Advanced computing and systems for security Volume 2

Gespeichert in:
Bibliographische Detailangaben
Weitere Verfasser: Chaki, Rituparna (HerausgeberIn), Cortesi, Agostino 1963- (HerausgeberIn), Saeed, Khalid (HerausgeberIn), Chaki, Nabendu (HerausgeberIn)
Format: Elektronisch E-Book
Sprache:English
Veröffentlicht: New Delhi Springer [2016]
Schriftenreihe:Advances in intelligent systems and computing volume 396
Schlagworte:
Online-Zugang:BTU01
FAB01
FAW01
FHA01
FHI01
FHN01
FHR01
FKE01
FRO01
FWS01
FWS02
UBY01
URL des Erstveröffentlichers
Inhaltsverzeichnis
Abstract
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!

MARC

LEADER 00000nmm a2200000zcb4500
001 BV043211596
003 DE-604
005 20160607
007 cr|uuu---uuuuu
008 151215s2016 |||| o||u| ||||||eng d
020 |a 9788132226536  |c Online  |9 978-81-322-2653-6 
024 7 |a 10.1007/978-81-322-2653-6  |2 doi 
035 |a (OCoLC)932039466 
035 |a (DE-599)BVBBV043211596 
040 |a DE-604  |b ger  |e rda 
041 0 |a eng 
049 |a DE-1043  |a DE-Aug4  |a DE-573  |a DE-859  |a DE-863  |a DE-92  |a DE-862  |a DE-898  |a DE-634  |a DE-1046  |a DE-861  |a DE-706 
082 0 |a 006.3  |2 23 
245 1 0 |a Advanced computing and systems for security  |b Volume 2  |c Rituparna Chaki, Agostino Cortesi, Khalid Saeed, Nabendu Chaki editors 
264 1 |a New Delhi  |b Springer  |c [2016] 
264 4 |c © 2016 
300 |a 1 Online Ressource (xii, 322 p. 145 illus) 
336 |b txt  |2 rdacontent 
337 |b c  |2 rdamedia 
338 |b cr  |2 rdacarrier 
490 1 |a Advances in intelligent systems and computing  |v volume 396 
650 4 |a Engineering 
650 4 |a Computer security 
650 4 |a Computational intelligence 
650 4 |a Computational Intelligence 
650 4 |a Signal, Image and Speech Processing 
650 4 |a Systems and Data Security 
650 4 |a Ingenieurwissenschaften 
700 1 |a Chaki, Rituparna  |0 (DE-588)1082528897  |4 edt 
700 1 |a Cortesi, Agostino  |d 1963-  |0 (DE-588)121273229  |4 edt 
700 1 |a Saeed, Khalid  |4 edt 
700 1 |a Chaki, Nabendu  |4 edt 
776 0 8 |i Erscheint auch als  |n Druckausgabe  |z 978-81-322-2651-2 
830 0 |a Advances in intelligent systems and computing  |v volume 396  |w (DE-604)BV040889154  |9 396 
856 4 0 |u https://doi.org/10.1007/978-81-322-2653-6  |x Verlag  |z URL des Erstveröffentlichers  |3 Volltext 
856 4 2 |m Springer Fremddatenuebernahme  |q application/pdf  |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028634735&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA  |3 Inhaltsverzeichnis 
856 4 2 |m Springer Fremddatenuebernahme  |q application/pdf  |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028634735&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA  |3 Abstract 
912 |a ZDB-2-ENG 
940 1 |q ZDB-2-ENG_2016 
999 |a oai:aleph.bib-bvb.de:BVB01-028634735 
966 e |u https://doi.org/10.1007/978-81-322-2653-6  |l BTU01  |p ZDB-2-ENG  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-81-322-2653-6  |l FAB01  |p ZDB-2-ENG  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-81-322-2653-6  |l FAW01  |p ZDB-2-ENG  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-81-322-2653-6  |l FHA01  |p ZDB-2-ENG  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-81-322-2653-6  |l FHI01  |p ZDB-2-ENG  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-81-322-2653-6  |l FHN01  |p ZDB-2-ENG  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-81-322-2653-6  |l FHR01  |p ZDB-2-ENG  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-81-322-2653-6  |l FKE01  |p ZDB-2-ENG  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-81-322-2653-6  |l FRO01  |p ZDB-2-ENG  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-81-322-2653-6  |l FWS01  |p ZDB-2-ENG  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-81-322-2653-6  |l FWS02  |p ZDB-2-ENG  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-81-322-2653-6  |l UBY01  |p ZDB-2-ENG  |x Verlag  |3 Volltext 

Datensatz im Suchindex

DE-BY-FWS_katkey 590638
_version_ 1806179636655161344
adam_text ADVANCED COMPUTING AND SYSTEMS FOR SECURITY / : 2016 TABLE OF CONTENTS / INHALTSVERZEICHNIS SIGNAL PROCESSING: CHAPTER 1. DESIGN AND DEVELOPMENT OF MARATHI SPEECH INTERFACE SYSTEM CHAPTER 2. FUSION-BASED NOISY IMAGE SEGMENTATION METHOD CHAPTER 3. AN APPROACH FOR AUTOMATIC INDIC SCRIPT IDENTIFICATION FROM HANDWRITTEN DOCUMENT IMAGES CHAPTER 4. WRITER VERIFICATION ON BANGLA HANDWRITTEN CHARACTERS CHAPTER 5. FACE RECOGNITION IN VIDEO USING DEFORMABLE PARTS MODEL WITH SCALE INVARIANT FEATURE TRANSFORM (DPSIFT) CHAPTER 6. REGISTRATION OF RANGE IMAGES USING A NOVEL TECHNIQUE OF CENTROID ALIGNMENT SOFTWARE ENGINEERING: CHAPTER 7. AN INVESTIGATION INTO EFFECTIVE TEST COVERAGE CHAPTER 8. RESOURCE MANAGEMENT IN NATIVE LANGUAGES USING DYNAMIC BINARY INSTRUMENTATION (PIN) CHAPTER 9. A STUDY ON SOFTWARE RISK MANAGEMENT STRATEGIES AND MAPPING WITH SDLC CHAPTER 10. A NEW SERVICE DISCOVERY APPROACH FOR COMMUNITY BASED WEB CHAPTER 11. DATA-FLOW ANALYSIS-BASED APPROACH OF DATABASE WATERMARKING NETWORKING AND CLOUD COMPUTING: CHAPTER 12. A NEW FRAMEWORK FOR CONFIGURATION MANAGEMENT AND COMPLIANCE CHECKING TOWARDS COMPONENT BASED SOFTWARE DEVELOPMENT CHAPTER 13. CAD BASED ANALYSIS OF POWER DISTRIBUTION NETWORK FOR SOC DESIGN ALGORITHMS: CHAPTER 14. A NEW HYBRID MUTUAL EXCLUSION ALGORITHM IN ABSENCE OF MAJORITY CONSENSUS CHAPTER 15. A COMPREHENSIVE SUDOKU INSTANCE GENERATOR CHAPTER 16. IMPLEME NTING SOFTWARE TRANSACTIONAL MEMORY USING STM HASKELL CHAPTER 17. COMPARATIVE ANALYSIS OF GENETIC ALGORITHM AND CLASSICAL ALGORITHMS IN FRACTIONAL PROGRAMMING CHAPTER 18. AN ALGORITHM TO SOLVE 3D GUARD ZONE COMPUTATION PROBLEM CHAPTER 19. MULTI-STEP AHEAD GROUNDWATER LEVEL TIME SERIES FORECASTING USING GAUSSIAN PROCESS REGRESSION AND ANFIS CHAPTER 20. ANOMALY DETECTION AND THREE ANOMALOUS COINS PROBLEM DIESES SCHRIFTSTUECK WURDE MASCHINELL ERZEUGT. ADVANCED COMPUTING AND SYSTEMS FOR SECURITY / : 2016 ABSTRACT / INHALTSTEXT THE BOOK CONTAINS THE EXTENDED VERSION OF THE WORKS THAT HAVE BEEN PRESENTED AND DISCUSSED IN THE SECOND INTERNATIONAL DOCTORAL SYMPOSIUM ON APPLIED COMPUTATION AND SECURITY SYSTEMS (ACSS 2015) HELD DURING MAY 23-25, 2015 IN KOLKATA, INDIA. THE SYMPOSIUM HAS BEEN JOINTLY ORGANIZED BY THE AGH UNIVERSITY OF SCIENCE & TECHNOLOGY, CRACOW, POLAND; CA’ FOSCARI UNIVERSITY, VENICE, ITALY AND UNIVERSITY OF CALCUTTA, INDIA. THE BOOK IS DIVIDED INTO VOLUMES AND PRESENTS DISSERTATION WORKS IN THE AREAS OF IMAGE PROCESSING, BIOMETRICS-BASED AUTHENTICATION, SOFT COMPUTING, DATA MINING, NEXT GENERATION NETWORKING AND NETWORK SECURITY, REMOTE HEALTHCARE, COMMUNICATIONS, EMBEDDED SYSTEMS, SOFTWARE ENGINEERING AND SERVICE ENGINEERING DIESES SCHRIFTSTUECK WURDE MASCHINELL ERZEUGT.
any_adam_object 1
author2 Chaki, Rituparna
Cortesi, Agostino 1963-
Saeed, Khalid
Chaki, Nabendu
author2_role edt
edt
edt
edt
author2_variant r c rc
a c ac
k s ks
n c nc
author_GND (DE-588)1082528897
(DE-588)121273229
author_facet Chaki, Rituparna
Cortesi, Agostino 1963-
Saeed, Khalid
Chaki, Nabendu
building Verbundindex
bvnumber BV043211596
collection ZDB-2-ENG
ctrlnum (OCoLC)932039466
(DE-599)BVBBV043211596
dewey-full 006.3
dewey-hundreds 000 - Computer science, information, general works
dewey-ones 006 - Special computer methods
dewey-raw 006.3
dewey-search 006.3
dewey-sort 16.3
dewey-tens 000 - Computer science, information, general works
discipline Informatik
doi_str_mv 10.1007/978-81-322-2653-6
format Electronic
eBook
fullrecord <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03472nmm a2200649zcb4500</leader><controlfield tag="001">BV043211596</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20160607 </controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">151215s2016 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9788132226536</subfield><subfield code="c">Online</subfield><subfield code="9">978-81-322-2653-6</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1007/978-81-322-2653-6</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)932039466</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV043211596</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-1043</subfield><subfield code="a">DE-Aug4</subfield><subfield code="a">DE-573</subfield><subfield code="a">DE-859</subfield><subfield code="a">DE-863</subfield><subfield code="a">DE-92</subfield><subfield code="a">DE-862</subfield><subfield code="a">DE-898</subfield><subfield code="a">DE-634</subfield><subfield code="a">DE-1046</subfield><subfield code="a">DE-861</subfield><subfield code="a">DE-706</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">006.3</subfield><subfield code="2">23</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Advanced computing and systems for security</subfield><subfield code="b">Volume 2</subfield><subfield code="c">Rituparna Chaki, Agostino Cortesi, Khalid Saeed, Nabendu Chaki editors</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">New Delhi</subfield><subfield code="b">Springer</subfield><subfield code="c">[2016]</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">© 2016</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online Ressource (xii, 322 p. 145 illus)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">Advances in intelligent systems and computing</subfield><subfield code="v">volume 396</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Engineering</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computational intelligence</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computational Intelligence</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Signal, Image and Speech Processing</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Systems and Data Security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Ingenieurwissenschaften</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Chaki, Rituparna</subfield><subfield code="0">(DE-588)1082528897</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Cortesi, Agostino</subfield><subfield code="d">1963-</subfield><subfield code="0">(DE-588)121273229</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Saeed, Khalid</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Chaki, Nabendu</subfield><subfield code="4">edt</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druckausgabe</subfield><subfield code="z">978-81-322-2651-2</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">Advances in intelligent systems and computing</subfield><subfield code="v">volume 396</subfield><subfield code="w">(DE-604)BV040889154</subfield><subfield code="9">396</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1007/978-81-322-2653-6</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Erstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Springer Fremddatenuebernahme</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&amp;doc_library=BVB01&amp;local_base=BVB01&amp;doc_number=028634735&amp;sequence=000001&amp;line_number=0001&amp;func_code=DB_RECORDS&amp;service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Springer Fremddatenuebernahme</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&amp;doc_library=BVB01&amp;local_base=BVB01&amp;doc_number=028634735&amp;sequence=000003&amp;line_number=0002&amp;func_code=DB_RECORDS&amp;service_type=MEDIA</subfield><subfield code="3">Abstract</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-2-ENG</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">ZDB-2-ENG_2016</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-028634735</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-81-322-2653-6</subfield><subfield code="l">BTU01</subfield><subfield code="p">ZDB-2-ENG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-81-322-2653-6</subfield><subfield code="l">FAB01</subfield><subfield code="p">ZDB-2-ENG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-81-322-2653-6</subfield><subfield code="l">FAW01</subfield><subfield code="p">ZDB-2-ENG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-81-322-2653-6</subfield><subfield code="l">FHA01</subfield><subfield code="p">ZDB-2-ENG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-81-322-2653-6</subfield><subfield code="l">FHI01</subfield><subfield code="p">ZDB-2-ENG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-81-322-2653-6</subfield><subfield code="l">FHN01</subfield><subfield code="p">ZDB-2-ENG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-81-322-2653-6</subfield><subfield code="l">FHR01</subfield><subfield code="p">ZDB-2-ENG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-81-322-2653-6</subfield><subfield code="l">FKE01</subfield><subfield code="p">ZDB-2-ENG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-81-322-2653-6</subfield><subfield code="l">FRO01</subfield><subfield code="p">ZDB-2-ENG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-81-322-2653-6</subfield><subfield code="l">FWS01</subfield><subfield code="p">ZDB-2-ENG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-81-322-2653-6</subfield><subfield code="l">FWS02</subfield><subfield code="p">ZDB-2-ENG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-81-322-2653-6</subfield><subfield code="l">UBY01</subfield><subfield code="p">ZDB-2-ENG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection>
id DE-604.BV043211596
illustrated Not Illustrated
indexdate 2024-08-01T12:12:10Z
institution BVB
isbn 9788132226536
language English
oai_aleph_id oai:aleph.bib-bvb.de:BVB01-028634735
oclc_num 932039466
open_access_boolean
owner DE-1043
DE-Aug4
DE-573
DE-859
DE-863
DE-BY-FWS
DE-92
DE-862
DE-BY-FWS
DE-898
DE-BY-UBR
DE-634
DE-1046
DE-861
DE-706
owner_facet DE-1043
DE-Aug4
DE-573
DE-859
DE-863
DE-BY-FWS
DE-92
DE-862
DE-BY-FWS
DE-898
DE-BY-UBR
DE-634
DE-1046
DE-861
DE-706
physical 1 Online Ressource (xii, 322 p. 145 illus)
psigel ZDB-2-ENG
ZDB-2-ENG_2016
publishDate 2016
publishDateSearch 2016
publishDateSort 2016
publisher Springer
record_format marc
series Advances in intelligent systems and computing
series2 Advances in intelligent systems and computing
spellingShingle Advanced computing and systems for security Volume 2
Advances in intelligent systems and computing
Engineering
Computer security
Computational intelligence
Computational Intelligence
Signal, Image and Speech Processing
Systems and Data Security
Ingenieurwissenschaften
title Advanced computing and systems for security Volume 2
title_auth Advanced computing and systems for security Volume 2
title_exact_search Advanced computing and systems for security Volume 2
title_full Advanced computing and systems for security Volume 2 Rituparna Chaki, Agostino Cortesi, Khalid Saeed, Nabendu Chaki editors
title_fullStr Advanced computing and systems for security Volume 2 Rituparna Chaki, Agostino Cortesi, Khalid Saeed, Nabendu Chaki editors
title_full_unstemmed Advanced computing and systems for security Volume 2 Rituparna Chaki, Agostino Cortesi, Khalid Saeed, Nabendu Chaki editors
title_short Advanced computing and systems for security
title_sort advanced computing and systems for security volume 2
title_sub Volume 2
topic Engineering
Computer security
Computational intelligence
Computational Intelligence
Signal, Image and Speech Processing
Systems and Data Security
Ingenieurwissenschaften
topic_facet Engineering
Computer security
Computational intelligence
Computational Intelligence
Signal, Image and Speech Processing
Systems and Data Security
Ingenieurwissenschaften
url https://doi.org/10.1007/978-81-322-2653-6
http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028634735&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA
http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028634735&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA
volume_link (DE-604)BV040889154
work_keys_str_mv AT chakirituparna advancedcomputingandsystemsforsecurityvolume2
AT cortesiagostino advancedcomputingandsystemsforsecurityvolume2
AT saeedkhalid advancedcomputingandsystemsforsecurityvolume2
AT chakinabendu advancedcomputingandsystemsforsecurityvolume2