Catalog
LDR | 04327nam a22007215i 4500 | ||
001 | 0100561768▲ | ||
003 | DE-He213▲ | ||
005 | 20230320144816▲ | ||
007 | cr nn 008mamaa▲ | ||
008 | 210118s2020 si | s |||| 0|eng d▲ | ||
020 | ▼a9789813349223▼9978-981-33-4922-3▲ | ||
024 | 7 | ▼a10.1007/978-981-33-4922-3▼2doi▲ | |
050 | 4 | ▼aQA76.9.A25▲ | |
082 | 0 | 4 | ▼a005.8▼223▲ |
245 | 1 | 0 | ▼aCyber Security▼h[electronic resource] :▼b17th China Annual Conference, CNCERT 2020, Beijing, China, August 12, 2020, Revised Selected Papers /▼cedited by Wei Lu, Qiaoyan Wen, Yuqing Zhang, Bo Lang, Weiping Wen, Hanbing Yan, Chao Li, Li Ding, Ruiguang Li, Yu Zhou.▲ |
250 | ▼a1st ed. 2020.▲ | ||
264 | 1 | ▼aSingapore :▼bSpringer Singapore :▼bImprint: Springer,▼c2020.▲ | |
300 | ▼aX, 235 p. 108 illus., 70 illus. in color :▼bonline resource.▲ | ||
336 | ▼atext▼btxt▼2rdacontent▲ | ||
337 | ▼acomputer▼bc▼2rdamedia▲ | ||
338 | ▼aonline resource▼bcr▼2rdacarrier▲ | ||
347 | ▼atext file▼bPDF▼2rda▲ | ||
490 | 1 | ▼aCommunications in Computer and Information Science, ▼x1865-0929 ;▼v1299▲ | |
505 | 0 | ▼aAccess Control -- Cryptography -- Denial-of-Service Attacks -- Hardware Security Implementation -- Intrusion/Anomaly Detection and Malware Mitigation -- Social Network Security and Privacy.-Systems Security.▲ | |
506 | 0 | ▼aOpen Access▲ | |
520 | ▼aThis open access book constitutes the refereed proceedings of the 16th International Annual Conference on Cyber Security, CNCERT 2020, held in Beijing, China, in August 2020. The 17 papers presented were carefully reviewed and selected from 58 submissions. The papers are organized according to the following topical sections: access control; cryptography; denial-of-service attacks; hardware security implementation; intrusion/anomaly detection and malware mitigation; social network security and privacy; systems security.▲ | ||
650 | 0 | ▼aComputer security.▲ | |
650 | 0 | ▼aComputer communication systems.▲ | |
650 | 0 | ▼aApplication software.▲ | |
650 | 0 | ▼aArchitecture, Computer.▲ | |
650 | 0 | ▼aData encryption (Computer science).▲ | |
650 | 0 | ▼aComputer networks▼xSecurity measures.▲ | |
650 | 1 | 4 | ▼aSystems and Data Security.▼0https://scigraph.springernature.com/ontologies/product-market-codes/I28060▲ |
650 | 2 | 4 | ▼aComputer Communication Networks.▼0https://scigraph.springernature.com/ontologies/product-market-codes/I13022▲ |
650 | 2 | 4 | ▼aInformation Systems Applications (incl. Internet).▼0https://scigraph.springernature.com/ontologies/product-market-codes/I18040▲ |
650 | 2 | 4 | ▼aComputer System Implementation.▼0https://scigraph.springernature.com/ontologies/product-market-codes/I13057▲ |
650 | 2 | 4 | ▼aCryptology.▼0https://scigraph.springernature.com/ontologies/product-market-codes/I28020▲ |
650 | 2 | 4 | ▼aMobile and Network Security.▼0https://scigraph.springernature.com/ontologies/product-market-codes/I28050▲ |
700 | 1 | ▼aLu, Wei.▼eeditor.▼4edt▼4http://id.loc.gov/vocabulary/relators/edt▲ | |
700 | 1 | ▼aWen, Qiaoyan.▼eeditor.▼4edt▼4http://id.loc.gov/vocabulary/relators/edt▲ | |
700 | 1 | ▼aZhang, Yuqing.▼eeditor.▼4edt▼4http://id.loc.gov/vocabulary/relators/edt▲ | |
700 | 1 | ▼aLang, Bo.▼eeditor.▼4edt▼4http://id.loc.gov/vocabulary/relators/edt▲ | |
700 | 1 | ▼aWen, Weiping.▼eeditor.▼4edt▼4http://id.loc.gov/vocabulary/relators/edt▲ | |
700 | 1 | ▼aYan, Hanbing.▼eeditor.▼4edt▼4http://id.loc.gov/vocabulary/relators/edt▲ | |
700 | 1 | ▼aLi, Chao.▼eeditor.▼4edt▼4http://id.loc.gov/vocabulary/relators/edt▲ | |
700 | 1 | ▼aDing, Li.▼eeditor.▼4edt▼4http://id.loc.gov/vocabulary/relators/edt▲ | |
700 | 1 | ▼aLi, Ruiguang.▼eeditor.▼4edt▼4http://id.loc.gov/vocabulary/relators/edt▲ | |
700 | 1 | ▼aZhou, Yu.▼eeditor.▼4edt▼4http://id.loc.gov/vocabulary/relators/edt▲ | |
710 | 2 | ▼aSpringerLink (Online service)▲ | |
773 | 0 | ▼tSpringer Nature eBook▲ | |
776 | 0 | 8 | ▼iPrinted edition:▼z9789813349216▲ |
776 | 0 | 8 | ▼iPrinted edition:▼z9789813349230▲ |
830 | 0 | ▼aCommunications in Computer and Information Science,▼x1865-0929 ;▼v1299▲ | |
856 | 4 | 0 | ▼uhttps://doi.org/10.1007/978-981-33-4922-3▲ |

Cyber Security : 17th China Annual Conference, CNCERT 2020, Beijing, China, August 12, 2020, Revised Selected Papers
Document Type
국외eBook
Title
Cyber Security [electronic resource] : 17th China Annual Conference, CNCERT 2020, Beijing, China, August 12, 2020, Revised Selected Papers / edited by Wei Lu, Qiaoyan Wen, Yuqing Zhang, Bo Lang, Weiping Wen, Hanbing Yan, Chao Li, Li Ding, Ruiguang Li, Yu Zhou.
Author
Corporate Name
Edition
1st ed. 2020.
Physical Description
X, 235 p. 108 illus., 70 illus. in color : online resource.
Series Title
Communications in Computer and Information Science , 1865-0929 ; 1299
Communications in Computer and Information Science , 1865-0929 ; 1299
Communications in Computer and Information Science , 1865-0929 ; 1299
Formatted Contents Note
Access Control -- Cryptography -- Denial-of-Service Attacks -- Hardware Security Implementation -- Intrusion/Anomaly Detection and Malware Mitigation -- Social Network Security and Privacy.-Systems Security.
Summary Note
This open access book constitutes the refereed proceedings of the 16th International Annual Conference on Cyber Security, CNCERT 2020, held in Beijing, China, in August 2020. The 17 papers presented were carefully reviewed and selected from 58 submissions. The papers are organized according to the following topical sections: access control; cryptography; denial-of-service attacks; hardware security implementation; intrusion/anomaly detection and malware mitigation; social network security and privacy; systems security.
Subject
Computer security.
Computer communication systems.
Application software.
Architecture, Computer.
Data encryption (Computer science).
Computer networks, Security measures.
Systems and Data Security.
Computer Communication Networks.
Information Systems Applications (incl. Internet).
Computer System Implementation.
Cryptology.
Mobile and Network Security.
Computer communication systems.
Application software.
Architecture, Computer.
Data encryption (Computer science).
Computer networks, Security measures.
Systems and Data Security.
Computer Communication Networks.
Information Systems Applications (incl. Internet).
Computer System Implementation.
Cryptology.
Mobile and Network Security.
Other type record
ISBN
9789813349223
Related information
Booktalk
Please feel free to read the book
and write your impressions.
글쓰기
and write your impressions.
Call Sign Browsing
Related Popular Books