01</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-662-53090-0</subfield><subfield code="l">UBY01</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-662-53090-0</subfield><subfield code="l">UER01</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-662-53090-0</subfield><subfield code="l">UPA01</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV043706345 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T07:33:02Z |
institution | BVB |
isbn | 9783662530900 9783662530894 |
issn | 0302-9743 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-029118658 |
oclc_num | 955035530 |
open_access_boolean | |
owner | DE-706 DE-91 DE-BY-TUM DE-19 DE-BY-UBM DE-Aug4 DE-898 DE-BY-UBR DE-861 DE-523 DE-859 DE-473 DE-BY-UBG DE-29 DE-20 DE-92 DE-384 DE-573 DE-M347 DE-703 DE-739 DE-634 DE-355 DE-BY-UBR |
owner_facet | DE-706 DE-91 DE-BY-TUM DE-19 DE-BY-UBM DE-Aug4 DE-898 DE-BY-UBR DE-861 DE-523 DE-859 DE-473 DE-BY-UBG DE-29 DE-20 DE-92 DE-384 DE-573 DE-M347 DE-703 DE-739 DE-634 DE-355 DE-BY-UBR |
physical | 1 Online-Ressource XIII, 177Seiten Illustrationen, Diagramme |
psigel | ZDB-2-SCS ZDB-2-LNC ZDB-2-SCS_2016 ZDB-2-LNC ZDB-2-LNC_2016 |
publishDate | 2016 |
publishDateSearch | 2016 |
publishDateSort | 2016 |
publisher | Springer |
record_format | marc |
series | Lecture Notes in Computer Science |
series2 | Lecture Notes in Computer Science |
spelling | Transactions on computational science XXVIII Special issue on cyberworlds and cybersecurity edited by Marina L. Gavrilova, C.J. Kenneth Tan, Alexei Sourin Berlin, Heidelberg Springer [2016] © 2016 1 Online-Ressource XIII, 177Seiten Illustrationen, Diagramme txt rdacontent c rdamedia cr rdacarrier Lecture Notes in Computer Science Volume 9590 0302-9743 Computer science Computer security User interfaces (Computer systems) Image processing Pattern recognition Biometrics (Biology) Computer Science Systems and Data Security Biometrics Pattern Recognition User Interfaces and Human Computer Interaction Image Processing and Computer Vision Information Systems Applications (incl. Internet) Informatik Gavrilova, Marina L. edt Tan, C. J. Kenneth edt Sourin, Alexei (DE-588)1013992415 edt Lecture Notes in Computer Science 9590 (DE-604)BV014880109 9590 https://doi.org/10.1007/978-3-662-53090-0 Verlag URL des Erstveröffentlichers Volltext |
spellingShingle | Transactions on computational science XXVIII Special issue on cyberworlds and cybersecurity Lecture Notes in Computer Science Computer science Computer security User interfaces (Computer systems) Image processing Pattern recognition Biometrics (Biology) Computer Science Systems and Data Security Biometrics Pattern Recognition User Interfaces and Human Computer Interaction Image Processing and Computer Vision Information Systems Applications (incl. Internet) Informatik |
title | Transactions on computational science XXVIII Special issue on cyberworlds and cybersecurity |
title_auth | Transactions on computational science XXVIII Special issue on cyberworlds and cybersecurity |
title_exact_search | Transactions on computational science XXVIII Special issue on cyberworlds and cybersecurity |
title_full | Transactions on computational science XXVIII Special issue on cyberworlds and cybersecurity edited by Marina L. Gavrilova, C.J. Kenneth Tan, Alexei Sourin |
title_fullStr | Transactions on computational science XXVIII Special issue on cyberworlds and cybersecurity edited by Marina L. Gavrilova, C.J. Kenneth Tan, Alexei Sourin |
title_full_unstemmed | Transactions on computational science XXVIII Special issue on cyberworlds and cybersecurity edited by Marina L. Gavrilova, C.J. Kenneth Tan, Alexei Sourin |
title_short | Transactions on computational science XXVIII |
title_sort | transactions on computational science xxviii special issue on cyberworlds and cybersecurity |
title_sub | Special issue on cyberworlds and cybersecurity |
topic | Computer science Computer security User interfaces (Computer systems) Image processing Pattern recognition Biometrics (Biology) Computer Science Systems and Data Security Biometrics Pattern Recognition User Interfaces and Human Computer Interaction Image Processing and Computer Vision Information Systems Applications (incl. Internet) Informatik |
topic_facet | Computer science Computer security User interfaces (Computer systems) Image processing Pattern recognition Biometrics (Biology) Computer Science Systems and Data Security Biometrics Pattern Recognition User Interfaces and Human Computer Interaction Image Processing and Computer Vision Information Systems Applications (incl. Internet) Informatik |
url | https://doi.org/10.1007/978-3-662-53090-0 |
volume_link | (DE-604)BV014880109 |
work_keys_str_mv | AT gavrilovamarinal transactionsoncomputationalsciencexxviiispecialissueoncyberworldsandcybersecurity AT tancjkenneth transactionsoncomputationalsciencexxviiispecialissueoncyberworldsandcybersecurity AT sourinalexei transactionsoncomputationalsciencexxviiispecialissueoncyberworldsandcybersecurity |