Attacks and defenses for the Internet-of-Things: 5th international workshop, ADIoT 2022, Copenhagen, Denmark, September 30, 2022 : revised selected papers
Gespeichert in:
Weitere Verfasser: | , , |
---|---|
Format: | Tagungsbericht Buch |
Sprache: | English |
Veröffentlicht: |
Cham
Springer
[2022]
|
Schriftenreihe: | Lecture notes in computer science
13745 |
Schlagworte: | |
Beschreibung: | x, 177 Seiten Illustrationen, Diagramme |
ISBN: | 9783031213106 |
Internformat
MARC
LEADER | 00000nam a2200000zcb4500 | ||
---|---|---|---|
001 | BV048801009 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | t | ||
008 | 230206s2022 a||| |||| 10||| eng d | ||
020 | |a 9783031213106 |9 978-3-031-21310-6 | ||
035 | |a (OCoLC)1369555625 | ||
035 | |a (DE-599)BVBBV048801009 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-83 | ||
082 | 0 | |a 004.678 |2 23 | |
084 | |a SS 4800 |0 (DE-625)143528: |2 rvk | ||
084 | |a DAT 000 |2 stub | ||
245 | 1 | 0 | |a Attacks and defenses for the Internet-of-Things |b 5th international workshop, ADIoT 2022, Copenhagen, Denmark, September 30, 2022 : revised selected papers |c Wenjuan Li, Steven Furnell, Weizhi Meng (eds.) |
264 | 1 | |a Cham |b Springer |c [2022] | |
264 | 4 | |c © 2022 | |
300 | |a x, 177 Seiten |b Illustrationen, Diagramme | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
490 | 1 | |a Lecture notes in computer science |v 13745 | |
650 | 4 | |a Internet of Things | |
650 | 4 | |a Computer Communication Networks | |
650 | 4 | |a Computing Milieux | |
650 | 4 | |a Cryptology | |
650 | 4 | |a Mobile and Network Security | |
650 | 4 | |a Software Engineering | |
650 | 4 | |a Internet of things | |
650 | 4 | |a Computer networks | |
650 | 4 | |a Computers | |
650 | 4 | |a Cryptography | |
650 | 4 | |a Data encryption (Computer science) | |
650 | 4 | |a Computer networks—Security measures | |
650 | 4 | |a Software engineering | |
655 | 7 | |0 (DE-588)1071861417 |a Konferenzschrift |y 2022 |z Kopenhagen |2 gnd-content | |
700 | 1 | |a Li, Wenjuan |0 (DE-588)1224418077 |4 edt | |
700 | 1 | |a Furnell, Steven |4 edt | |
700 | 1 | |a Meng, Weizhi |d 1986- |0 (DE-588)1202716857 |4 edt | |
711 | 2 | |a International Workshop on Attacks and Defenses for Internet-of-Things |n 5. |d 2022 |c Kopenhagen, Online |j Sonstige |0 (DE-588)1280161337 |4 oth | |
776 | 0 | 8 | |i Erscheint auch als |n Online-Ausgabe |z 978-3-031-21311-3 |
830 | 0 | |a Lecture notes in computer science |v 13745 |w (DE-604)BV000000607 |9 13745 | |
999 | |a oai:aleph.bib-bvb.de:BVB01-034067132 |
Datensatz im Suchindex
_version_ | 1804184875748556800 |
---|---|
adam_txt | |
any_adam_object | |
any_adam_object_boolean | |
author2 | Li, Wenjuan Furnell, Steven Meng, Weizhi 1986- |
author2_role | edt edt edt |
author2_variant | w l wl s f sf w m wm |
author_GND | (DE-588)1224418077 (DE-588)1202716857 |
author_facet | Li, Wenjuan Furnell, Steven Meng, Weizhi 1986- |
building | Verbundindex |
bvnumber | BV048801009 |
classification_rvk | SS 4800 |
classification_tum | DAT 000 |
ctrlnum | (OCoLC)1369555625 (DE-599)BVBBV048801009 |
dewey-full | 004.678 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 004 - Computer science |
dewey-raw | 004.678 |
dewey-search | 004.678 |
dewey-sort | 14.678 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
discipline_str_mv | Informatik |
format | Conference Proceeding Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02040nam a2200541zcb4500</leader><controlfield tag="001">BV048801009</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">230206s2022 a||| |||| 10||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783031213106</subfield><subfield code="9">978-3-031-21310-6</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1369555625</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV048801009</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-83</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">004.678</subfield><subfield code="2">23</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">SS 4800</subfield><subfield code="0">(DE-625)143528:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 000</subfield><subfield code="2">stub</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Attacks and defenses for the Internet-of-Things</subfield><subfield code="b">5th international workshop, ADIoT 2022, Copenhagen, Denmark, September 30, 2022 : revised selected papers</subfield><subfield code="c">Wenjuan Li, Steven Furnell, Weizhi Meng (eds.)</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Cham</subfield><subfield code="b">Springer</subfield><subfield code="c">[2022]</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">© 2022</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">x, 177 Seiten</subfield><subfield code="b">Illustrationen, Diagramme</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">Lecture notes in computer science</subfield><subfield code="v">13745</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Internet of Things</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer Communication Networks</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computing Milieux</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cryptology</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Mobile and Network Security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Software Engineering</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Internet of things</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks </subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computers</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cryptography</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data encryption (Computer science)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks—Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Software engineering</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)1071861417</subfield><subfield code="a">Konferenzschrift</subfield><subfield code="y">2022</subfield><subfield code="z">Kopenhagen</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Li, Wenjuan</subfield><subfield code="0">(DE-588)1224418077</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Furnell, Steven</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Meng, Weizhi</subfield><subfield code="d">1986-</subfield><subfield code="0">(DE-588)1202716857</subfield><subfield code="4">edt</subfield></datafield><datafield tag="711" ind1="2" ind2=" "><subfield code="a">International Workshop on Attacks and Defenses for Internet-of-Things</subfield><subfield code="n">5.</subfield><subfield code="d">2022</subfield><subfield code="c">Kopenhagen, Online</subfield><subfield code="j">Sonstige</subfield><subfield code="0">(DE-588)1280161337</subfield><subfield code="4">oth</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Online-Ausgabe</subfield><subfield code="z">978-3-031-21311-3</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">Lecture notes in computer science</subfield><subfield code="v">13745</subfield><subfield code="w">(DE-604)BV000000607</subfield><subfield code="9">13745</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-034067132</subfield></datafield></record></collection> |
genre | (DE-588)1071861417 Konferenzschrift 2022 Kopenhagen gnd-content |
genre_facet | Konferenzschrift 2022 Kopenhagen |
id | DE-604.BV048801009 |
illustrated | Illustrated |
index_date | 2024-07-03T21:27:48Z |
indexdate | 2024-07-10T09:46:18Z |
institution | BVB |
institution_GND | (DE-588)1280161337 |
isbn | 9783031213106 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-034067132 |
oclc_num | 1369555625 |
open_access_boolean | |
owner | DE-83 |
owner_facet | DE-83 |
physical | x, 177 Seiten Illustrationen, Diagramme |
publishDate | 2022 |
publishDateSearch | 2022 |
publishDateSort | 2022 |
publisher | Springer |
record_format | marc |
series | Lecture notes in computer science |
series2 | Lecture notes in computer science |
spelling | Attacks and defenses for the Internet-of-Things 5th international workshop, ADIoT 2022, Copenhagen, Denmark, September 30, 2022 : revised selected papers Wenjuan Li, Steven Furnell, Weizhi Meng (eds.) Cham Springer [2022] © 2022 x, 177 Seiten Illustrationen, Diagramme txt rdacontent n rdamedia nc rdacarrier Lecture notes in computer science 13745 Internet of Things Computer Communication Networks Computing Milieux Cryptology Mobile and Network Security Software Engineering Internet of things Computer networks Computers Cryptography Data encryption (Computer science) Computer networks—Security measures Software engineering (DE-588)1071861417 Konferenzschrift 2022 Kopenhagen gnd-content Li, Wenjuan (DE-588)1224418077 edt Furnell, Steven edt Meng, Weizhi 1986- (DE-588)1202716857 edt International Workshop on Attacks and Defenses for Internet-of-Things 5. 2022 Kopenhagen, Online Sonstige (DE-588)1280161337 oth Erscheint auch als Online-Ausgabe 978-3-031-21311-3 Lecture notes in computer science 13745 (DE-604)BV000000607 13745 |
spellingShingle | Attacks and defenses for the Internet-of-Things 5th international workshop, ADIoT 2022, Copenhagen, Denmark, September 30, 2022 : revised selected papers Lecture notes in computer science Internet of Things Computer Communication Networks Computing Milieux Cryptology Mobile and Network Security Software Engineering Internet of things Computer networks Computers Cryptography Data encryption (Computer science) Computer networks—Security measures Software engineering |
subject_GND | (DE-588)1071861417 |
title | Attacks and defenses for the Internet-of-Things 5th international workshop, ADIoT 2022, Copenhagen, Denmark, September 30, 2022 : revised selected papers |
title_auth | Attacks and defenses for the Internet-of-Things 5th international workshop, ADIoT 2022, Copenhagen, Denmark, September 30, 2022 : revised selected papers |
title_exact_search | Attacks and defenses for the Internet-of-Things 5th international workshop, ADIoT 2022, Copenhagen, Denmark, September 30, 2022 : revised selected papers |
title_exact_search_txtP | Attacks and defenses for the Internet-of-Things 5th international workshop, ADIoT 2022, Copenhagen, Denmark, September 30, 2022 : revised selected papers |
title_full | Attacks and defenses for the Internet-of-Things 5th international workshop, ADIoT 2022, Copenhagen, Denmark, September 30, 2022 : revised selected papers Wenjuan Li, Steven Furnell, Weizhi Meng (eds.) |
title_fullStr | Attacks and defenses for the Internet-of-Things 5th international workshop, ADIoT 2022, Copenhagen, Denmark, September 30, 2022 : revised selected papers Wenjuan Li, Steven Furnell, Weizhi Meng (eds.) |
title_full_unstemmed | Attacks and defenses for the Internet-of-Things 5th international workshop, ADIoT 2022, Copenhagen, Denmark, September 30, 2022 : revised selected papers Wenjuan Li, Steven Furnell, Weizhi Meng (eds.) |
title_short | Attacks and defenses for the Internet-of-Things |
title_sort | attacks and defenses for the internet of things 5th international workshop adiot 2022 copenhagen denmark september 30 2022 revised selected papers |
title_sub | 5th international workshop, ADIoT 2022, Copenhagen, Denmark, September 30, 2022 : revised selected papers |
topic | Internet of Things Computer Communication Networks Computing Milieux Cryptology Mobile and Network Security Software Engineering Internet of things Computer networks Computers Cryptography Data encryption (Computer science) Computer networks—Security measures Software engineering |
topic_facet | Internet of Things Computer Communication Networks Computing Milieux Cryptology Mobile and Network Security Software Engineering Internet of things Computer networks Computers Cryptography Data encryption (Computer science) Computer networks—Security measures Software engineering Konferenzschrift 2022 Kopenhagen |
volume_link | (DE-604)BV000000607 |
work_keys_str_mv | AT liwenjuan attacksanddefensesfortheinternetofthings5thinternationalworkshopadiot2022copenhagendenmarkseptember302022revisedselectedpapers AT furnellsteven attacksanddefensesfortheinternetofthings5thinternationalworkshopadiot2022copenhagendenmarkseptember302022revisedselectedpapers AT mengweizhi attacksanddefensesfortheinternetofthings5thinternationalworkshopadiot2022copenhagendenmarkseptember302022revisedselectedpapers AT internationalworkshoponattacksanddefensesforinternetofthingskopenhagenonline attacksanddefensesfortheinternetofthings5thinternationalworkshopadiot2022copenhagendenmarkseptember302022revisedselectedpapers |