Ubiquitous Security: Second International Conference, UbiSec 2022, Zhangjiajie, China, December 28–31, 2022, Revised Selected Papers
Gespeichert in:
Weitere Verfasser: | , , , |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Singapore
Springer Nature Singapore
2023
Singapore Springer |
Ausgabe: | 1st ed. 2023 |
Schriftenreihe: | Communications in Computer and Information Science
1768 |
Schlagworte: | |
Online-Zugang: | DE-522 DE-634 DE-858 DE-Aug4 DE-1050 DE-573 DE-M347 DE-92 DE-898 DE-859 DE-860 DE-1049 DE-861 DE-863 DE-862 DE-523 DE-384 DE-473 DE-19 DE-355 DE-703 DE-20 DE-706 DE-824 DE-29 DE-739 URL des Erstveröffentlichers |
Beschreibung: | 1 Online-Ressource (XIX, 558 p. 199 illus., 155 illus. in color) |
ISBN: | 9789819902729 |
ISSN: | 1865-0937 |
DOI: | 10.1007/978-981-99-0272-9 |
Internformat
MARC
LEADER | 00000nmm a2200000zcb4500 | ||
---|---|---|---|
001 | BV048837057 | ||
003 | DE-604 | ||
005 | 20240717 | ||
007 | cr|uuu---uuuuu | ||
008 | 230301s2023 |||| o||u| ||||||eng d | ||
020 | |a 9789819902729 |c Online |9 978-981-9902-72-9 | ||
024 | 7 | |a 10.1007/978-981-99-0272-9 |2 doi | |
035 | |a (ZDB-2-SCS)9789819902729 | ||
035 | |a (OCoLC)1372477025 | ||
035 | |a (DE-599)BVBBV048837057 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-860 |a DE-19 |a DE-858 |a DE-Aug4 |a DE-898 |a DE-861 |a DE-188 |a DE-523 |a DE-1049 |a DE-859 |a DE-473 |a DE-29 |a DE-863 |a DE-1050 |a DE-20 |a DE-862 |a DE-92 |a DE-355 |a DE-824 |a DE-522 |a DE-384 |a DE-M347 |a DE-573 |a DE-703 |a DE-706 |a DE-739 |a DE-634 | ||
082 | 0 | |a 005.3 |2 23 | |
084 | |a DAT 000 |2 stub | ||
245 | 1 | 0 | |a Ubiquitous Security |b Second International Conference, UbiSec 2022, Zhangjiajie, China, December 28–31, 2022, Revised Selected Papers |c edited by Guojun Wang, Kim-Kwang Raymond Choo, Jie Wu, Ernesto Damiani |
250 | |a 1st ed. 2023 | ||
264 | 1 | |a Singapore |b Springer Nature Singapore |c 2023 | |
264 | 1 | |a Singapore |b Springer | |
300 | |a 1 Online-Ressource (XIX, 558 p. 199 illus., 155 illus. in color) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
490 | 0 | |a Communications in Computer and Information Science |v 1768 |x 1865-0937 | |
650 | 4 | |a Computer and Information Systems Applications | |
650 | 4 | |a Artificial Intelligence | |
650 | 4 | |a Data and Information Security | |
650 | 4 | |a Computer Engineering and Networks | |
650 | 4 | |a Computer Application in Social and Behavioral Sciences | |
650 | 4 | |a Application software | |
650 | 4 | |a Artificial intelligence | |
650 | 4 | |a Data protection | |
650 | 4 | |a Computer engineering | |
650 | 4 | |a Computer networks | |
650 | 4 | |a Social sciences—Data processing | |
700 | 1 | |a Wang, Guojun |4 edt | |
700 | 1 | |a Choo, Kim-Kwang Raymond |4 edt | |
700 | 1 | |a Wu, Jie |4 edt | |
700 | 1 | |a Damiani, Ernesto |4 edt | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 978-981-9902-71-2 |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 978-981-9902-73-6 |
856 | 4 | 0 | |u https://doi.org/10.1007/978-981-99-0272-9 |x Verlag |z URL des Erstveröffentlichers |3 Volltext |
912 | |a ZDB-2-SCS | ||
940 | 1 | |q ZDB-2-SCS_2023 | |
943 | 1 | |a oai:aleph.bib-bvb.de:BVB01-034102550 | |
966 | e | |u https://doi.org/10.1007/978-981-99-0272-9 |l DE-522 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-981-99-0272-9 |l DE-634 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-981-99-0272-9 |l DE-858 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-981-99-0272-9 |l DE-Aug4 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-981-99-0272-9 |l DE-1050 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-981-99-0272-9 |l DE-573 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-981-99-0272-9 |l DE-M347 |p ZDB-2-SCS |q FHM_PDA_SCS_Kauf |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-981-99-0272-9 |l DE-92 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-981-99-0272-9 |l DE-898 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-981-99-0272-9 |l DE-859 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-981-99-0272-9 |l DE-860 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-981-99-0272-9 |l DE-1049 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-981-99-0272-9 |l DE-861 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-981-99-0272-9 |l DE-863 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-981-99-0272-9 |l DE-862 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-981-99-0272-9 |l DE-523 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-981-99-0272-9 |l DE-384 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-981-99-0272-9 |l DE-473 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-981-99-0272-9 |l DE-19 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-981-99-0272-9 |l DE-355 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-981-99-0272-9 |l DE-703 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-981-99-0272-9 |l DE-20 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-981-99-0272-9 |l DE-706 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-981-99-0272-9 |l DE-824 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-981-99-0272-9 |l DE-29 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-981-99-0272-9 |l DE-739 |p ZDB-2-SCS |x Verlag |3 Volltext |
Datensatz im Suchindex
DE-BY-FWS_katkey | 1032181 |
---|---|
_version_ | 1806527536370286592 |
adam_text | |
adam_txt | |
any_adam_object | |
any_adam_object_boolean | |
author2 | Wang, Guojun Choo, Kim-Kwang Raymond Wu, Jie Damiani, Ernesto |
author2_role | edt edt edt edt |
author2_variant | g w gw k k r c kkr kkrc j w jw e d ed |
author_facet | Wang, Guojun Choo, Kim-Kwang Raymond Wu, Jie Damiani, Ernesto |
building | Verbundindex |
bvnumber | BV048837057 |
classification_tum | DAT 000 |
collection | ZDB-2-SCS |
ctrlnum | (ZDB-2-SCS)9789819902729 (OCoLC)1372477025 (DE-599)BVBBV048837057 |
dewey-full | 005.3 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.3 |
dewey-search | 005.3 |
dewey-sort | 15.3 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
discipline_str_mv | Informatik |
doi_str_mv | 10.1007/978-981-99-0272-9 |
edition | 1st ed. 2023 |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>00000nmm a2200000zcb4500</leader><controlfield tag="001">BV048837057</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20240717</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">230301s2023 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9789819902729</subfield><subfield code="c">Online</subfield><subfield code="9">978-981-9902-72-9</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1007/978-981-99-0272-9</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-2-SCS)9789819902729</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1372477025</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV048837057</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-860</subfield><subfield code="a">DE-19</subfield><subfield code="a">DE-858</subfield><subfield code="a">DE-Aug4</subfield><subfield code="a">DE-898</subfield><subfield code="a">DE-861</subfield><subfield code="a">DE-188</subfield><subfield code="a">DE-523</subfield><subfield code="a">DE-1049</subfield><subfield code="a">DE-859</subfield><subfield code="a">DE-473</subfield><subfield code="a">DE-29</subfield><subfield code="a">DE-863</subfield><subfield code="a">DE-1050</subfield><subfield code="a">DE-20</subfield><subfield code="a">DE-862</subfield><subfield code="a">DE-92</subfield><subfield code="a">DE-355</subfield><subfield code="a">DE-824</subfield><subfield code="a">DE-522</subfield><subfield code="a">DE-384</subfield><subfield code="a">DE-M347</subfield><subfield code="a">DE-573</subfield><subfield code="a">DE-703</subfield><subfield code="a">DE-706</subfield><subfield code="a">DE-739</subfield><subfield code="a">DE-634</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.3</subfield><subfield code="2">23</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 000</subfield><subfield code="2">stub</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Ubiquitous Security</subfield><subfield code="b">Second International Conference, UbiSec 2022, Zhangjiajie, China, December 28–31, 2022, Revised Selected Papers</subfield><subfield code="c">edited by Guojun Wang, Kim-Kwang Raymond Choo, Jie Wu, Ernesto Damiani</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">1st ed. 2023</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Singapore</subfield><subfield code="b">Springer Nature Singapore</subfield><subfield code="c">2023</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Singapore</subfield><subfield code="b">Springer</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (XIX, 558 p. 199 illus., 155 illus. in color)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">Communications in Computer and Information Science</subfield><subfield code="v">1768</subfield><subfield code="x">1865-0937</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer and Information Systems Applications</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Artificial Intelligence</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data and Information Security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer Engineering and Networks</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer Application in Social and Behavioral Sciences</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Application software</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Artificial intelligence</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data protection</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer engineering</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks </subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Social sciences—Data processing</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Wang, Guojun</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Choo, Kim-Kwang Raymond</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Wu, Jie</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Damiani, Ernesto</subfield><subfield code="4">edt</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">978-981-9902-71-2</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">978-981-9902-73-6</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1007/978-981-99-0272-9</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Erstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-2-SCS</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">ZDB-2-SCS_2023</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-034102550</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-981-99-0272-9</subfield><subfield code="l">DE-522</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-981-99-0272-9</subfield><subfield code="l">DE-634</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-981-99-0272-9</subfield><subfield code="l">DE-858</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-981-99-0272-9</subfield><subfield code="l">DE-Aug4</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-981-99-0272-9</subfield><subfield code="l">DE-1050</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-981-99-0272-9</subfield><subfield code="l">DE-573</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-981-99-0272-9</subfield><subfield code="l">DE-M347</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="q">FHM_PDA_SCS_Kauf</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-981-99-0272-9</subfield><subfield code="l">DE-92</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-981-99-0272-9</subfield><subfield code="l">DE-898</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-981-99-0272-9</subfield><subfield code="l">DE-859</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-981-99-0272-9</subfield><subfield code="l">DE-860</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-981-99-0272-9</subfield><subfield code="l">DE-1049</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-981-99-0272-9</subfield><subfield code="l">DE-861</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-981-99-0272-9</subfield><subfield code="l">DE-863</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-981-99-0272-9</subfield><subfield code="l">DE-862</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-981-99-0272-9</subfield><subfield code="l">DE-523</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-981-99-0272-9</subfield><subfield code="l">DE-384</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-981-99-0272-9</subfield><subfield code="l">DE-473</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-981-99-0272-9</subfield><subfield code="l">DE-19</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-981-99-0272-9</subfield><subfield code="l">DE-355</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-981-99-0272-9</subfield><subfield code="l">DE-703</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-981-99-0272-9</subfield><subfield code="l">DE-20</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-981-99-0272-9</subfield><subfield code="l">DE-706</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-981-99-0272-9</subfield><subfield code="l">DE-824</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-981-99-0272-9</subfield><subfield code="l">DE-29</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-981-99-0272-9</subfield><subfield code="l">DE-739</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV048837057 |
illustrated | Not Illustrated |
index_date | 2024-07-03T21:36:45Z |
indexdate | 2024-08-05T08:21:52Z |
institution | BVB |
isbn | 9789819902729 |
issn | 1865-0937 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-034102550 |
oclc_num | 1372477025 |
open_access_boolean | |
owner | DE-860 DE-19 DE-BY-UBM DE-858 DE-Aug4 DE-898 DE-BY-UBR DE-861 DE-188 DE-523 DE-1049 DE-859 DE-473 DE-BY-UBG DE-29 DE-863 DE-BY-FWS DE-1050 DE-20 DE-862 DE-BY-FWS DE-92 DE-355 DE-BY-UBR DE-824 DE-522 DE-384 DE-M347 DE-573 DE-703 DE-706 DE-739 DE-634 |
owner_facet | DE-860 DE-19 DE-BY-UBM DE-858 DE-Aug4 DE-898 DE-BY-UBR DE-861 DE-188 DE-523 DE-1049 DE-859 DE-473 DE-BY-UBG DE-29 DE-863 DE-BY-FWS DE-1050 DE-20 DE-862 DE-BY-FWS DE-92 DE-355 DE-BY-UBR DE-824 DE-522 DE-384 DE-M347 DE-573 DE-703 DE-706 DE-739 DE-634 |
physical | 1 Online-Ressource (XIX, 558 p. 199 illus., 155 illus. in color) |
psigel | ZDB-2-SCS ZDB-2-SCS_2023 ZDB-2-SCS FHM_PDA_SCS_Kauf |
publishDate | 2023 |
publishDateSearch | 2023 |
publishDateSort | 2023 |
publisher | Springer Nature Singapore Springer |
record_format | marc |
series2 | Communications in Computer and Information Science |
spellingShingle | Ubiquitous Security Second International Conference, UbiSec 2022, Zhangjiajie, China, December 28–31, 2022, Revised Selected Papers Computer and Information Systems Applications Artificial Intelligence Data and Information Security Computer Engineering and Networks Computer Application in Social and Behavioral Sciences Application software Artificial intelligence Data protection Computer engineering Computer networks Social sciences—Data processing |
title | Ubiquitous Security Second International Conference, UbiSec 2022, Zhangjiajie, China, December 28–31, 2022, Revised Selected Papers |
title_auth | Ubiquitous Security Second International Conference, UbiSec 2022, Zhangjiajie, China, December 28–31, 2022, Revised Selected Papers |
title_exact_search | Ubiquitous Security Second International Conference, UbiSec 2022, Zhangjiajie, China, December 28–31, 2022, Revised Selected Papers |
title_exact_search_txtP | Ubiquitous Security Second International Conference, UbiSec 2022, Zhangjiajie, China, December 28–31, 2022, Revised Selected Papers |
title_full | Ubiquitous Security Second International Conference, UbiSec 2022, Zhangjiajie, China, December 28–31, 2022, Revised Selected Papers edited by Guojun Wang, Kim-Kwang Raymond Choo, Jie Wu, Ernesto Damiani |
title_fullStr | Ubiquitous Security Second International Conference, UbiSec 2022, Zhangjiajie, China, December 28–31, 2022, Revised Selected Papers edited by Guojun Wang, Kim-Kwang Raymond Choo, Jie Wu, Ernesto Damiani |
title_full_unstemmed | Ubiquitous Security Second International Conference, UbiSec 2022, Zhangjiajie, China, December 28–31, 2022, Revised Selected Papers edited by Guojun Wang, Kim-Kwang Raymond Choo, Jie Wu, Ernesto Damiani |
title_short | Ubiquitous Security |
title_sort | ubiquitous security second international conference ubisec 2022 zhangjiajie china december 28 31 2022 revised selected papers |
title_sub | Second International Conference, UbiSec 2022, Zhangjiajie, China, December 28–31, 2022, Revised Selected Papers |
topic | Computer and Information Systems Applications Artificial Intelligence Data and Information Security Computer Engineering and Networks Computer Application in Social and Behavioral Sciences Application software Artificial intelligence Data protection Computer engineering Computer networks Social sciences—Data processing |
topic_facet | Computer and Information Systems Applications Artificial Intelligence Data and Information Security Computer Engineering and Networks Computer Application in Social and Behavioral Sciences Application software Artificial intelligence Data protection Computer engineering Computer networks Social sciences—Data processing |
url | https://doi.org/10.1007/978-981-99-0272-9 |
work_keys_str_mv | AT wangguojun ubiquitoussecuritysecondinternationalconferenceubisec2022zhangjiajiechinadecember28312022revisedselectedpapers AT chookimkwangraymond ubiquitoussecuritysecondinternationalconferenceubisec2022zhangjiajiechinadecember28312022revisedselectedpapers AT wujie ubiquitoussecuritysecondinternationalconferenceubisec2022zhangjiajiechinadecember28312022revisedselectedpapers AT damianiernesto ubiquitoussecuritysecondinternationalconferenceubisec2022zhangjiajiechinadecember28312022revisedselectedpapers |