Correction: Bio-inspired Computing Techniques for Data Security Challenges and Controls
Gespeichert in:
Veröffentlicht in: | SN computer science 2023-02, Vol.4 (2), p.206, Article 206 |
---|---|
Hauptverfasser: | , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | |
---|---|
container_issue | 2 |
container_start_page | 206 |
container_title | SN computer science |
container_volume | 4 |
creator | Sripriyanka, G. Mahendran, Anand |
description | |
doi_str_mv | 10.1007/s42979-023-01717-0 |
format | Article |
fullrecord | <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_journals_2921277882</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>2921277882</sourcerecordid><originalsourceid>FETCH-LOGICAL-c1590-4c0ead6c7e9032021456c7bc0295ef3be2774ee9e61ba099235f2b12c49153d53</originalsourceid><addsrcrecordid>eNp9kD1PwzAQhi0EElXpH2CKxGw4O3Fcs0GggFSJgSJGy3Gd1lVqBzsZ-u9xCRJMTHene5_7eBG6JHBNAPhNLKjgAgPNMRBOOIYTNKFlSfBcAD_9k5-jWYw7AKAMiqJkE_RR-RCM7q13t9m99di62Nlg1lnl993QW7fJVkZvnf0cTMwaH7IH1avszegh2P6QVVvVtsZtUlO5I-X64Nt4gc4a1UYz-4lT9L54XFXPePn69FLdLbEmTAAuNBi1LjU3AnIKlBQsFbUGKphp8tpQzgtjhClJrUAImrOG1oTqQhCWr1k-RVfj3C7444W93PkhuLRSUkFJwudzmlR0VOngYwymkV2wexUOkoA8eihHD2XyUH57KCFB-QjFJE4Pht_R_1BfUdRzig</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2921277882</pqid></control><display><type>article</type><title>Correction: Bio-inspired Computing Techniques for Data Security Challenges and Controls</title><source>ProQuest Central UK/Ireland</source><source>SpringerLink Journals - AutoHoldings</source><source>ProQuest Central</source><creator>Sripriyanka, G. ; Mahendran, Anand</creator><creatorcontrib>Sripriyanka, G. ; Mahendran, Anand</creatorcontrib><identifier>ISSN: 2661-8907</identifier><identifier>ISSN: 2662-995X</identifier><identifier>EISSN: 2661-8907</identifier><identifier>DOI: 10.1007/s42979-023-01717-0</identifier><language>eng</language><publisher>Singapore: Springer Nature Singapore</publisher><subject>Computer Imaging ; Computer Science ; Computer Systems Organization and Communication Networks ; Correction ; Data Structures and Information Theory ; Information Systems and Communication Service ; Pattern Recognition and Graphics ; Software Engineering/Programming and Operating Systems ; Vision</subject><ispartof>SN computer science, 2023-02, Vol.4 (2), p.206, Article 206</ispartof><rights>The Author(s), under exclusive licence to Springer Nature Singapore Pte Ltd 2023</rights><rights>The Author(s), under exclusive licence to Springer Nature Singapore Pte Ltd 2023.</rights><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktopdf>$$Uhttps://link.springer.com/content/pdf/10.1007/s42979-023-01717-0$$EPDF$$P50$$Gspringer$$H</linktopdf><linktohtml>$$Uhttps://www.proquest.com/docview/2921277882?pq-origsite=primo$$EHTML$$P50$$Gproquest$$H</linktohtml><link.rule.ids>314,780,784,21388,27924,27925,33744,41488,42557,43805,51319,64385,64389,72469</link.rule.ids></links><search><creatorcontrib>Sripriyanka, G.</creatorcontrib><creatorcontrib>Mahendran, Anand</creatorcontrib><title>Correction: Bio-inspired Computing Techniques for Data Security Challenges and Controls</title><title>SN computer science</title><addtitle>SN COMPUT. SCI</addtitle><subject>Computer Imaging</subject><subject>Computer Science</subject><subject>Computer Systems Organization and Communication Networks</subject><subject>Correction</subject><subject>Data Structures and Information Theory</subject><subject>Information Systems and Communication Service</subject><subject>Pattern Recognition and Graphics</subject><subject>Software Engineering/Programming and Operating Systems</subject><subject>Vision</subject><issn>2661-8907</issn><issn>2662-995X</issn><issn>2661-8907</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2023</creationdate><recordtype>article</recordtype><sourceid>AFKRA</sourceid><sourceid>AZQEC</sourceid><sourceid>BENPR</sourceid><sourceid>CCPQU</sourceid><sourceid>DWQXO</sourceid><sourceid>GNUQQ</sourceid><recordid>eNp9kD1PwzAQhi0EElXpH2CKxGw4O3Fcs0GggFSJgSJGy3Gd1lVqBzsZ-u9xCRJMTHene5_7eBG6JHBNAPhNLKjgAgPNMRBOOIYTNKFlSfBcAD_9k5-jWYw7AKAMiqJkE_RR-RCM7q13t9m99di62Nlg1lnl993QW7fJVkZvnf0cTMwaH7IH1avszegh2P6QVVvVtsZtUlO5I-X64Nt4gc4a1UYz-4lT9L54XFXPePn69FLdLbEmTAAuNBi1LjU3AnIKlBQsFbUGKphp8tpQzgtjhClJrUAImrOG1oTqQhCWr1k-RVfj3C7444W93PkhuLRSUkFJwudzmlR0VOngYwymkV2wexUOkoA8eihHD2XyUH57KCFB-QjFJE4Pht_R_1BfUdRzig</recordid><startdate>20230215</startdate><enddate>20230215</enddate><creator>Sripriyanka, G.</creator><creator>Mahendran, Anand</creator><general>Springer Nature Singapore</general><general>Springer Nature B.V</general><scope>AAYXX</scope><scope>CITATION</scope><scope>8FE</scope><scope>8FG</scope><scope>AFKRA</scope><scope>ARAPS</scope><scope>AZQEC</scope><scope>BENPR</scope><scope>BGLVJ</scope><scope>CCPQU</scope><scope>DWQXO</scope><scope>GNUQQ</scope><scope>HCIFZ</scope><scope>JQ2</scope><scope>K7-</scope><scope>P5Z</scope><scope>P62</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope><scope>PRINS</scope></search><sort><creationdate>20230215</creationdate><title>Correction: Bio-inspired Computing Techniques for Data Security Challenges and Controls</title><author>Sripriyanka, G. ; Mahendran, Anand</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c1590-4c0ead6c7e9032021456c7bc0295ef3be2774ee9e61ba099235f2b12c49153d53</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2023</creationdate><topic>Computer Imaging</topic><topic>Computer Science</topic><topic>Computer Systems Organization and Communication Networks</topic><topic>Correction</topic><topic>Data Structures and Information Theory</topic><topic>Information Systems and Communication Service</topic><topic>Pattern Recognition and Graphics</topic><topic>Software Engineering/Programming and Operating Systems</topic><topic>Vision</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Sripriyanka, G.</creatorcontrib><creatorcontrib>Mahendran, Anand</creatorcontrib><collection>CrossRef</collection><collection>ProQuest SciTech Collection</collection><collection>ProQuest Technology Collection</collection><collection>ProQuest Central UK/Ireland</collection><collection>Advanced Technologies & Aerospace Collection</collection><collection>ProQuest Central Essentials</collection><collection>ProQuest Central</collection><collection>Technology Collection</collection><collection>ProQuest One Community College</collection><collection>ProQuest Central Korea</collection><collection>ProQuest Central Student</collection><collection>SciTech Premium Collection</collection><collection>ProQuest Computer Science Collection</collection><collection>Computer Science Database</collection><collection>Advanced Technologies & Aerospace Database</collection><collection>ProQuest Advanced Technologies & Aerospace Collection</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><collection>ProQuest Central China</collection><jtitle>SN computer science</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Sripriyanka, G.</au><au>Mahendran, Anand</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Correction: Bio-inspired Computing Techniques for Data Security Challenges and Controls</atitle><jtitle>SN computer science</jtitle><stitle>SN COMPUT. SCI</stitle><date>2023-02-15</date><risdate>2023</risdate><volume>4</volume><issue>2</issue><spage>206</spage><pages>206-</pages><artnum>206</artnum><issn>2661-8907</issn><issn>2662-995X</issn><eissn>2661-8907</eissn><cop>Singapore</cop><pub>Springer Nature Singapore</pub><doi>10.1007/s42979-023-01717-0</doi><oa>free_for_read</oa></addata></record> |
fulltext | fulltext |
identifier | ISSN: 2661-8907 |
ispartof | SN computer science, 2023-02, Vol.4 (2), p.206, Article 206 |
issn | 2661-8907 2662-995X 2661-8907 |
language | eng |
recordid | cdi_proquest_journals_2921277882 |
source | ProQuest Central UK/Ireland; SpringerLink Journals - AutoHoldings; ProQuest Central |
subjects | Computer Imaging Computer Science Computer Systems Organization and Communication Networks Correction Data Structures and Information Theory Information Systems and Communication Service Pattern Recognition and Graphics Software Engineering/Programming and Operating Systems Vision |
title | Correction: Bio-inspired Computing Techniques for Data Security Challenges and Controls |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-21T10%3A16%3A26IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Correction:%20Bio-inspired%20Computing%20Techniques%20for%20Data%20Security%20Challenges%20and%20Controls&rft.jtitle=SN%20computer%20science&rft.au=Sripriyanka,%20G.&rft.date=2023-02-15&rft.volume=4&rft.issue=2&rft.spage=206&rft.pages=206-&rft.artnum=206&rft.issn=2661-8907&rft.eissn=2661-8907&rft_id=info:doi/10.1007/s42979-023-01717-0&rft_dat=%3Cproquest_cross%3E2921277882%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2921277882&rft_id=info:pmid/&rfr_iscdi=true |