Advanced computing and systems for security Volume 2
Gespeichert in:
Weitere Verfasser: | , , , |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
New Delhi
Springer
[2016]
|
Schriftenreihe: | Advances in intelligent systems and computing
volume 396 |
Schlagworte: | |
Online-Zugang: | BTU01 FAB01 FAW01 FHA01 FHI01 FHN01 FHR01 FKE01 FRO01 FWS01 FWS02 UBY01 URL des Erstveröffentlichers Inhaltsverzeichnis Abstract |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
MARC
LEADER | 00000nmm a2200000zcb4500 | ||
---|---|---|---|
001 | BV043211596 | ||
003 | DE-604 | ||
005 | 20160607 | ||
007 | cr|uuu---uuuuu | ||
008 | 151215s2016 |||| o||u| ||||||eng d | ||
020 | |a 9788132226536 |c Online |9 978-81-322-2653-6 | ||
024 | 7 | |a 10.1007/978-81-322-2653-6 |2 doi | |
035 | |a (OCoLC)932039466 | ||
035 | |a (DE-599)BVBBV043211596 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-1043 |a DE-Aug4 |a DE-573 |a DE-859 |a DE-863 |a DE-92 |a DE-862 |a DE-898 |a DE-634 |a DE-1046 |a DE-861 |a DE-706 | ||
082 | 0 | |a 006.3 |2 23 | |
245 | 1 | 0 | |a Advanced computing and systems for security |b Volume 2 |c Rituparna Chaki, Agostino Cortesi, Khalid Saeed, Nabendu Chaki editors |
264 | 1 | |a New Delhi |b Springer |c [2016] | |
264 | 4 | |c © 2016 | |
300 | |a 1 Online Ressource (xii, 322 p. 145 illus) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
490 | 1 | |a Advances in intelligent systems and computing |v volume 396 | |
650 | 4 | |a Engineering | |
650 | 4 | |a Computer security | |
650 | 4 | |a Computational intelligence | |
650 | 4 | |a Computational Intelligence | |
650 | 4 | |a Signal, Image and Speech Processing | |
650 | 4 | |a Systems and Data Security | |
650 | 4 | |a Ingenieurwissenschaften | |
700 | 1 | |a Chaki, Rituparna |0 (DE-588)1082528897 |4 edt | |
700 | 1 | |a Cortesi, Agostino |d 1963- |0 (DE-588)121273229 |4 edt | |
700 | 1 | |a Saeed, Khalid |4 edt | |
700 | 1 | |a Chaki, Nabendu |4 edt | |
776 | 0 | 8 | |i Erscheint auch als |n Druckausgabe |z 978-81-322-2651-2 |
830 | 0 | |a Advances in intelligent systems and computing |v volume 396 |w (DE-604)BV040889154 |9 396 | |
856 | 4 | 0 | |u https://doi.org/10.1007/978-81-322-2653-6 |x Verlag |z URL des Erstveröffentlichers |3 Volltext |
856 | 4 | 2 | |m Springer Fremddatenuebernahme |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028634735&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
856 | 4 | 2 | |m Springer Fremddatenuebernahme |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028634735&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA |3 Abstract |
912 | |a ZDB-2-ENG | ||
940 | 1 | |q ZDB-2-ENG_2016 | |
999 | |a oai:aleph.bib-bvb.de:BVB01-028634735 | ||
966 | e | |u https://doi.org/10.1007/978-81-322-2653-6 |l BTU01 |p ZDB-2-ENG |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-81-322-2653-6 |l FAB01 |p ZDB-2-ENG |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-81-322-2653-6 |l FAW01 |p ZDB-2-ENG |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-81-322-2653-6 |l FHA01 |p ZDB-2-ENG |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-81-322-2653-6 |l FHI01 |p ZDB-2-ENG |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-81-322-2653-6 |l FHN01 |p ZDB-2-ENG |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-81-322-2653-6 |l FHR01 |p ZDB-2-ENG |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-81-322-2653-6 |l FKE01 |p ZDB-2-ENG |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-81-322-2653-6 |l FRO01 |p ZDB-2-ENG |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-81-322-2653-6 |l FWS01 |p ZDB-2-ENG |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-81-322-2653-6 |l FWS02 |p ZDB-2-ENG |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-81-322-2653-6 |l UBY01 |p ZDB-2-ENG |x Verlag |3 Volltext |
Datensatz im Suchindex
DE-BY-FWS_katkey | 590638 |
---|---|
_version_ | 1806179636655161344 |
adam_text | ADVANCED COMPUTING AND SYSTEMS FOR SECURITY
/
: 2016
TABLE OF CONTENTS / INHALTSVERZEICHNIS
SIGNAL PROCESSING: CHAPTER 1. DESIGN AND DEVELOPMENT OF MARATHI SPEECH
INTERFACE SYSTEM
CHAPTER 2. FUSION-BASED NOISY IMAGE SEGMENTATION METHOD
CHAPTER 3. AN APPROACH FOR AUTOMATIC INDIC SCRIPT IDENTIFICATION FROM
HANDWRITTEN DOCUMENT IMAGES
CHAPTER 4. WRITER VERIFICATION ON BANGLA HANDWRITTEN CHARACTERS
CHAPTER 5. FACE RECOGNITION IN VIDEO USING DEFORMABLE PARTS MODEL WITH
SCALE INVARIANT FEATURE TRANSFORM (DPSIFT)
CHAPTER 6. REGISTRATION OF RANGE IMAGES USING A NOVEL TECHNIQUE OF
CENTROID ALIGNMENT
SOFTWARE ENGINEERING: CHAPTER 7. AN INVESTIGATION INTO EFFECTIVE TEST
COVERAGE
CHAPTER 8. RESOURCE MANAGEMENT IN NATIVE LANGUAGES USING DYNAMIC BINARY
INSTRUMENTATION (PIN)
CHAPTER 9. A STUDY ON SOFTWARE RISK MANAGEMENT STRATEGIES AND MAPPING
WITH SDLC
CHAPTER 10. A NEW SERVICE DISCOVERY APPROACH FOR COMMUNITY BASED WEB
CHAPTER 11. DATA-FLOW ANALYSIS-BASED APPROACH OF DATABASE WATERMARKING
NETWORKING AND CLOUD COMPUTING: CHAPTER 12. A NEW FRAMEWORK FOR
CONFIGURATION MANAGEMENT AND COMPLIANCE CHECKING TOWARDS COMPONENT BASED
SOFTWARE DEVELOPMENT
CHAPTER 13. CAD BASED ANALYSIS OF POWER DISTRIBUTION NETWORK FOR SOC
DESIGN
ALGORITHMS: CHAPTER 14. A NEW HYBRID MUTUAL EXCLUSION ALGORITHM IN
ABSENCE OF MAJORITY CONSENSUS
CHAPTER 15. A COMPREHENSIVE SUDOKU INSTANCE GENERATOR
CHAPTER 16. IMPLEME NTING SOFTWARE TRANSACTIONAL MEMORY USING STM
HASKELL
CHAPTER 17. COMPARATIVE ANALYSIS OF GENETIC ALGORITHM AND CLASSICAL
ALGORITHMS IN FRACTIONAL PROGRAMMING
CHAPTER 18. AN ALGORITHM TO SOLVE 3D GUARD ZONE COMPUTATION PROBLEM
CHAPTER 19. MULTI-STEP AHEAD GROUNDWATER LEVEL TIME SERIES FORECASTING
USING GAUSSIAN PROCESS REGRESSION AND ANFIS
CHAPTER 20. ANOMALY DETECTION AND THREE ANOMALOUS COINS PROBLEM
DIESES SCHRIFTSTUECK WURDE MASCHINELL ERZEUGT.
ADVANCED COMPUTING AND SYSTEMS FOR SECURITY
/
: 2016
ABSTRACT / INHALTSTEXT
THE BOOK CONTAINS THE EXTENDED VERSION OF THE WORKS THAT HAVE BEEN
PRESENTED AND DISCUSSED IN THE SECOND INTERNATIONAL DOCTORAL SYMPOSIUM
ON APPLIED COMPUTATION AND SECURITY SYSTEMS (ACSS 2015) HELD DURING MAY
23-25, 2015 IN KOLKATA, INDIA. THE SYMPOSIUM HAS BEEN JOINTLY ORGANIZED
BY THE AGH UNIVERSITY OF SCIENCE & TECHNOLOGY, CRACOW, POLAND; CA’
FOSCARI UNIVERSITY, VENICE, ITALY AND UNIVERSITY OF CALCUTTA, INDIA. THE
BOOK IS DIVIDED INTO VOLUMES AND PRESENTS DISSERTATION WORKS IN THE
AREAS OF IMAGE PROCESSING, BIOMETRICS-BASED AUTHENTICATION, SOFT
COMPUTING, DATA MINING, NEXT GENERATION NETWORKING AND NETWORK SECURITY,
REMOTE HEALTHCARE, COMMUNICATIONS, EMBEDDED SYSTEMS, SOFTWARE
ENGINEERING AND SERVICE ENGINEERING
DIESES SCHRIFTSTUECK WURDE MASCHINELL ERZEUGT.
|
any_adam_object | 1 |
author2 | Chaki, Rituparna Cortesi, Agostino 1963- Saeed, Khalid Chaki, Nabendu |
author2_role | edt edt edt edt |
author2_variant | r c rc a c ac k s ks n c nc |
author_GND | (DE-588)1082528897 (DE-588)121273229 |
author_facet | Chaki, Rituparna Cortesi, Agostino 1963- Saeed, Khalid Chaki, Nabendu |
building | Verbundindex |
bvnumber | BV043211596 |
collection | ZDB-2-ENG |
ctrlnum | (OCoLC)932039466 (DE-599)BVBBV043211596 |
dewey-full | 006.3 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 006 - Special computer methods |
dewey-raw | 006.3 |
dewey-search | 006.3 |
dewey-sort | 16.3 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
doi_str_mv | 10.1007/978-81-322-2653-6 |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03472nmm a2200649zcb4500</leader><controlfield tag="001">BV043211596</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20160607 </controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">151215s2016 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9788132226536</subfield><subfield code="c">Online</subfield><subfield code="9">978-81-322-2653-6</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1007/978-81-322-2653-6</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)932039466</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV043211596</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-1043</subfield><subfield code="a">DE-Aug4</subfield><subfield code="a">DE-573</subfield><subfield code="a">DE-859</subfield><subfield code="a">DE-863</subfield><subfield code="a">DE-92</subfield><subfield code="a">DE-862</subfield><subfield code="a">DE-898</subfield><subfield code="a">DE-634</subfield><subfield code="a">DE-1046</subfield><subfield code="a">DE-861</subfield><subfield code="a">DE-706</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">006.3</subfield><subfield code="2">23</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Advanced computing and systems for security</subfield><subfield code="b">Volume 2</subfield><subfield code="c">Rituparna Chaki, Agostino Cortesi, Khalid Saeed, Nabendu Chaki editors</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">New Delhi</subfield><subfield code="b">Springer</subfield><subfield code="c">[2016]</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">© 2016</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online Ressource (xii, 322 p. 145 illus)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">Advances in intelligent systems and computing</subfield><subfield code="v">volume 396</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Engineering</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computational intelligence</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computational Intelligence</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Signal, Image and Speech Processing</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Systems and Data Security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Ingenieurwissenschaften</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Chaki, Rituparna</subfield><subfield code="0">(DE-588)1082528897</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Cortesi, Agostino</subfield><subfield code="d">1963-</subfield><subfield code="0">(DE-588)121273229</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Saeed, Khalid</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Chaki, Nabendu</subfield><subfield code="4">edt</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druckausgabe</subfield><subfield code="z">978-81-322-2651-2</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">Advances in intelligent systems and computing</subfield><subfield code="v">volume 396</subfield><subfield code="w">(DE-604)BV040889154</subfield><subfield code="9">396</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1007/978-81-322-2653-6</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Erstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Springer Fremddatenuebernahme</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028634735&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Springer Fremddatenuebernahme</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028634735&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Abstract</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-2-ENG</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">ZDB-2-ENG_2016</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-028634735</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-81-322-2653-6</subfield><subfield code="l">BTU01</subfield><subfield code="p">ZDB-2-ENG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-81-322-2653-6</subfield><subfield code="l">FAB01</subfield><subfield code="p">ZDB-2-ENG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-81-322-2653-6</subfield><subfield code="l">FAW01</subfield><subfield code="p">ZDB-2-ENG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-81-322-2653-6</subfield><subfield code="l">FHA01</subfield><subfield code="p">ZDB-2-ENG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-81-322-2653-6</subfield><subfield code="l">FHI01</subfield><subfield code="p">ZDB-2-ENG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-81-322-2653-6</subfield><subfield code="l">FHN01</subfield><subfield code="p">ZDB-2-ENG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-81-322-2653-6</subfield><subfield code="l">FHR01</subfield><subfield code="p">ZDB-2-ENG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-81-322-2653-6</subfield><subfield code="l">FKE01</subfield><subfield code="p">ZDB-2-ENG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-81-322-2653-6</subfield><subfield code="l">FRO01</subfield><subfield code="p">ZDB-2-ENG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-81-322-2653-6</subfield><subfield code="l">FWS01</subfield><subfield code="p">ZDB-2-ENG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-81-322-2653-6</subfield><subfield code="l">FWS02</subfield><subfield code="p">ZDB-2-ENG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-81-322-2653-6</subfield><subfield code="l">UBY01</subfield><subfield code="p">ZDB-2-ENG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV043211596 |
illustrated | Not Illustrated |
indexdate | 2024-08-01T12:12:10Z |
institution | BVB |
isbn | 9788132226536 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-028634735 |
oclc_num | 932039466 |
open_access_boolean | |
owner | DE-1043 DE-Aug4 DE-573 DE-859 DE-863 DE-BY-FWS DE-92 DE-862 DE-BY-FWS DE-898 DE-BY-UBR DE-634 DE-1046 DE-861 DE-706 |
owner_facet | DE-1043 DE-Aug4 DE-573 DE-859 DE-863 DE-BY-FWS DE-92 DE-862 DE-BY-FWS DE-898 DE-BY-UBR DE-634 DE-1046 DE-861 DE-706 |
physical | 1 Online Ressource (xii, 322 p. 145 illus) |
psigel | ZDB-2-ENG ZDB-2-ENG_2016 |
publishDate | 2016 |
publishDateSearch | 2016 |
publishDateSort | 2016 |
publisher | Springer |
record_format | marc |
series | Advances in intelligent systems and computing |
series2 | Advances in intelligent systems and computing |
spellingShingle | Advanced computing and systems for security Volume 2 Advances in intelligent systems and computing Engineering Computer security Computational intelligence Computational Intelligence Signal, Image and Speech Processing Systems and Data Security Ingenieurwissenschaften |
title | Advanced computing and systems for security Volume 2 |
title_auth | Advanced computing and systems for security Volume 2 |
title_exact_search | Advanced computing and systems for security Volume 2 |
title_full | Advanced computing and systems for security Volume 2 Rituparna Chaki, Agostino Cortesi, Khalid Saeed, Nabendu Chaki editors |
title_fullStr | Advanced computing and systems for security Volume 2 Rituparna Chaki, Agostino Cortesi, Khalid Saeed, Nabendu Chaki editors |
title_full_unstemmed | Advanced computing and systems for security Volume 2 Rituparna Chaki, Agostino Cortesi, Khalid Saeed, Nabendu Chaki editors |
title_short | Advanced computing and systems for security |
title_sort | advanced computing and systems for security volume 2 |
title_sub | Volume 2 |
topic | Engineering Computer security Computational intelligence Computational Intelligence Signal, Image and Speech Processing Systems and Data Security Ingenieurwissenschaften |
topic_facet | Engineering Computer security Computational intelligence Computational Intelligence Signal, Image and Speech Processing Systems and Data Security Ingenieurwissenschaften |
url | https://doi.org/10.1007/978-81-322-2653-6 http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028634735&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028634735&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA |
volume_link | (DE-604)BV040889154 |
work_keys_str_mv | AT chakirituparna advancedcomputingandsystemsforsecurityvolume2 AT cortesiagostino advancedcomputingandsystemsforsecurityvolume2 AT saeedkhalid advancedcomputingandsystemsforsecurityvolume2 AT chakinabendu advancedcomputingandsystemsforsecurityvolume2 |