Deployable Machine Learning for Security Defense: Second International Workshop, MLHat 2021, Virtual Event, August 15, 2021, Proceedings
Gespeichert in:
Weitere Verfasser: | , , |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Cham
Springer International Publishing
2021
Cham Springer |
Ausgabe: | 1st ed. 2021 |
Schriftenreihe: | Communications in Computer and Information Science
1482 |
Schlagworte: | |
Online-Zugang: | BTU01 FCO01 FHA01 FHD01 FHI01 FHM01 FHN01 FHR01 FLA01 FRO01 FWS01 FWS02 HTW01 UBA01 UBG01 UBM01 UBT01 UBW01 UBY01 UER01 UPA01 UBR01 Volltext |
Beschreibung: | 1 Online-Ressource (VII, 157 p. 42 illus., 32 illus. in color) |
ISBN: | 9783030878399 |
ISSN: | 1865-0937 |
DOI: | 10.1007/978-3-030-87839-9 |
Internformat
MARC
LEADER | 00000nmm a2200000zcb4500 | ||
---|---|---|---|
001 | BV047552633 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 211021s2021 |||| o||u| ||||||eng d | ||
020 | |a 9783030878399 |c Online |9 978-3-030-87839-9 | ||
024 | 7 | |a 10.1007/978-3-030-87839-9 |2 doi | |
035 | |a (ZDB-2-SCS)9783030878399 | ||
035 | |a (OCoLC)1284787794 | ||
035 | |a (DE-599)BVBBV047552633 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-860 |a DE-19 |a DE-858 |a DE-Aug4 |a DE-898 |a DE-861 |a DE-188 |a DE-523 |a DE-473 |a DE-29 |a DE-863 |a DE-1050 |a DE-20 |a DE-862 |a DE-92 |a DE-384 |a DE-573 |a DE-M347 |a DE-703 |a DE-706 |a DE-739 |a DE-634 |a DE-355 | ||
082 | 0 | |a 004 |2 23 | |
245 | 1 | 0 | |a Deployable Machine Learning for Security Defense |b Second International Workshop, MLHat 2021, Virtual Event, August 15, 2021, Proceedings |c edited by Gang Wang, Arridhana Ciptadi, Ali Ahmadzadeh |
250 | |a 1st ed. 2021 | ||
264 | 1 | |a Cham |b Springer International Publishing |c 2021 | |
264 | 1 | |a Cham |b Springer | |
300 | |a 1 Online-Ressource (VII, 157 p. 42 illus., 32 illus. in color) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
490 | 0 | |a Communications in Computer and Information Science |v 1482 |x 1865-0937 | |
650 | 4 | |a Computing Milieux | |
650 | 4 | |a Computer Appl. in Social and Behavioral Sciences | |
650 | 4 | |a Systems and Data Security | |
650 | 4 | |a Information Systems Applications (incl. Internet) | |
650 | 4 | |a Machine Learning | |
650 | 4 | |a Computer Communication Networks | |
650 | 4 | |a Computers | |
650 | 4 | |a Application software | |
650 | 4 | |a Computer security | |
650 | 4 | |a Machine learning | |
650 | 4 | |a Computer communication systems | |
700 | 1 | |a Wang, Gang |4 edt | |
700 | 1 | |a Ciptadi, Arridhana |4 edt | |
700 | 1 | |a Ahmadzadeh, Ali |4 edt | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 978-3-030-87838-2 |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 978-3-030-87840-5 |
856 | 4 | 0 | |u https://doi.org/10.1007/978-3-030-87839-9 |x Verlag |z URL des Erstveröffentlichers |3 Volltext |
912 | |a ZDB-2-SCS | ||
940 | 1 | |q ZDB-2-SCS_2021 | |
999 | |a oai:aleph.bib-bvb.de:BVB01-032928241 | ||
966 | e | |u https://doi.org/10.1007/978-3-030-87839-9 |l BTU01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-030-87839-9 |l FCO01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-030-87839-9 |l FHA01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-030-87839-9 |l FHD01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-030-87839-9 |l FHI01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-030-87839-9 |l FHM01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-030-87839-9 |l FHN01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-030-87839-9 |l FHR01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-030-87839-9 |l FLA01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-030-87839-9 |l FRO01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-030-87839-9 |l FWS01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-030-87839-9 |l FWS02 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-030-87839-9 |l HTW01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-030-87839-9 |l UBA01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-030-87839-9 |l UBG01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-030-87839-9 |l UBM01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-030-87839-9 |l UBT01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-030-87839-9 |l UBW01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-030-87839-9 |l UBY01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-030-87839-9 |l UER01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-030-87839-9 |l UPA01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-030-87839-9 |l UBR01 |p ZDB-2-SCS |x Verlag |3 Volltext |
Datensatz im Suchindex
DE-BY-FWS_katkey | 927344 |
---|---|
_version_ | 1806194914249146368 |
adam_txt | |
any_adam_object | |
any_adam_object_boolean | |
author2 | Wang, Gang Ciptadi, Arridhana Ahmadzadeh, Ali |
author2_role | edt edt edt |
author2_variant | g w gw a c ac a a aa |
author_facet | Wang, Gang Ciptadi, Arridhana Ahmadzadeh, Ali |
building | Verbundindex |
bvnumber | BV047552633 |
collection | ZDB-2-SCS |
ctrlnum | (ZDB-2-SCS)9783030878399 (OCoLC)1284787794 (DE-599)BVBBV047552633 |
dewey-full | 004 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 004 - Computer science |
dewey-raw | 004 |
dewey-search | 004 |
dewey-sort | 14 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
discipline_str_mv | Informatik |
doi_str_mv | 10.1007/978-3-030-87839-9 |
edition | 1st ed. 2021 |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>04253nmm a2200805zcb4500</leader><controlfield tag="001">BV047552633</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">211021s2021 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783030878399</subfield><subfield code="c">Online</subfield><subfield code="9">978-3-030-87839-9</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1007/978-3-030-87839-9</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-2-SCS)9783030878399</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1284787794</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV047552633</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-860</subfield><subfield code="a">DE-19</subfield><subfield code="a">DE-858</subfield><subfield code="a">DE-Aug4</subfield><subfield code="a">DE-898</subfield><subfield code="a">DE-861</subfield><subfield code="a">DE-188</subfield><subfield code="a">DE-523</subfield><subfield code="a">DE-473</subfield><subfield code="a">DE-29</subfield><subfield code="a">DE-863</subfield><subfield code="a">DE-1050</subfield><subfield code="a">DE-20</subfield><subfield code="a">DE-862</subfield><subfield code="a">DE-92</subfield><subfield code="a">DE-384</subfield><subfield code="a">DE-573</subfield><subfield code="a">DE-M347</subfield><subfield code="a">DE-703</subfield><subfield code="a">DE-706</subfield><subfield code="a">DE-739</subfield><subfield code="a">DE-634</subfield><subfield code="a">DE-355</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">004</subfield><subfield code="2">23</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Deployable Machine Learning for Security Defense</subfield><subfield code="b">Second International Workshop, MLHat 2021, Virtual Event, August 15, 2021, Proceedings</subfield><subfield code="c">edited by Gang Wang, Arridhana Ciptadi, Ali Ahmadzadeh</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">1st ed. 2021</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Cham</subfield><subfield code="b">Springer International Publishing</subfield><subfield code="c">2021</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Cham</subfield><subfield code="b">Springer</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (VII, 157 p. 42 illus., 32 illus. in color)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">Communications in Computer and Information Science</subfield><subfield code="v">1482</subfield><subfield code="x">1865-0937</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computing Milieux</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer Appl. in Social and Behavioral Sciences</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Systems and Data Security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Information Systems Applications (incl. Internet)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Machine Learning</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer Communication Networks</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computers</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Application software</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Machine learning</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer communication systems</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Wang, Gang</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Ciptadi, Arridhana</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Ahmadzadeh, Ali</subfield><subfield code="4">edt</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">978-3-030-87838-2</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">978-3-030-87840-5</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1007/978-3-030-87839-9</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Erstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-2-SCS</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">ZDB-2-SCS_2021</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-032928241</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-030-87839-9</subfield><subfield code="l">BTU01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-030-87839-9</subfield><subfield code="l">FCO01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-030-87839-9</subfield><subfield code="l">FHA01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-030-87839-9</subfield><subfield code="l">FHD01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-030-87839-9</subfield><subfield code="l">FHI01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-030-87839-9</subfield><subfield code="l">FHM01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-030-87839-9</subfield><subfield code="l">FHN01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-030-87839-9</subfield><subfield code="l">FHR01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-030-87839-9</subfield><subfield code="l">FLA01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-030-87839-9</subfield><subfield code="l">FRO01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-030-87839-9</subfield><subfield code="l">FWS01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-030-87839-9</subfield><subfield code="l">FWS02</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-030-87839-9</subfield><subfield code="l">HTW01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-030-87839-9</subfield><subfield code="l">UBA01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-030-87839-9</subfield><subfield code="l">UBG01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-030-87839-9</subfield><subfield code="l">UBM01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-030-87839-9</subfield><subfield code="l">UBT01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-030-87839-9</subfield><subfield code="l">UBW01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-030-87839-9</subfield><subfield code="l">UBY01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-030-87839-9</subfield><subfield code="l">UER01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-030-87839-9</subfield><subfield code="l">UPA01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-030-87839-9</subfield><subfield code="l">UBR01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV047552633 |
illustrated | Not Illustrated |
index_date | 2024-07-03T18:24:58Z |
indexdate | 2024-08-01T16:14:59Z |
institution | BVB |
isbn | 9783030878399 |
issn | 1865-0937 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-032928241 |
oclc_num | 1284787794 |
open_access_boolean | |
owner | DE-860 DE-19 DE-BY-UBM DE-858 DE-Aug4 DE-898 DE-BY-UBR DE-861 DE-188 DE-523 DE-473 DE-BY-UBG DE-29 DE-863 DE-BY-FWS DE-1050 DE-20 DE-862 DE-BY-FWS DE-92 DE-384 DE-573 DE-M347 DE-703 DE-706 DE-739 DE-634 DE-355 DE-BY-UBR |
owner_facet | DE-860 DE-19 DE-BY-UBM DE-858 DE-Aug4 DE-898 DE-BY-UBR DE-861 DE-188 DE-523 DE-473 DE-BY-UBG DE-29 DE-863 DE-BY-FWS DE-1050 DE-20 DE-862 DE-BY-FWS DE-92 DE-384 DE-573 DE-M347 DE-703 DE-706 DE-739 DE-634 DE-355 DE-BY-UBR |
physical | 1 Online-Ressource (VII, 157 p. 42 illus., 32 illus. in color) |
psigel | ZDB-2-SCS ZDB-2-SCS_2021 |
publishDate | 2021 |
publishDateSearch | 2021 |
publishDateSort | 2021 |
publisher | Springer International Publishing Springer |
record_format | marc |
series2 | Communications in Computer and Information Science |
spellingShingle | Deployable Machine Learning for Security Defense Second International Workshop, MLHat 2021, Virtual Event, August 15, 2021, Proceedings Computing Milieux Computer Appl. in Social and Behavioral Sciences Systems and Data Security Information Systems Applications (incl. Internet) Machine Learning Computer Communication Networks Computers Application software Computer security Machine learning Computer communication systems |
title | Deployable Machine Learning for Security Defense Second International Workshop, MLHat 2021, Virtual Event, August 15, 2021, Proceedings |
title_auth | Deployable Machine Learning for Security Defense Second International Workshop, MLHat 2021, Virtual Event, August 15, 2021, Proceedings |
title_exact_search | Deployable Machine Learning for Security Defense Second International Workshop, MLHat 2021, Virtual Event, August 15, 2021, Proceedings |
title_exact_search_txtP | Deployable Machine Learning for Security Defense Second International Workshop, MLHat 2021, Virtual Event, August 15, 2021, Proceedings |
title_full | Deployable Machine Learning for Security Defense Second International Workshop, MLHat 2021, Virtual Event, August 15, 2021, Proceedings edited by Gang Wang, Arridhana Ciptadi, Ali Ahmadzadeh |
title_fullStr | Deployable Machine Learning for Security Defense Second International Workshop, MLHat 2021, Virtual Event, August 15, 2021, Proceedings edited by Gang Wang, Arridhana Ciptadi, Ali Ahmadzadeh |
title_full_unstemmed | Deployable Machine Learning for Security Defense Second International Workshop, MLHat 2021, Virtual Event, August 15, 2021, Proceedings edited by Gang Wang, Arridhana Ciptadi, Ali Ahmadzadeh |
title_short | Deployable Machine Learning for Security Defense |
title_sort | deployable machine learning for security defense second international workshop mlhat 2021 virtual event august 15 2021 proceedings |
title_sub | Second International Workshop, MLHat 2021, Virtual Event, August 15, 2021, Proceedings |
topic | Computing Milieux Computer Appl. in Social and Behavioral Sciences Systems and Data Security Information Systems Applications (incl. Internet) Machine Learning Computer Communication Networks Computers Application software Computer security Machine learning Computer communication systems |
topic_facet | Computing Milieux Computer Appl. in Social and Behavioral Sciences Systems and Data Security Information Systems Applications (incl. Internet) Machine Learning Computer Communication Networks Computers Application software Computer security Machine learning Computer communication systems |
url | https://doi.org/10.1007/978-3-030-87839-9 |
work_keys_str_mv | AT wanggang deployablemachinelearningforsecuritydefensesecondinternationalworkshopmlhat2021virtualeventaugust152021proceedings AT ciptadiarridhana deployablemachinelearningforsecuritydefensesecondinternationalworkshopmlhat2021virtualeventaugust152021proceedings AT ahmadzadehali deployablemachinelearningforsecuritydefensesecondinternationalworkshopmlhat2021virtualeventaugust152021proceedings |