Artificial intelligence and security: 6th international conference, ICAIS 2020, Hohhot, China, July 17–20, 2020, proceedings
Gespeichert in:
Weitere Verfasser: | , , |
---|---|
Format: | Elektronisch Tagungsbericht E-Book |
Sprache: | English |
Veröffentlicht: |
Singapore
Springer
[2020]
|
Schriftenreihe: | Communications in computer and information science
|
Schlagworte: | |
Beschreibung: | Online-Ressource |
Internformat
MARC
LEADER | 00000nmm a2200000 ca4500 | ||
---|---|---|---|
001 | BV048412442 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
006 | a |||| 10||| | ||
007 | cr|uuu---uuuuu | ||
008 | 220817s2020 |||| o||u| ||||||eng d | ||
035 | |a (DE-599)BVBBV048412442 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
082 | 0 | |a 005.8 |2 23 | |
245 | 1 | 0 | |a Artificial intelligence and security |b 6th international conference, ICAIS 2020, Hohhot, China, July 17–20, 2020, proceedings |c Xingming Sun, Jinwei Wang, Elisa Bertino (eds.) |
264 | 1 | |a Singapore |b Springer |c [2020] | |
300 | |a Online-Ressource | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
490 | 0 | |a Communications in computer and information science | |
650 | 4 | |a Systems and Data Security | |
650 | 4 | |a Information Systems and Communication Service | |
650 | 4 | |a Artificial Intelligence | |
650 | 4 | |a Computer Communication Networks | |
650 | 4 | |a Computer System Implementation | |
650 | 4 | |a Computer Imaging, Vision, Pattern Recognition and Graphics | |
650 | 4 | |a Computer security | |
650 | 4 | |a Computers | |
650 | 4 | |a Artificial intelligence | |
650 | 4 | |a Computer communication systems | |
650 | 4 | |a Architecture, Computer | |
650 | 4 | |a Optical data processing | |
650 | 0 | 7 | |a Künstliche Intelligenz |0 (DE-588)4033447-8 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Datensicherung |0 (DE-588)4011144-1 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Kryptologie |0 (DE-588)4033329-2 |2 gnd |9 rswk-swf |
655 | 7 | |0 (DE-588)1071861417 |a Konferenzschrift |2 gnd-content | |
689 | 0 | 0 | |a Künstliche Intelligenz |0 (DE-588)4033447-8 |D s |
689 | 0 | 1 | |a Datensicherung |0 (DE-588)4011144-1 |D s |
689 | 0 | 2 | |a Kryptologie |0 (DE-588)4033329-2 |D s |
689 | 0 | 3 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 0 | |5 DE-604 | |
700 | 1 | |a Sun, Xingming |0 (DE-588)1144995345 |4 edt | |
700 | 1 | |a Wang, Jinwei |4 edt | |
700 | 1 | |a Bertino, Elisa |d 1957- |0 (DE-588)1018830286 |4 edt | |
711 | 2 | |a ICAIS |n 6. |d 2020 |c Hohhot; Online |j Sonstige |0 (DE-588)1218175168 |4 oth | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |
912 | |a ebook | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-033790877 |
Datensatz im Suchindex
_version_ | 1804184322477916160 |
---|---|
adam_txt | |
any_adam_object | |
any_adam_object_boolean | |
author2 | Sun, Xingming Wang, Jinwei Bertino, Elisa 1957- |
author2_role | edt edt edt |
author2_variant | x s xs j w jw e b eb |
author_GND | (DE-588)1144995345 (DE-588)1018830286 |
author_facet | Sun, Xingming Wang, Jinwei Bertino, Elisa 1957- |
building | Verbundindex |
bvnumber | BV048412442 |
collection | ebook |
ctrlnum | (DE-599)BVBBV048412442 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
discipline_str_mv | Informatik |
format | Electronic Conference Proceeding eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02235nmm a2200577 ca4500</leader><controlfield tag="001">BV048412442</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="006">a |||| 10||| </controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">220817s2020 |||| o||u| ||||||eng d</controlfield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV048412442</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Artificial intelligence and security</subfield><subfield code="b">6th international conference, ICAIS 2020, Hohhot, China, July 17–20, 2020, proceedings</subfield><subfield code="c">Xingming Sun, Jinwei Wang, Elisa Bertino (eds.)</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Singapore</subfield><subfield code="b">Springer</subfield><subfield code="c">[2020]</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">Communications in computer and information science</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Systems and Data Security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Information Systems and Communication Service</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Artificial Intelligence</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer Communication Networks</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer System Implementation</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer Imaging, Vision, Pattern Recognition and Graphics</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computers</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Artificial intelligence</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer communication systems</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Architecture, Computer</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Optical data processing</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Künstliche Intelligenz</subfield><subfield code="0">(DE-588)4033447-8</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kryptologie</subfield><subfield code="0">(DE-588)4033329-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)1071861417</subfield><subfield code="a">Konferenzschrift</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Künstliche Intelligenz</subfield><subfield code="0">(DE-588)4033447-8</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Kryptologie</subfield><subfield code="0">(DE-588)4033329-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="3"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Sun, Xingming</subfield><subfield code="0">(DE-588)1144995345</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Wang, Jinwei</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Bertino, Elisa</subfield><subfield code="d">1957-</subfield><subfield code="0">(DE-588)1018830286</subfield><subfield code="4">edt</subfield></datafield><datafield tag="711" ind1="2" ind2=" "><subfield code="a">ICAIS</subfield><subfield code="n">6.</subfield><subfield code="d">2020</subfield><subfield code="c">Hohhot; Online</subfield><subfield code="j">Sonstige</subfield><subfield code="0">(DE-588)1218175168</subfield><subfield code="4">oth</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ebook</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-033790877</subfield></datafield></record></collection> |
genre | (DE-588)1071861417 Konferenzschrift gnd-content |
genre_facet | Konferenzschrift |
id | DE-604.BV048412442 |
illustrated | Not Illustrated |
index_date | 2024-07-03T20:25:20Z |
indexdate | 2024-07-10T09:37:30Z |
institution | BVB |
institution_GND | (DE-588)1218175168 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-033790877 |
open_access_boolean | |
physical | Online-Ressource |
psigel | ebook |
publishDate | 2020 |
publishDateSearch | 2020 |
publishDateSort | 2020 |
publisher | Springer |
record_format | marc |
series2 | Communications in computer and information science |
spelling | Artificial intelligence and security 6th international conference, ICAIS 2020, Hohhot, China, July 17–20, 2020, proceedings Xingming Sun, Jinwei Wang, Elisa Bertino (eds.) Singapore Springer [2020] Online-Ressource txt rdacontent c rdamedia cr rdacarrier Communications in computer and information science Systems and Data Security Information Systems and Communication Service Artificial Intelligence Computer Communication Networks Computer System Implementation Computer Imaging, Vision, Pattern Recognition and Graphics Computer security Computers Artificial intelligence Computer communication systems Architecture, Computer Optical data processing Künstliche Intelligenz (DE-588)4033447-8 gnd rswk-swf Datensicherung (DE-588)4011144-1 gnd rswk-swf Computersicherheit (DE-588)4274324-2 gnd rswk-swf Kryptologie (DE-588)4033329-2 gnd rswk-swf (DE-588)1071861417 Konferenzschrift gnd-content Künstliche Intelligenz (DE-588)4033447-8 s Datensicherung (DE-588)4011144-1 s Kryptologie (DE-588)4033329-2 s Computersicherheit (DE-588)4274324-2 s DE-604 Sun, Xingming (DE-588)1144995345 edt Wang, Jinwei edt Bertino, Elisa 1957- (DE-588)1018830286 edt ICAIS 6. 2020 Hohhot; Online Sonstige (DE-588)1218175168 oth Erscheint auch als Druck-Ausgabe |
spellingShingle | Artificial intelligence and security 6th international conference, ICAIS 2020, Hohhot, China, July 17–20, 2020, proceedings Systems and Data Security Information Systems and Communication Service Artificial Intelligence Computer Communication Networks Computer System Implementation Computer Imaging, Vision, Pattern Recognition and Graphics Computer security Computers Artificial intelligence Computer communication systems Architecture, Computer Optical data processing Künstliche Intelligenz (DE-588)4033447-8 gnd Datensicherung (DE-588)4011144-1 gnd Computersicherheit (DE-588)4274324-2 gnd Kryptologie (DE-588)4033329-2 gnd |
subject_GND | (DE-588)4033447-8 (DE-588)4011144-1 (DE-588)4274324-2 (DE-588)4033329-2 (DE-588)1071861417 |
title | Artificial intelligence and security 6th international conference, ICAIS 2020, Hohhot, China, July 17–20, 2020, proceedings |
title_auth | Artificial intelligence and security 6th international conference, ICAIS 2020, Hohhot, China, July 17–20, 2020, proceedings |
title_exact_search | Artificial intelligence and security 6th international conference, ICAIS 2020, Hohhot, China, July 17–20, 2020, proceedings |
title_exact_search_txtP | Artificial intelligence and security 6th international conference, ICAIS 2020, Hohhot, China, July 17–20, 2020, proceedings |
title_full | Artificial intelligence and security 6th international conference, ICAIS 2020, Hohhot, China, July 17–20, 2020, proceedings Xingming Sun, Jinwei Wang, Elisa Bertino (eds.) |
title_fullStr | Artificial intelligence and security 6th international conference, ICAIS 2020, Hohhot, China, July 17–20, 2020, proceedings Xingming Sun, Jinwei Wang, Elisa Bertino (eds.) |
title_full_unstemmed | Artificial intelligence and security 6th international conference, ICAIS 2020, Hohhot, China, July 17–20, 2020, proceedings Xingming Sun, Jinwei Wang, Elisa Bertino (eds.) |
title_short | Artificial intelligence and security |
title_sort | artificial intelligence and security 6th international conference icais 2020 hohhot china july 17 20 2020 proceedings |
title_sub | 6th international conference, ICAIS 2020, Hohhot, China, July 17–20, 2020, proceedings |
topic | Systems and Data Security Information Systems and Communication Service Artificial Intelligence Computer Communication Networks Computer System Implementation Computer Imaging, Vision, Pattern Recognition and Graphics Computer security Computers Artificial intelligence Computer communication systems Architecture, Computer Optical data processing Künstliche Intelligenz (DE-588)4033447-8 gnd Datensicherung (DE-588)4011144-1 gnd Computersicherheit (DE-588)4274324-2 gnd Kryptologie (DE-588)4033329-2 gnd |
topic_facet | Systems and Data Security Information Systems and Communication Service Artificial Intelligence Computer Communication Networks Computer System Implementation Computer Imaging, Vision, Pattern Recognition and Graphics Computer security Computers Artificial intelligence Computer communication systems Architecture, Computer Optical data processing Künstliche Intelligenz Datensicherung Computersicherheit Kryptologie Konferenzschrift |
work_keys_str_mv | AT sunxingming artificialintelligenceandsecurity6thinternationalconferenceicais2020hohhotchinajuly17202020proceedings AT wangjinwei artificialintelligenceandsecurity6thinternationalconferenceicais2020hohhotchinajuly17202020proceedings AT bertinoelisa artificialintelligenceandsecurity6thinternationalconferenceicais2020hohhotchinajuly17202020proceedings AT icaishohhotonline artificialintelligenceandsecurity6thinternationalconferenceicais2020hohhotchinajuly17202020proceedings |