Cyber security: 19th China Annual Conference, CNCERT 2022, Beijing, China, August 16–17, 2022, revised selected papers
Gespeichert in:
Weitere Verfasser: | , , , , |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Singapore, Singapore
Springer
[2022]
|
Schriftenreihe: | Communications in computer and information science
1699 |
Schlagworte: | |
Online-Zugang: | Volltext Volltext |
Beschreibung: | 1 Online-Ressource |
ISBN: | 9789811982859 |
DOI: | 10.1007/978-981-19-8285-9 |
Internformat
MARC
LEADER | 00000nmm a2200000zcb4500 | ||
---|---|---|---|
001 | BV048637855 | ||
003 | DE-604 | ||
005 | 20230120 | ||
006 | a |||| 10||| | ||
007 | cr|uuu---uuuuu | ||
008 | 230110s2022 |||| o||u| ||||||eng d | ||
020 | |a 9789811982859 |c Online |9 978-981-19-8285-9 | ||
024 | 7 | |a 10.1007/978-981-19-8285-9 |2 doi | |
035 | |a (ZDB-2-SCS)9789811982859 | ||
035 | |a (ZDB-2-SOB)9789811982859 | ||
035 | |a (OCoLC)1357529340 | ||
035 | |a (DE-599)BVBBV048637855 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-525 |a DE-12 |a DE-634 |a DE-210 |a DE-521 |a DE-1102 |a DE-1046 |a DE-1028 |a DE-Aug4 |a DE-1050 |a DE-573 |a DE-M347 |a DE-92 |a DE-1051 |a DE-898 |a DE-859 |a DE-860 |a DE-1049 |a DE-861 |a DE-188 |a DE-863 |a DE-862 |a DE-523 |a DE-Re13 |a DE-Y3 |a DE-255 |a DE-Y7 |a DE-Y2 |a DE-70 |a DE-2174 |a DE-127 |a DE-22 |a DE-155 |a DE-150 |a DE-91 |a DE-384 |a DE-473 |a DE-19 |a DE-355 |a DE-703 |a DE-20 |a DE-706 |a DE-824 |a DE-29 |a DE-739 |a DE-235 | ||
082 | 0 | |a 005.8 |2 23 | |
084 | |a DAT 000 |2 stub | ||
245 | 1 | 0 | |a Cyber security |b 19th China Annual Conference, CNCERT 2022, Beijing, China, August 16–17, 2022, revised selected papers |c Wei Lu, Yuqing Zhang, Weiping Wen, Hanbing Yan, Chao Li (eds.) |
264 | 1 | |a Singapore, Singapore |b Springer |c [2022] | |
300 | |a 1 Online-Ressource | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
490 | 1 | |a Communications in computer and information science |v 1699 | |
650 | 4 | |a Data and Information Security | |
650 | 4 | |a Computer Engineering and Networks | |
650 | 4 | |a Computer Engineering and Networks | |
650 | 4 | |a Artificial Intelligence | |
650 | 4 | |a Legal Aspects of Computing | |
650 | 4 | |a Mobile and Network Security | |
650 | 4 | |a Data protection | |
650 | 4 | |a Computer engineering | |
650 | 4 | |a Computer networks | |
650 | 4 | |a Artificial intelligence | |
650 | 4 | |a Computers—Law and legislation | |
650 | 4 | |a Information technology—Law and legislation | |
650 | 4 | |a Computer networks—Security measures | |
655 | 7 | |0 (DE-588)1071861417 |a Konferenzschrift |y 16.08.2022-17.08.2022 |z Beijing |2 gnd-content | |
700 | 1 | |a Lu, Wei |4 edt | |
700 | 1 | |a Zhang, Yuqing |4 edt | |
700 | 1 | |a Wen, Weiping |4 edt | |
700 | 1 | |a Yan, Hanbing |4 edt | |
700 | 1 | |a Li, Chao |4 edt | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe, Paperback |z 978-981-19-8284-2 |
830 | 0 | |a Communications in computer and information science |v 1699 |w (DE-604)BV041227480 |9 1699 | |
856 | 4 | 0 | |u https://doi.org/10.1007/978-981-19-8285-9 |x Verlag |z kostenfrei |3 Volltext |
856 | 4 | 0 | |u https://directory.doabooks.org/handle/20.500.12854/94987 |x Verlag |z kostenfrei |3 Volltext |
912 | |a ZDB-2-SOB |a ZDB-94-OAB |a ZDB-2-SCS | ||
940 | 1 | |q ZDB-2-SCS_2022 | |
999 | |a oai:aleph.bib-bvb.de:BVB01-034012820 |
Datensatz im Suchindex
DE-BY-FWS_katkey | 1024583 |
---|---|
_version_ | 1806174925718814720 |
adam_txt | |
any_adam_object | |
any_adam_object_boolean | |
author2 | Lu, Wei Zhang, Yuqing Wen, Weiping Yan, Hanbing Li, Chao |
author2_role | edt edt edt edt edt |
author2_variant | w l wl y z yz w w ww h y hy c l cl |
author_facet | Lu, Wei Zhang, Yuqing Wen, Weiping Yan, Hanbing Li, Chao |
building | Verbundindex |
bvnumber | BV048637855 |
classification_tum | DAT 000 |
collection | ZDB-2-SOB ZDB-94-OAB ZDB-2-SCS |
ctrlnum | (ZDB-2-SCS)9789811982859 (ZDB-2-SOB)9789811982859 (OCoLC)1357529340 (DE-599)BVBBV048637855 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
discipline_str_mv | Informatik |
doi_str_mv | 10.1007/978-981-19-8285-9 |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02759nmm a2200625zcb4500</leader><controlfield tag="001">BV048637855</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20230120 </controlfield><controlfield tag="006">a |||| 10||| </controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">230110s2022 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9789811982859</subfield><subfield code="c">Online</subfield><subfield code="9">978-981-19-8285-9</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1007/978-981-19-8285-9</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-2-SCS)9789811982859</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-2-SOB)9789811982859</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1357529340</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV048637855</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-525</subfield><subfield code="a">DE-12</subfield><subfield code="a">DE-634</subfield><subfield code="a">DE-210</subfield><subfield code="a">DE-521</subfield><subfield code="a">DE-1102</subfield><subfield code="a">DE-1046</subfield><subfield code="a">DE-1028</subfield><subfield code="a">DE-Aug4</subfield><subfield code="a">DE-1050</subfield><subfield code="a">DE-573</subfield><subfield code="a">DE-M347</subfield><subfield code="a">DE-92</subfield><subfield code="a">DE-1051</subfield><subfield code="a">DE-898</subfield><subfield code="a">DE-859</subfield><subfield code="a">DE-860</subfield><subfield code="a">DE-1049</subfield><subfield code="a">DE-861</subfield><subfield code="a">DE-188</subfield><subfield code="a">DE-863</subfield><subfield code="a">DE-862</subfield><subfield code="a">DE-523</subfield><subfield code="a">DE-Re13</subfield><subfield code="a">DE-Y3</subfield><subfield code="a">DE-255</subfield><subfield code="a">DE-Y7</subfield><subfield code="a">DE-Y2</subfield><subfield code="a">DE-70</subfield><subfield code="a">DE-2174</subfield><subfield code="a">DE-127</subfield><subfield code="a">DE-22</subfield><subfield code="a">DE-155</subfield><subfield code="a">DE-150</subfield><subfield code="a">DE-91</subfield><subfield code="a">DE-384</subfield><subfield code="a">DE-473</subfield><subfield code="a">DE-19</subfield><subfield code="a">DE-355</subfield><subfield code="a">DE-703</subfield><subfield code="a">DE-20</subfield><subfield code="a">DE-706</subfield><subfield code="a">DE-824</subfield><subfield code="a">DE-29</subfield><subfield code="a">DE-739</subfield><subfield code="a">DE-235</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 000</subfield><subfield code="2">stub</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Cyber security</subfield><subfield code="b">19th China Annual Conference, CNCERT 2022, Beijing, China, August 16–17, 2022, revised selected papers</subfield><subfield code="c">Wei Lu, Yuqing Zhang, Weiping Wen, Hanbing Yan, Chao Li (eds.)</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Singapore, Singapore</subfield><subfield code="b">Springer</subfield><subfield code="c">[2022]</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">Communications in computer and information science</subfield><subfield code="v">1699</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data and Information Security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer Engineering and Networks</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer Engineering and Networks</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Artificial Intelligence</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Legal Aspects of Computing</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Mobile and Network Security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data protection</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer engineering</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks </subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Artificial intelligence</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computers—Law and legislation</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Information technology—Law and legislation</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks—Security measures</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)1071861417</subfield><subfield code="a">Konferenzschrift</subfield><subfield code="y">16.08.2022-17.08.2022</subfield><subfield code="z">Beijing</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Lu, Wei</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Zhang, Yuqing</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Wen, Weiping</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Yan, Hanbing</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Li, Chao</subfield><subfield code="4">edt</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe, Paperback</subfield><subfield code="z">978-981-19-8284-2</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">Communications in computer and information science</subfield><subfield code="v">1699</subfield><subfield code="w">(DE-604)BV041227480</subfield><subfield code="9">1699</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1007/978-981-19-8285-9</subfield><subfield code="x">Verlag</subfield><subfield code="z">kostenfrei</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://directory.doabooks.org/handle/20.500.12854/94987</subfield><subfield code="x">Verlag</subfield><subfield code="z">kostenfrei</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-2-SOB</subfield><subfield code="a">ZDB-94-OAB</subfield><subfield code="a">ZDB-2-SCS</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">ZDB-2-SCS_2022</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-034012820</subfield></datafield></record></collection> |
genre | (DE-588)1071861417 Konferenzschrift 16.08.2022-17.08.2022 Beijing gnd-content |
genre_facet | Konferenzschrift 16.08.2022-17.08.2022 Beijing |
id | DE-604.BV048637855 |
illustrated | Not Illustrated |
index_date | 2024-07-03T21:17:05Z |
indexdate | 2024-08-01T10:57:17Z |
institution | BVB |
isbn | 9789811982859 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-034012820 |
oclc_num | 1357529340 |
open_access_boolean | 1 |
owner | DE-525 DE-12 DE-634 DE-210 DE-521 DE-1102 DE-1046 DE-1028 DE-Aug4 DE-1050 DE-573 DE-M347 DE-92 DE-1051 DE-898 DE-BY-UBR DE-859 DE-860 DE-1049 DE-861 DE-188 DE-863 DE-BY-FWS DE-862 DE-BY-FWS DE-523 DE-Re13 DE-BY-UBR DE-Y3 DE-255 DE-Y7 DE-Y2 DE-70 DE-2174 DE-127 DE-22 DE-BY-UBG DE-155 DE-BY-UBR DE-150 DE-91 DE-BY-TUM DE-384 DE-473 DE-BY-UBG DE-19 DE-BY-UBM DE-355 DE-BY-UBR DE-703 DE-20 DE-706 DE-824 DE-29 DE-739 DE-235 |
owner_facet | DE-525 DE-12 DE-634 DE-210 DE-521 DE-1102 DE-1046 DE-1028 DE-Aug4 DE-1050 DE-573 DE-M347 DE-92 DE-1051 DE-898 DE-BY-UBR DE-859 DE-860 DE-1049 DE-861 DE-188 DE-863 DE-BY-FWS DE-862 DE-BY-FWS DE-523 DE-Re13 DE-BY-UBR DE-Y3 DE-255 DE-Y7 DE-Y2 DE-70 DE-2174 DE-127 DE-22 DE-BY-UBG DE-155 DE-BY-UBR DE-150 DE-91 DE-BY-TUM DE-384 DE-473 DE-BY-UBG DE-19 DE-BY-UBM DE-355 DE-BY-UBR DE-703 DE-20 DE-706 DE-824 DE-29 DE-739 DE-235 |
physical | 1 Online-Ressource |
psigel | ZDB-2-SOB ZDB-94-OAB ZDB-2-SCS ZDB-2-SCS_2022 |
publishDate | 2022 |
publishDateSearch | 2022 |
publishDateSort | 2022 |
publisher | Springer |
record_format | marc |
series | Communications in computer and information science |
series2 | Communications in computer and information science |
spellingShingle | Cyber security 19th China Annual Conference, CNCERT 2022, Beijing, China, August 16–17, 2022, revised selected papers Communications in computer and information science Data and Information Security Computer Engineering and Networks Artificial Intelligence Legal Aspects of Computing Mobile and Network Security Data protection Computer engineering Computer networks Artificial intelligence Computers—Law and legislation Information technology—Law and legislation Computer networks—Security measures |
subject_GND | (DE-588)1071861417 |
title | Cyber security 19th China Annual Conference, CNCERT 2022, Beijing, China, August 16–17, 2022, revised selected papers |
title_auth | Cyber security 19th China Annual Conference, CNCERT 2022, Beijing, China, August 16–17, 2022, revised selected papers |
title_exact_search | Cyber security 19th China Annual Conference, CNCERT 2022, Beijing, China, August 16–17, 2022, revised selected papers |
title_exact_search_txtP | Cyber security 19th China Annual Conference, CNCERT 2022, Beijing, China, August 16–17, 2022, revised selected papers |
title_full | Cyber security 19th China Annual Conference, CNCERT 2022, Beijing, China, August 16–17, 2022, revised selected papers Wei Lu, Yuqing Zhang, Weiping Wen, Hanbing Yan, Chao Li (eds.) |
title_fullStr | Cyber security 19th China Annual Conference, CNCERT 2022, Beijing, China, August 16–17, 2022, revised selected papers Wei Lu, Yuqing Zhang, Weiping Wen, Hanbing Yan, Chao Li (eds.) |
title_full_unstemmed | Cyber security 19th China Annual Conference, CNCERT 2022, Beijing, China, August 16–17, 2022, revised selected papers Wei Lu, Yuqing Zhang, Weiping Wen, Hanbing Yan, Chao Li (eds.) |
title_short | Cyber security |
title_sort | cyber security 19th china annual conference cncert 2022 beijing china august 16 17 2022 revised selected papers |
title_sub | 19th China Annual Conference, CNCERT 2022, Beijing, China, August 16–17, 2022, revised selected papers |
topic | Data and Information Security Computer Engineering and Networks Artificial Intelligence Legal Aspects of Computing Mobile and Network Security Data protection Computer engineering Computer networks Artificial intelligence Computers—Law and legislation Information technology—Law and legislation Computer networks—Security measures |
topic_facet | Data and Information Security Computer Engineering and Networks Artificial Intelligence Legal Aspects of Computing Mobile and Network Security Data protection Computer engineering Computer networks Artificial intelligence Computers—Law and legislation Information technology—Law and legislation Computer networks—Security measures Konferenzschrift 16.08.2022-17.08.2022 Beijing |
url | https://doi.org/10.1007/978-981-19-8285-9 https://directory.doabooks.org/handle/20.500.12854/94987 |
volume_link | (DE-604)BV041227480 |
work_keys_str_mv | AT luwei cybersecurity19thchinaannualconferencecncert2022beijingchinaaugust16172022revisedselectedpapers AT zhangyuqing cybersecurity19thchinaannualconferencecncert2022beijingchinaaugust16172022revisedselectedpapers AT wenweiping cybersecurity19thchinaannualconferencecncert2022beijingchinaaugust16172022revisedselectedpapers AT yanhanbing cybersecurity19thchinaannualconferencecncert2022beijingchinaaugust16172022revisedselectedpapers AT lichao cybersecurity19thchinaannualconferencecncert2022beijingchinaaugust16172022revisedselectedpapers |