Information fusion for cyber-security analytics:
Gespeichert in:
Weitere Verfasser: | , , |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Cham
Springer
2017
|
Schriftenreihe: | Studies in Computational Intelligence
691 |
Schlagworte: | |
Online-Zugang: | BTU01 FAB01 FAW01 FHA01 FHI01 FHN01 FHR01 FKE01 FLA01 FRO01 FWS01 FWS02 TUM01 UBY01 Volltext |
Beschreibung: | 1 Online-Ressource (x, 379 Seiten) Illustrationen, Diagramme |
ISBN: | 9783319442570 |
ISSN: | 1860-949X |
DOI: | 10.1007/978-3-319-44257-0 |
Internformat
MARC
LEADER | 00000nmm a2200000zcb4500 | ||
---|---|---|---|
001 | BV043862140 | ||
003 | DE-604 | ||
005 | 20181217 | ||
007 | cr|uuu---uuuuu | ||
008 | 161107s2017 |||| o||u| ||||||eng d | ||
020 | |a 9783319442570 |c Online |9 978-3-319-44257-0 | ||
024 | 7 | |a 10.1007/978-3-319-44257-0 |2 doi | |
035 | |a (ZDB-2-ENG)9783319442570 | ||
035 | |a (OCoLC)1075889308 | ||
035 | |a (DE-599)BVBBV043862140 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-859 |a DE-1046 |a DE-860 |a DE-898 |a DE-706 |a DE-92 |a DE-1043 |a DE-91 |a DE-634 |a DE-Aug4 |a DE-861 |a DE-863 |a DE-862 |a DE-573 | ||
082 | 0 | |a 621.382 |2 23 | |
084 | |a ST 300 |0 (DE-625)143650: |2 rvk | ||
084 | |a ELT 000 |2 stub | ||
084 | |a MAS 000 |2 stub | ||
245 | 1 | 0 | |a Information fusion for cyber-security analytics |c Izzat M Alsmadi, George Karabatis, Ahmed Aleroud - editors |
264 | 1 | |a Cham |b Springer |c 2017 | |
300 | |a 1 Online-Ressource (x, 379 Seiten) |b Illustrationen, Diagramme | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
490 | 1 | |a Studies in computational intelligence |v 691 |x 1860-949X | |
650 | 4 | |a Engineering | |
650 | 4 | |a Big data | |
650 | 4 | |a Computer security | |
650 | 4 | |a Electrical engineering | |
650 | 4 | |a Electronic circuits | |
650 | 4 | |a Communications Engineering, Networks | |
650 | 4 | |a Circuits and Systems | |
650 | 4 | |a Systems and Data Security | |
650 | 4 | |a Big Data/Analytics | |
650 | 4 | |a Ingenieurwissenschaften | |
650 | 0 | 7 | |a Cyberspace |0 (DE-588)4266146-8 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Datenfusion |0 (DE-588)4582612-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
655 | 7 | |0 (DE-588)4143413-4 |a Aufsatzsammlung |2 gnd-content | |
689 | 0 | 0 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 0 | 1 | |a Cyberspace |0 (DE-588)4266146-8 |D s |
689 | 0 | 2 | |a Datenfusion |0 (DE-588)4582612-2 |D s |
689 | 0 | |5 DE-604 | |
700 | 1 | |a Alsmadi, Izzat |d 1972- |0 (DE-588)1032496746 |4 edt | |
700 | 1 | |a Karabatis, George |0 (DE-588)1119722632 |4 edt | |
700 | 1 | |a Aleroud, Ahmed |0 (DE-588)111972404X |4 edt | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 978-3-319-44256-3 |
830 | 0 | |a Studies in Computational Intelligence |v 691 |w (DE-604)BV044858013 |9 691 | |
856 | 4 | 0 | |u https://doi.org/10.1007/978-3-319-44257-0 |x Verlag |z URL des Erstveröffentlichers |3 Volltext |
912 | |a ZDB-2-ENG | ||
940 | 1 | |q ZDB-2-ENG_2017 | |
999 | |a oai:aleph.bib-bvb.de:BVB01-029272214 | ||
966 | e | |u https://doi.org/10.1007/978-3-319-44257-0 |l BTU01 |p ZDB-2-ENG |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-44257-0 |l FAB01 |p ZDB-2-ENG |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-44257-0 |l FAW01 |p ZDB-2-ENG |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-44257-0 |l FHA01 |p ZDB-2-ENG |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-44257-0 |l FHI01 |p ZDB-2-ENG |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-44257-0 |l FHN01 |p ZDB-2-ENG |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-44257-0 |l FHR01 |p ZDB-2-ENG |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-44257-0 |l FKE01 |p ZDB-2-ENG |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-44257-0 |l FLA01 |p ZDB-2-ENG |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-44257-0 |l FRO01 |p ZDB-2-ENG |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-44257-0 |l FWS01 |p ZDB-2-ENG |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-44257-0 |l FWS02 |p ZDB-2-ENG |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-44257-0 |l TUM01 |p ZDB-2-ENG |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-44257-0 |l UBY01 |p ZDB-2-ENG |x Verlag |3 Volltext |
Datensatz im Suchindex
DE-BY-FWS_katkey | 630385 |
---|---|
_version_ | 1806180310491070464 |
any_adam_object | |
author2 | Alsmadi, Izzat 1972- Karabatis, George Aleroud, Ahmed |
author2_role | edt edt edt |
author2_variant | i a ia g k gk a a aa |
author_GND | (DE-588)1032496746 (DE-588)1119722632 (DE-588)111972404X |
author_facet | Alsmadi, Izzat 1972- Karabatis, George Aleroud, Ahmed |
building | Verbundindex |
bvnumber | BV043862140 |
classification_rvk | ST 300 |
classification_tum | ELT 000 MAS 000 |
collection | ZDB-2-ENG |
ctrlnum | (ZDB-2-ENG)9783319442570 (OCoLC)1075889308 (DE-599)BVBBV043862140 |
dewey-full | 621.382 |
dewey-hundreds | 600 - Technology (Applied sciences) |
dewey-ones | 621 - Applied physics |
dewey-raw | 621.382 |
dewey-search | 621.382 |
dewey-sort | 3621.382 |
dewey-tens | 620 - Engineering and allied operations |
discipline | Informatik Elektrotechnik Elektrotechnik / Elektronik / Nachrichtentechnik Maschinenbau |
doi_str_mv | 10.1007/978-3-319-44257-0 |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03779nmm a2200805zcb4500</leader><controlfield tag="001">BV043862140</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20181217 </controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">161107s2017 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783319442570</subfield><subfield code="c">Online</subfield><subfield code="9">978-3-319-44257-0</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1007/978-3-319-44257-0</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-2-ENG)9783319442570</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1075889308</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV043862140</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-859</subfield><subfield code="a">DE-1046</subfield><subfield code="a">DE-860</subfield><subfield code="a">DE-898</subfield><subfield code="a">DE-706</subfield><subfield code="a">DE-92</subfield><subfield code="a">DE-1043</subfield><subfield code="a">DE-91</subfield><subfield code="a">DE-634</subfield><subfield code="a">DE-Aug4</subfield><subfield code="a">DE-861</subfield><subfield code="a">DE-863</subfield><subfield code="a">DE-862</subfield><subfield code="a">DE-573</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">621.382</subfield><subfield code="2">23</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 300</subfield><subfield code="0">(DE-625)143650:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ELT 000</subfield><subfield code="2">stub</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">MAS 000</subfield><subfield code="2">stub</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Information fusion for cyber-security analytics</subfield><subfield code="c">Izzat M Alsmadi, George Karabatis, Ahmed Aleroud - editors</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Cham</subfield><subfield code="b">Springer</subfield><subfield code="c">2017</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (x, 379 Seiten)</subfield><subfield code="b">Illustrationen, Diagramme</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">Studies in computational intelligence</subfield><subfield code="v">691</subfield><subfield code="x">1860-949X</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Engineering</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Big data</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Electrical engineering</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Electronic circuits</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Communications Engineering, Networks</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Circuits and Systems</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Systems and Data Security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Big Data/Analytics</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Ingenieurwissenschaften</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Cyberspace</subfield><subfield code="0">(DE-588)4266146-8</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Datenfusion</subfield><subfield code="0">(DE-588)4582612-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)4143413-4</subfield><subfield code="a">Aufsatzsammlung</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Cyberspace</subfield><subfield code="0">(DE-588)4266146-8</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Datenfusion</subfield><subfield code="0">(DE-588)4582612-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Alsmadi, Izzat</subfield><subfield code="d">1972-</subfield><subfield code="0">(DE-588)1032496746</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Karabatis, George</subfield><subfield code="0">(DE-588)1119722632</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Aleroud, Ahmed</subfield><subfield code="0">(DE-588)111972404X</subfield><subfield code="4">edt</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">978-3-319-44256-3</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">Studies in Computational Intelligence</subfield><subfield code="v">691</subfield><subfield code="w">(DE-604)BV044858013</subfield><subfield code="9">691</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1007/978-3-319-44257-0</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Erstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-2-ENG</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">ZDB-2-ENG_2017</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-029272214</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-44257-0</subfield><subfield code="l">BTU01</subfield><subfield code="p">ZDB-2-ENG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-44257-0</subfield><subfield code="l">FAB01</subfield><subfield code="p">ZDB-2-ENG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-44257-0</subfield><subfield code="l">FAW01</subfield><subfield code="p">ZDB-2-ENG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-44257-0</subfield><subfield code="l">FHA01</subfield><subfield code="p">ZDB-2-ENG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-44257-0</subfield><subfield code="l">FHI01</subfield><subfield code="p">ZDB-2-ENG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-44257-0</subfield><subfield code="l">FHN01</subfield><subfield code="p">ZDB-2-ENG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-44257-0</subfield><subfield code="l">FHR01</subfield><subfield code="p">ZDB-2-ENG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-44257-0</subfield><subfield code="l">FKE01</subfield><subfield code="p">ZDB-2-ENG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-44257-0</subfield><subfield code="l">FLA01</subfield><subfield code="p">ZDB-2-ENG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-44257-0</subfield><subfield code="l">FRO01</subfield><subfield code="p">ZDB-2-ENG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-44257-0</subfield><subfield code="l">FWS01</subfield><subfield code="p">ZDB-2-ENG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-44257-0</subfield><subfield code="l">FWS02</subfield><subfield code="p">ZDB-2-ENG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-44257-0</subfield><subfield code="l">TUM01</subfield><subfield code="p">ZDB-2-ENG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-44257-0</subfield><subfield code="l">UBY01</subfield><subfield code="p">ZDB-2-ENG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
genre | (DE-588)4143413-4 Aufsatzsammlung gnd-content |
genre_facet | Aufsatzsammlung |
id | DE-604.BV043862140 |
illustrated | Not Illustrated |
indexdate | 2024-08-01T12:22:52Z |
institution | BVB |
isbn | 9783319442570 |
issn | 1860-949X |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-029272214 |
oclc_num | 1075889308 |
open_access_boolean | |
owner | DE-859 DE-1046 DE-860 DE-898 DE-BY-UBR DE-706 DE-92 DE-1043 DE-91 DE-BY-TUM DE-634 DE-Aug4 DE-861 DE-863 DE-BY-FWS DE-862 DE-BY-FWS DE-573 |
owner_facet | DE-859 DE-1046 DE-860 DE-898 DE-BY-UBR DE-706 DE-92 DE-1043 DE-91 DE-BY-TUM DE-634 DE-Aug4 DE-861 DE-863 DE-BY-FWS DE-862 DE-BY-FWS DE-573 |
physical | 1 Online-Ressource (x, 379 Seiten) Illustrationen, Diagramme |
psigel | ZDB-2-ENG ZDB-2-ENG_2017 |
publishDate | 2017 |
publishDateSearch | 2017 |
publishDateSort | 2017 |
publisher | Springer |
record_format | marc |
series | Studies in Computational Intelligence |
series2 | Studies in computational intelligence |
spellingShingle | Information fusion for cyber-security analytics Studies in Computational Intelligence Engineering Big data Computer security Electrical engineering Electronic circuits Communications Engineering, Networks Circuits and Systems Systems and Data Security Big Data/Analytics Ingenieurwissenschaften Cyberspace (DE-588)4266146-8 gnd Datenfusion (DE-588)4582612-2 gnd Computersicherheit (DE-588)4274324-2 gnd |
subject_GND | (DE-588)4266146-8 (DE-588)4582612-2 (DE-588)4274324-2 (DE-588)4143413-4 |
title | Information fusion for cyber-security analytics |
title_auth | Information fusion for cyber-security analytics |
title_exact_search | Information fusion for cyber-security analytics |
title_full | Information fusion for cyber-security analytics Izzat M Alsmadi, George Karabatis, Ahmed Aleroud - editors |
title_fullStr | Information fusion for cyber-security analytics Izzat M Alsmadi, George Karabatis, Ahmed Aleroud - editors |
title_full_unstemmed | Information fusion for cyber-security analytics Izzat M Alsmadi, George Karabatis, Ahmed Aleroud - editors |
title_short | Information fusion for cyber-security analytics |
title_sort | information fusion for cyber security analytics |
topic | Engineering Big data Computer security Electrical engineering Electronic circuits Communications Engineering, Networks Circuits and Systems Systems and Data Security Big Data/Analytics Ingenieurwissenschaften Cyberspace (DE-588)4266146-8 gnd Datenfusion (DE-588)4582612-2 gnd Computersicherheit (DE-588)4274324-2 gnd |
topic_facet | Engineering Big data Computer security Electrical engineering Electronic circuits Communications Engineering, Networks Circuits and Systems Systems and Data Security Big Data/Analytics Ingenieurwissenschaften Cyberspace Datenfusion Computersicherheit Aufsatzsammlung |
url | https://doi.org/10.1007/978-3-319-44257-0 |
volume_link | (DE-604)BV044858013 |
work_keys_str_mv | AT alsmadiizzat informationfusionforcybersecurityanalytics AT karabatisgeorge informationfusionforcybersecurityanalytics AT aleroudahmed informationfusionforcybersecurityanalytics |