Deployable Machine Learning for Security Defense: First International Workshop, MLHat 2020, San Diego, CA, USA, August 24, 2020, Proceedings
Gespeichert in:
Weitere Verfasser: | , , |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Cham
Springer International Publishing
2020
Cham Springer |
Ausgabe: | 1st ed. 2020 |
Schriftenreihe: | Communications in Computer and Information Science
1271 |
Schlagworte: | |
Online-Zugang: | BTU01 FHA01 FHI01 FHM01 FHN01 FHR01 FKE01 FLA01 FRO01 FWS01 FWS02 HTW01 UBG01 UBM01 UBR01 UBT01 UBW01 UBY01 UER01 UPA01 Volltext |
Beschreibung: | 1 Online-Ressource (VII, 165 p. 170 illus., 45 illus. in color) |
ISBN: | 9783030596217 |
ISSN: | 1865-0929 |
DOI: | 10.1007/978-3-030-59621-7 |
Internformat
MARC
LEADER | 00000nmm a2200000zcb4500 | ||
---|---|---|---|
001 | BV046974513 | ||
003 | DE-604 | ||
005 | 20210505 | ||
007 | cr|uuu---uuuuu | ||
008 | 201103s2020 |||| o||u| ||||||eng d | ||
020 | |a 9783030596217 |c Online |9 978-3-030-59621-7 | ||
024 | 7 | |a 10.1007/978-3-030-59621-7 |2 doi | |
035 | |a (ZDB-2-SCS)9783030596217 | ||
035 | |a (OCoLC)1220923031 | ||
035 | |a (DE-599)BVBBV046974513 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-573 |a DE-860 |a DE-19 |a DE-Aug4 |a DE-898 |a DE-861 |a DE-188 |a DE-523 |a DE-859 |a DE-473 |a DE-29 |a DE-863 |a DE-20 |a DE-862 |a DE-92 |a DE-355 |a DE-M347 |a DE-703 |a DE-706 |a DE-739 |a DE-634 | ||
082 | 0 | |a 004 |2 23 | |
245 | 1 | 0 | |a Deployable Machine Learning for Security Defense |b First International Workshop, MLHat 2020, San Diego, CA, USA, August 24, 2020, Proceedings |c edited by Gang Wang, Arridhana Ciptadi, Ali Ahmadzadeh |
250 | |a 1st ed. 2020 | ||
264 | 1 | |a Cham |b Springer International Publishing |c 2020 | |
264 | 1 | |a Cham |b Springer | |
300 | |a 1 Online-Ressource (VII, 165 p. 170 illus., 45 illus. in color) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
490 | 0 | |a Communications in Computer and Information Science |v 1271 |x 1865-0929 | |
650 | 4 | |a Computing Milieux | |
650 | 4 | |a Systems and Data Security | |
650 | 4 | |a Computer Crime | |
650 | 4 | |a Artificial Intelligence | |
650 | 4 | |a Computer Communication Networks | |
650 | 4 | |a Information Systems Applications (incl. Internet) | |
650 | 4 | |a Computers | |
650 | 4 | |a Computer security | |
650 | 4 | |a Computer crimes | |
650 | 4 | |a Artificial intelligence | |
650 | 4 | |a Computer communication systems | |
650 | 4 | |a Application software | |
650 | 0 | 7 | |a Künstliche Intelligenz |0 (DE-588)4033447-8 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Künstliche Intelligenz |0 (DE-588)4033447-8 |D s |
689 | 0 | 1 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 0 | |5 DE-604 | |
700 | 1 | |a Wang, Gang |4 edt | |
700 | 1 | |a Ciptadi, Arridhana |4 edt | |
700 | 1 | |a Ahmadzadeh, Ali |4 edt | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 978-3-030-59620-0 |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 978-3-030-59622-4 |
856 | 4 | 0 | |u https://doi.org/10.1007/978-3-030-59621-7 |x Verlag |z URL des Erstveröffentlichers |3 Volltext |
912 | |a ZDB-2-SCS | ||
940 | 1 | |q ZDB-2-SCS_2020_Fremddaten | |
999 | |a oai:aleph.bib-bvb.de:BVB01-032382654 | ||
966 | e | |u https://doi.org/10.1007/978-3-030-59621-7 |l BTU01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-030-59621-7 |l FHA01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-030-59621-7 |l FHI01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-030-59621-7 |l FHM01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-030-59621-7 |l FHN01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-030-59621-7 |l FHR01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-030-59621-7 |l FKE01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-030-59621-7 |l FLA01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-030-59621-7 |l FRO01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-030-59621-7 |l FWS01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-030-59621-7 |l FWS02 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-030-59621-7 |l HTW01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-030-59621-7 |l UBG01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-030-59621-7 |l UBM01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-030-59621-7 |l UBR01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-030-59621-7 |l UBT01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-030-59621-7 |l UBW01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-030-59621-7 |l UBY01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-030-59621-7 |l UER01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-030-59621-7 |l UPA01 |p ZDB-2-SCS |x Verlag |3 Volltext |
Datensatz im Suchindex
_version_ | 1804181903566176256 |
---|---|
adam_txt | |
any_adam_object | |
any_adam_object_boolean | |
author2 | Wang, Gang Ciptadi, Arridhana Ahmadzadeh, Ali |
author2_role | edt edt edt |
author2_variant | g w gw a c ac a a aa |
author_facet | Wang, Gang Ciptadi, Arridhana Ahmadzadeh, Ali |
building | Verbundindex |
bvnumber | BV046974513 |
collection | ZDB-2-SCS |
ctrlnum | (ZDB-2-SCS)9783030596217 (OCoLC)1220923031 (DE-599)BVBBV046974513 |
dewey-full | 004 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 004 - Computer science |
dewey-raw | 004 |
dewey-search | 004 |
dewey-sort | 14 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
discipline_str_mv | Informatik |
doi_str_mv | 10.1007/978-3-030-59621-7 |
edition | 1st ed. 2020 |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>04361nmm a2200853zcb4500</leader><controlfield tag="001">BV046974513</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20210505 </controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">201103s2020 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783030596217</subfield><subfield code="c">Online</subfield><subfield code="9">978-3-030-59621-7</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1007/978-3-030-59621-7</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-2-SCS)9783030596217</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1220923031</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV046974513</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-573</subfield><subfield code="a">DE-860</subfield><subfield code="a">DE-19</subfield><subfield code="a">DE-Aug4</subfield><subfield code="a">DE-898</subfield><subfield code="a">DE-861</subfield><subfield code="a">DE-188</subfield><subfield code="a">DE-523</subfield><subfield code="a">DE-859</subfield><subfield code="a">DE-473</subfield><subfield code="a">DE-29</subfield><subfield code="a">DE-863</subfield><subfield code="a">DE-20</subfield><subfield code="a">DE-862</subfield><subfield code="a">DE-92</subfield><subfield code="a">DE-355</subfield><subfield code="a">DE-M347</subfield><subfield code="a">DE-703</subfield><subfield code="a">DE-706</subfield><subfield code="a">DE-739</subfield><subfield code="a">DE-634</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">004</subfield><subfield code="2">23</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Deployable Machine Learning for Security Defense</subfield><subfield code="b">First International Workshop, MLHat 2020, San Diego, CA, USA, August 24, 2020, Proceedings</subfield><subfield code="c">edited by Gang Wang, Arridhana Ciptadi, Ali Ahmadzadeh</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">1st ed. 2020</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Cham</subfield><subfield code="b">Springer International Publishing</subfield><subfield code="c">2020</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Cham</subfield><subfield code="b">Springer</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (VII, 165 p. 170 illus., 45 illus. in color)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">Communications in Computer and Information Science</subfield><subfield code="v">1271</subfield><subfield code="x">1865-0929</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computing Milieux</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Systems and Data Security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer Crime</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Artificial Intelligence</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer Communication Networks</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Information Systems Applications (incl. Internet)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computers</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer crimes</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Artificial intelligence</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer communication systems</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Application software</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Künstliche Intelligenz</subfield><subfield code="0">(DE-588)4033447-8</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Künstliche Intelligenz</subfield><subfield code="0">(DE-588)4033447-8</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Wang, Gang</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Ciptadi, Arridhana</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Ahmadzadeh, Ali</subfield><subfield code="4">edt</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">978-3-030-59620-0</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">978-3-030-59622-4</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1007/978-3-030-59621-7</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Erstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-2-SCS</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">ZDB-2-SCS_2020_Fremddaten</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-032382654</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-030-59621-7</subfield><subfield code="l">BTU01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-030-59621-7</subfield><subfield code="l">FHA01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-030-59621-7</subfield><subfield code="l">FHI01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-030-59621-7</subfield><subfield code="l">FHM01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-030-59621-7</subfield><subfield code="l">FHN01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-030-59621-7</subfield><subfield code="l">FHR01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-030-59621-7</subfield><subfield code="l">FKE01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-030-59621-7</subfield><subfield code="l">FLA01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-030-59621-7</subfield><subfield code="l">FRO01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-030-59621-7</subfield><subfield code="l">FWS01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-030-59621-7</subfield><subfield code="l">FWS02</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-030-59621-7</subfield><subfield code="l">HTW01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-030-59621-7</subfield><subfield code="l">UBG01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-030-59621-7</subfield><subfield code="l">UBM01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-030-59621-7</subfield><subfield code="l">UBR01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-030-59621-7</subfield><subfield code="l">UBT01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-030-59621-7</subfield><subfield code="l">UBW01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-030-59621-7</subfield><subfield code="l">UBY01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-030-59621-7</subfield><subfield code="l">UER01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-030-59621-7</subfield><subfield code="l">UPA01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV046974513 |
illustrated | Not Illustrated |
index_date | 2024-07-03T15:48:14Z |
indexdate | 2024-07-10T08:59:03Z |
institution | BVB |
isbn | 9783030596217 |
issn | 1865-0929 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-032382654 |
oclc_num | 1220923031 |
open_access_boolean | |
owner | DE-573 DE-860 DE-19 DE-BY-UBM DE-Aug4 DE-898 DE-BY-UBR DE-861 DE-188 DE-523 DE-859 DE-473 DE-BY-UBG DE-29 DE-863 DE-BY-FWS DE-20 DE-862 DE-BY-FWS DE-92 DE-355 DE-BY-UBR DE-M347 DE-703 DE-706 DE-739 DE-634 |
owner_facet | DE-573 DE-860 DE-19 DE-BY-UBM DE-Aug4 DE-898 DE-BY-UBR DE-861 DE-188 DE-523 DE-859 DE-473 DE-BY-UBG DE-29 DE-863 DE-BY-FWS DE-20 DE-862 DE-BY-FWS DE-92 DE-355 DE-BY-UBR DE-M347 DE-703 DE-706 DE-739 DE-634 |
physical | 1 Online-Ressource (VII, 165 p. 170 illus., 45 illus. in color) |
psigel | ZDB-2-SCS ZDB-2-SCS_2020_Fremddaten |
publishDate | 2020 |
publishDateSearch | 2020 |
publishDateSort | 2020 |
publisher | Springer International Publishing Springer |
record_format | marc |
series2 | Communications in Computer and Information Science |
spelling | Deployable Machine Learning for Security Defense First International Workshop, MLHat 2020, San Diego, CA, USA, August 24, 2020, Proceedings edited by Gang Wang, Arridhana Ciptadi, Ali Ahmadzadeh 1st ed. 2020 Cham Springer International Publishing 2020 Cham Springer 1 Online-Ressource (VII, 165 p. 170 illus., 45 illus. in color) txt rdacontent c rdamedia cr rdacarrier Communications in Computer and Information Science 1271 1865-0929 Computing Milieux Systems and Data Security Computer Crime Artificial Intelligence Computer Communication Networks Information Systems Applications (incl. Internet) Computers Computer security Computer crimes Artificial intelligence Computer communication systems Application software Künstliche Intelligenz (DE-588)4033447-8 gnd rswk-swf Computersicherheit (DE-588)4274324-2 gnd rswk-swf Künstliche Intelligenz (DE-588)4033447-8 s Computersicherheit (DE-588)4274324-2 s DE-604 Wang, Gang edt Ciptadi, Arridhana edt Ahmadzadeh, Ali edt Erscheint auch als Druck-Ausgabe 978-3-030-59620-0 Erscheint auch als Druck-Ausgabe 978-3-030-59622-4 https://doi.org/10.1007/978-3-030-59621-7 Verlag URL des Erstveröffentlichers Volltext |
spellingShingle | Deployable Machine Learning for Security Defense First International Workshop, MLHat 2020, San Diego, CA, USA, August 24, 2020, Proceedings Computing Milieux Systems and Data Security Computer Crime Artificial Intelligence Computer Communication Networks Information Systems Applications (incl. Internet) Computers Computer security Computer crimes Artificial intelligence Computer communication systems Application software Künstliche Intelligenz (DE-588)4033447-8 gnd Computersicherheit (DE-588)4274324-2 gnd |
subject_GND | (DE-588)4033447-8 (DE-588)4274324-2 |
title | Deployable Machine Learning for Security Defense First International Workshop, MLHat 2020, San Diego, CA, USA, August 24, 2020, Proceedings |
title_auth | Deployable Machine Learning for Security Defense First International Workshop, MLHat 2020, San Diego, CA, USA, August 24, 2020, Proceedings |
title_exact_search | Deployable Machine Learning for Security Defense First International Workshop, MLHat 2020, San Diego, CA, USA, August 24, 2020, Proceedings |
title_exact_search_txtP | Deployable Machine Learning for Security Defense First International Workshop, MLHat 2020, San Diego, CA, USA, August 24, 2020, Proceedings |
title_full | Deployable Machine Learning for Security Defense First International Workshop, MLHat 2020, San Diego, CA, USA, August 24, 2020, Proceedings edited by Gang Wang, Arridhana Ciptadi, Ali Ahmadzadeh |
title_fullStr | Deployable Machine Learning for Security Defense First International Workshop, MLHat 2020, San Diego, CA, USA, August 24, 2020, Proceedings edited by Gang Wang, Arridhana Ciptadi, Ali Ahmadzadeh |
title_full_unstemmed | Deployable Machine Learning for Security Defense First International Workshop, MLHat 2020, San Diego, CA, USA, August 24, 2020, Proceedings edited by Gang Wang, Arridhana Ciptadi, Ali Ahmadzadeh |
title_short | Deployable Machine Learning for Security Defense |
title_sort | deployable machine learning for security defense first international workshop mlhat 2020 san diego ca usa august 24 2020 proceedings |
title_sub | First International Workshop, MLHat 2020, San Diego, CA, USA, August 24, 2020, Proceedings |
topic | Computing Milieux Systems and Data Security Computer Crime Artificial Intelligence Computer Communication Networks Information Systems Applications (incl. Internet) Computers Computer security Computer crimes Artificial intelligence Computer communication systems Application software Künstliche Intelligenz (DE-588)4033447-8 gnd Computersicherheit (DE-588)4274324-2 gnd |
topic_facet | Computing Milieux Systems and Data Security Computer Crime Artificial Intelligence Computer Communication Networks Information Systems Applications (incl. Internet) Computers Computer security Computer crimes Artificial intelligence Computer communication systems Application software Künstliche Intelligenz Computersicherheit |
url | https://doi.org/10.1007/978-3-030-59621-7 |
work_keys_str_mv | AT wanggang deployablemachinelearningforsecuritydefensefirstinternationalworkshopmlhat2020sandiegocausaaugust242020proceedings AT ciptadiarridhana deployablemachinelearningforsecuritydefensefirstinternationalworkshopmlhat2020sandiegocausaaugust242020proceedings AT ahmadzadehali deployablemachinelearningforsecuritydefensefirstinternationalworkshopmlhat2020sandiegocausaaugust242020proceedings |