Artificial intelligence and security: 6th international conference, ICAIS 2020, Hohhot, China, July 17–20, 2020 : proceedings, part I
Gespeichert in:
Körperschaft: | |
---|---|
Weitere Verfasser: | , , |
Format: | Elektronisch Tagungsbericht E-Book |
Sprache: | English |
Veröffentlicht: |
Cham
Springer
[2020]
|
Schriftenreihe: | Lecture notes in computer science
12239 |
Schlagworte: | |
Online-Zugang: | BTU01 FHA01 FHI01 FHM01 FHN01 FHR01 FKE01 FLA01 FRO01 FWS01 FWS02 HTW01 TUM01 UBA01 UBG01 UBM01 UBR01 UBT01 UBW01 UBY01 UER01 UPA01 Volltext Buchcover |
Beschreibung: | 1 Online-Ressource (xxvii, 828 Seiten) 121 Illustrationen |
ISBN: | 9783030578848 |
DOI: | 10.1007/978-3-030-57884-8 |
Internformat
MARC
LEADER | 00000nmm a2200000zcb4500 | ||
---|---|---|---|
001 | BV046878244 | ||
003 | DE-604 | ||
005 | 20210906 | ||
006 | a |||| 10||| | ||
007 | cr|uuu---uuuuu | ||
008 | 200901s2020 |||| o||u| ||||||eng d | ||
020 | |a 9783030578848 |c Online |9 978-3-030-57884-8 | ||
024 | 7 | |a 10.1007/978-3-030-57884-8 |2 doi | |
035 | |a (ZDB-2-SCS)9783030578848 | ||
035 | |a (ZDB-2-LNC)9783030578848 | ||
035 | |a (OCoLC)1197700871 | ||
035 | |a (DE-599)BVBBV046878244 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-573 |a DE-860 |a DE-91 |a DE-19 |a DE-Aug4 |a DE-898 |a DE-861 |a DE-188 |a DE-523 |a DE-859 |a DE-473 |a DE-29 |a DE-863 |a DE-20 |a DE-862 |a DE-92 |a DE-355 |a DE-384 |a DE-M347 |a DE-703 |a DE-706 |a DE-739 |a DE-634 | ||
082 | 0 | |a 004 |2 23 | |
084 | |a DAT 000 |2 stub | ||
111 | 2 | |a ICAIS |n 6. |d 2020 |c Hohhot; Online |j Verfasser |0 (DE-588)1218175168 |4 aut | |
245 | 1 | 0 | |a Artificial intelligence and security |b 6th international conference, ICAIS 2020, Hohhot, China, July 17–20, 2020 : proceedings, part I |c Xingming Sun, Jinwei Wang, Elisa Bertino (eds.) |
264 | 1 | |a Cham |b Springer |c [2020] | |
300 | |a 1 Online-Ressource (xxvii, 828 Seiten) |b 121 Illustrationen | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
490 | 1 | |a Lecture notes in computer science |v 12239 |a Information systems and applications, incl. internet/web, and HCI | |
650 | 4 | |a Computer Applications | |
650 | 4 | |a Systems and Data Security | |
650 | 4 | |a Artificial Intelligence | |
650 | 4 | |a Computer Communication Networks | |
650 | 4 | |a Computing Milieux | |
650 | 4 | |a Machine Learning | |
650 | 4 | |a Application software | |
650 | 4 | |a Computer security | |
650 | 4 | |a Artificial intelligence | |
650 | 4 | |a Computer communication systems | |
650 | 4 | |a Computers | |
650 | 4 | |a Machine learning | |
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Kryptologie |0 (DE-588)4033329-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Datensicherung |0 (DE-588)4011144-1 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Künstliche Intelligenz |0 (DE-588)4033447-8 |2 gnd |9 rswk-swf |
655 | 7 | |0 (DE-588)1071861417 |a Konferenzschrift |y 2020 |z Hohhot; Online |2 gnd-content | |
689 | 0 | 0 | |a Künstliche Intelligenz |0 (DE-588)4033447-8 |D s |
689 | 0 | 1 | |a Datensicherung |0 (DE-588)4011144-1 |D s |
689 | 0 | 2 | |a Kryptologie |0 (DE-588)4033329-2 |D s |
689 | 0 | 3 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 0 | |5 DE-604 | |
700 | 1 | |a Sun, Xingming |0 (DE-588)1144995345 |4 edt | |
700 | 1 | |a Wang, Jinwei |4 edt | |
700 | 1 | |a Bertino, Elisa |4 edt | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 978-3-030-57883-1 |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 978-3-030-57885-5 |
830 | 0 | |a Lecture notes in computer science |v 12239 |w (DE-604)BV014880109 |9 12239 | |
856 | 4 | 0 | |u https://doi.org/10.1007/978-3-030-57884-8 |x Verlag |z URL des Erstveröffentlichers |3 Volltext |
856 | 4 | 2 | |m SWB Datenaustausch |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=032288295&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Buchcover |
912 | |a ZDB-2-SCS |a ZDB-2-LNC | ||
940 | 1 | |q ZDB-2-SCS_2020 | |
940 | 1 | |q ZDB-2-LNC_2020 | |
999 | |a oai:aleph.bib-bvb.de:BVB01-032288295 | ||
966 | e | |u https://doi.org/10.1007/978-3-030-57884-8 |l BTU01 |p ZDB-2-LNC |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-030-57884-8 |l FHA01 |p ZDB-2-LNC |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-030-57884-8 |l FHI01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-030-57884-8 |l FHM01 |p ZDB-2-LNC |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-030-57884-8 |l FHN01 |p ZDB-2-LNC |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-030-57884-8 |l FHR01 |p ZDB-2-LNC |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-030-57884-8 |l FKE01 |p ZDB-2-LNC |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-030-57884-8 |l FLA01 |p ZDB-2-LNC |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-030-57884-8 |l FRO01 |p ZDB-2-LNC |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-030-57884-8 |l FWS01 |p ZDB-2-LNC |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-030-57884-8 |l FWS02 |p ZDB-2-LNC |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-030-57884-8 |l HTW01 |p ZDB-2-LNC |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-030-57884-8 |l TUM01 |p ZDB-2-LNC |q ZDB-2-LNC_2020 |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-030-57884-8 |l UBA01 |p ZDB-2-LNC |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-030-57884-8 |l UBG01 |p ZDB-2-LNC |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-030-57884-8 |l UBM01 |p ZDB-2-LNC |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-030-57884-8 |l UBR01 |p ZDB-2-LNC |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-030-57884-8 |l UBT01 |p ZDB-2-LNC |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-030-57884-8 |l UBW01 |p ZDB-2-LNC |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-030-57884-8 |l UBY01 |p ZDB-2-LNC |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-030-57884-8 |l UER01 |p ZDB-2-LNC |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-030-57884-8 |l UPA01 |p ZDB-2-LNC |x Verlag |3 Volltext |
Datensatz im Suchindex
DE-BY-FWS_katkey | 851451 |
---|---|
_version_ | 1806192627185352704 |
adam_txt | |
any_adam_object | 1 |
any_adam_object_boolean | 1 |
author2 | Sun, Xingming Wang, Jinwei Bertino, Elisa |
author2_role | edt edt edt |
author2_variant | x s xs j w jw e b eb |
author_GND | (DE-588)1144995345 |
author_corporate | ICAIS Hohhot; Online |
author_corporate_role | aut |
author_facet | Sun, Xingming Wang, Jinwei Bertino, Elisa ICAIS Hohhot; Online |
author_sort | ICAIS Hohhot; Online |
building | Verbundindex |
bvnumber | BV046878244 |
classification_tum | DAT 000 |
collection | ZDB-2-SCS ZDB-2-LNC |
ctrlnum | (ZDB-2-SCS)9783030578848 (ZDB-2-LNC)9783030578848 (OCoLC)1197700871 (DE-599)BVBBV046878244 |
dewey-full | 004 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 004 - Computer science |
dewey-raw | 004 |
dewey-search | 004 |
dewey-sort | 14 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
discipline_str_mv | Informatik |
doi_str_mv | 10.1007/978-3-030-57884-8 |
format | Electronic Conference Proceeding eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>05367nmm a2200997zcb4500</leader><controlfield tag="001">BV046878244</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20210906 </controlfield><controlfield tag="006">a |||| 10||| </controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">200901s2020 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783030578848</subfield><subfield code="c">Online</subfield><subfield code="9">978-3-030-57884-8</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1007/978-3-030-57884-8</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-2-SCS)9783030578848</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-2-LNC)9783030578848</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1197700871</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV046878244</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-573</subfield><subfield code="a">DE-860</subfield><subfield code="a">DE-91</subfield><subfield code="a">DE-19</subfield><subfield code="a">DE-Aug4</subfield><subfield code="a">DE-898</subfield><subfield code="a">DE-861</subfield><subfield code="a">DE-188</subfield><subfield code="a">DE-523</subfield><subfield code="a">DE-859</subfield><subfield code="a">DE-473</subfield><subfield code="a">DE-29</subfield><subfield code="a">DE-863</subfield><subfield code="a">DE-20</subfield><subfield code="a">DE-862</subfield><subfield code="a">DE-92</subfield><subfield code="a">DE-355</subfield><subfield code="a">DE-384</subfield><subfield code="a">DE-M347</subfield><subfield code="a">DE-703</subfield><subfield code="a">DE-706</subfield><subfield code="a">DE-739</subfield><subfield code="a">DE-634</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">004</subfield><subfield code="2">23</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 000</subfield><subfield code="2">stub</subfield></datafield><datafield tag="111" ind1="2" ind2=" "><subfield code="a">ICAIS</subfield><subfield code="n">6.</subfield><subfield code="d">2020</subfield><subfield code="c">Hohhot; Online</subfield><subfield code="j">Verfasser</subfield><subfield code="0">(DE-588)1218175168</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Artificial intelligence and security</subfield><subfield code="b">6th international conference, ICAIS 2020, Hohhot, China, July 17–20, 2020 : proceedings, part I</subfield><subfield code="c">Xingming Sun, Jinwei Wang, Elisa Bertino (eds.)</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Cham</subfield><subfield code="b">Springer</subfield><subfield code="c">[2020]</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (xxvii, 828 Seiten)</subfield><subfield code="b">121 Illustrationen</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">Lecture notes in computer science</subfield><subfield code="v">12239</subfield><subfield code="a">Information systems and applications, incl. internet/web, and HCI</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer Applications</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Systems and Data Security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Artificial Intelligence</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer Communication Networks</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computing Milieux</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Machine Learning</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Application software</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Artificial intelligence</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer communication systems</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computers</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Machine learning</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kryptologie</subfield><subfield code="0">(DE-588)4033329-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Künstliche Intelligenz</subfield><subfield code="0">(DE-588)4033447-8</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)1071861417</subfield><subfield code="a">Konferenzschrift</subfield><subfield code="y">2020</subfield><subfield code="z">Hohhot; Online</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Künstliche Intelligenz</subfield><subfield code="0">(DE-588)4033447-8</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Kryptologie</subfield><subfield code="0">(DE-588)4033329-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="3"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Sun, Xingming</subfield><subfield code="0">(DE-588)1144995345</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Wang, Jinwei</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Bertino, Elisa</subfield><subfield code="4">edt</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">978-3-030-57883-1</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">978-3-030-57885-5</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">Lecture notes in computer science</subfield><subfield code="v">12239</subfield><subfield code="w">(DE-604)BV014880109</subfield><subfield code="9">12239</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1007/978-3-030-57884-8</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Erstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">SWB Datenaustausch</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=032288295&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Buchcover</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-2-SCS</subfield><subfield code="a">ZDB-2-LNC</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">ZDB-2-SCS_2020</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">ZDB-2-LNC_2020</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-032288295</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-030-57884-8</subfield><subfield code="l">BTU01</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-030-57884-8</subfield><subfield code="l">FHA01</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-030-57884-8</subfield><subfield code="l">FHI01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-030-57884-8</subfield><subfield code="l">FHM01</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-030-57884-8</subfield><subfield code="l">FHN01</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-030-57884-8</subfield><subfield code="l">FHR01</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-030-57884-8</subfield><subfield code="l">FKE01</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-030-57884-8</subfield><subfield code="l">FLA01</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-030-57884-8</subfield><subfield code="l">FRO01</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-030-57884-8</subfield><subfield code="l">FWS01</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-030-57884-8</subfield><subfield code="l">FWS02</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-030-57884-8</subfield><subfield code="l">HTW01</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-030-57884-8</subfield><subfield code="l">TUM01</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="q">ZDB-2-LNC_2020</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-030-57884-8</subfield><subfield code="l">UBA01</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-030-57884-8</subfield><subfield code="l">UBG01</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-030-57884-8</subfield><subfield code="l">UBM01</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-030-57884-8</subfield><subfield code="l">UBR01</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-030-57884-8</subfield><subfield code="l">UBT01</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-030-57884-8</subfield><subfield code="l">UBW01</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-030-57884-8</subfield><subfield code="l">UBY01</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-030-57884-8</subfield><subfield code="l">UER01</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-030-57884-8</subfield><subfield code="l">UPA01</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
genre | (DE-588)1071861417 Konferenzschrift 2020 Hohhot; Online gnd-content |
genre_facet | Konferenzschrift 2020 Hohhot; Online |
id | DE-604.BV046878244 |
illustrated | Not Illustrated |
index_date | 2024-07-03T15:17:08Z |
indexdate | 2024-08-01T15:38:38Z |
institution | BVB |
institution_GND | (DE-588)1218175168 |
isbn | 9783030578848 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-032288295 |
oclc_num | 1197700871 |
open_access_boolean | |
owner | DE-573 DE-860 DE-91 DE-BY-TUM DE-19 DE-BY-UBM DE-Aug4 DE-898 DE-BY-UBR DE-861 DE-188 DE-523 DE-859 DE-473 DE-BY-UBG DE-29 DE-863 DE-BY-FWS DE-20 DE-862 DE-BY-FWS DE-92 DE-355 DE-BY-UBR DE-384 DE-M347 DE-703 DE-706 DE-739 DE-634 |
owner_facet | DE-573 DE-860 DE-91 DE-BY-TUM DE-19 DE-BY-UBM DE-Aug4 DE-898 DE-BY-UBR DE-861 DE-188 DE-523 DE-859 DE-473 DE-BY-UBG DE-29 DE-863 DE-BY-FWS DE-20 DE-862 DE-BY-FWS DE-92 DE-355 DE-BY-UBR DE-384 DE-M347 DE-703 DE-706 DE-739 DE-634 |
physical | 1 Online-Ressource (xxvii, 828 Seiten) 121 Illustrationen |
psigel | ZDB-2-SCS ZDB-2-LNC ZDB-2-SCS_2020 ZDB-2-LNC_2020 ZDB-2-LNC ZDB-2-LNC_2020 |
publishDate | 2020 |
publishDateSearch | 2020 |
publishDateSort | 2020 |
publisher | Springer |
record_format | marc |
series | Lecture notes in computer science |
series2 | Lecture notes in computer science Information systems and applications, incl. internet/web, and HCI |
spellingShingle | Artificial intelligence and security 6th international conference, ICAIS 2020, Hohhot, China, July 17–20, 2020 : proceedings, part I Lecture notes in computer science Computer Applications Systems and Data Security Artificial Intelligence Computer Communication Networks Computing Milieux Machine Learning Application software Computer security Artificial intelligence Computer communication systems Computers Machine learning Computersicherheit (DE-588)4274324-2 gnd Kryptologie (DE-588)4033329-2 gnd Datensicherung (DE-588)4011144-1 gnd Künstliche Intelligenz (DE-588)4033447-8 gnd |
subject_GND | (DE-588)4274324-2 (DE-588)4033329-2 (DE-588)4011144-1 (DE-588)4033447-8 (DE-588)1071861417 |
title | Artificial intelligence and security 6th international conference, ICAIS 2020, Hohhot, China, July 17–20, 2020 : proceedings, part I |
title_auth | Artificial intelligence and security 6th international conference, ICAIS 2020, Hohhot, China, July 17–20, 2020 : proceedings, part I |
title_exact_search | Artificial intelligence and security 6th international conference, ICAIS 2020, Hohhot, China, July 17–20, 2020 : proceedings, part I |
title_exact_search_txtP | Artificial intelligence and security 6th international conference, ICAIS 2020, Hohhot, China, July 17–20, 2020 : proceedings, part I |
title_full | Artificial intelligence and security 6th international conference, ICAIS 2020, Hohhot, China, July 17–20, 2020 : proceedings, part I Xingming Sun, Jinwei Wang, Elisa Bertino (eds.) |
title_fullStr | Artificial intelligence and security 6th international conference, ICAIS 2020, Hohhot, China, July 17–20, 2020 : proceedings, part I Xingming Sun, Jinwei Wang, Elisa Bertino (eds.) |
title_full_unstemmed | Artificial intelligence and security 6th international conference, ICAIS 2020, Hohhot, China, July 17–20, 2020 : proceedings, part I Xingming Sun, Jinwei Wang, Elisa Bertino (eds.) |
title_short | Artificial intelligence and security |
title_sort | artificial intelligence and security 6th international conference icais 2020 hohhot china july 17 20 2020 proceedings part i |
title_sub | 6th international conference, ICAIS 2020, Hohhot, China, July 17–20, 2020 : proceedings, part I |
topic | Computer Applications Systems and Data Security Artificial Intelligence Computer Communication Networks Computing Milieux Machine Learning Application software Computer security Artificial intelligence Computer communication systems Computers Machine learning Computersicherheit (DE-588)4274324-2 gnd Kryptologie (DE-588)4033329-2 gnd Datensicherung (DE-588)4011144-1 gnd Künstliche Intelligenz (DE-588)4033447-8 gnd |
topic_facet | Computer Applications Systems and Data Security Artificial Intelligence Computer Communication Networks Computing Milieux Machine Learning Application software Computer security Artificial intelligence Computer communication systems Computers Machine learning Computersicherheit Kryptologie Datensicherung Künstliche Intelligenz Konferenzschrift 2020 Hohhot; Online |
url | https://doi.org/10.1007/978-3-030-57884-8 http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=032288295&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
volume_link | (DE-604)BV014880109 |
work_keys_str_mv | AT icaishohhotonline artificialintelligenceandsecurity6thinternationalconferenceicais2020hohhotchinajuly17202020proceedingsparti AT sunxingming artificialintelligenceandsecurity6thinternationalconferenceicais2020hohhotchinajuly17202020proceedingsparti AT wangjinwei artificialintelligenceandsecurity6thinternationalconferenceicais2020hohhotchinajuly17202020proceedingsparti AT bertinoelisa artificialintelligenceandsecurity6thinternationalconferenceicais2020hohhotchinajuly17202020proceedingsparti |