Research in attacks, intrusions, and defenses 21st International Symposium, RAID 2018, Heraklion, Crete, Greece, September 10-12, 2018 : proceedings

Gespeichert in:
Bibliographische Detailangaben
Körperschaft: RAID Heraklion (VerfasserIn)
Weitere Verfasser: Bailey, Michael 1953- (HerausgeberIn), Holz, Thorsten (HerausgeberIn), Stamatogiannakis, Manolis (HerausgeberIn), Ioannidis, Sotiris (HerausgeberIn)
Format: Elektronisch Tagungsbericht E-Book
Sprache:English
Veröffentlicht: Cham Springer [2018]
Schriftenreihe:Lecture notes in computer science 11050 : Security and cryptology
Schlagworte:
Online-Zugang:DE-634
DE-Aug4
DE-573
DE-M347
DE-92
DE-898
DE-859
DE-860
DE-861
DE-863
DE-862
DE-523
DE-91
DE-384
DE-473
DE-19
DE-355
DE-703
DE-20
DE-706
DE-29
DE-739
URL des Erstveröffentlichers
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!

MARC

LEADER 00000nam a2200000zcb4500
001 BV045274717
003 DE-604
005 20190114
007 cr|uuu---uuuuu
008 181107s2018 xx a||| o|||| 10||| eng d
020 |a 9783030004705  |c Online  |9 978-3-030-00470-5 
024 7 |a 10.1007/978-3-030-00470-5  |2 doi 
035 |a (ZDB-2-SCS)9783030004705 
035 |a (ZDB-2-LNC)9783030004705 
035 |a (OCoLC)1066053283 
035 |a (DE-599)BVBBV045274717 
040 |a DE-604  |b ger  |e rda 
041 0 |a eng 
049 |a DE-355  |a DE-860  |a DE-91  |a DE-19  |a DE-Aug4  |a DE-898  |a DE-861  |a DE-523  |a DE-859  |a DE-473  |a DE-29  |a DE-863  |a DE-20  |a DE-862  |a DE-92  |a DE-384  |a DE-573  |a DE-M347  |a DE-703  |a DE-706  |a DE-739  |a DE-634 
082 0 |a 005.8  |2 23 
084 |a DAT 055f  |2 stub 
084 |a DAT 462f  |2 stub 
084 |a DAT 000  |2 stub 
084 |a DAT 465f  |2 stub 
111 2 |a RAID  |n 21.  |d 2018  |c Heraklion  |j Verfasser  |0 (DE-588)1168770068  |4 aut 
245 1 0 |a Research in attacks, intrusions, and defenses  |b 21st International Symposium, RAID 2018, Heraklion, Crete, Greece, September 10-12, 2018 : proceedings  |c Michael Bailey, Thorsten Holz, Manolis Stamatogiannakis, Sotiris Ioannidis (Eds.) 
264 1 |a Cham  |b Springer  |c [2018] 
300 |a 1 Online-Ressource (XIV, 712 Seiten)  |b Illustrationen, Diagramme 
336 |b txt  |2 rdacontent 
337 |b c  |2 rdamedia 
338 |b cr  |2 rdacarrier 
490 1 |a Lecture notes in computer science  |v 11050  |a Security and cryptology 
650 4 |a Systems and Data Security 
650 4 |a Computers and Society 
650 4 |a Legal Aspects of Computing 
650 4 |a Information Systems Applications (incl. Internet) 
650 4 |a Operating Systems 
650 4 |a Computer Communication Networks 
650 4 |a Data protection 
650 4 |a Computer science 
650 4 |a Computers / Law and legislation 
650 4 |a Operating systems (Computers) 
650 4 |a Computer Communication Networks 
650 0 7 |a Cloud Computing  |0 (DE-588)7623494-0  |2 gnd  |9 rswk-swf 
650 0 7 |a Rechnernetz  |0 (DE-588)4070085-9  |2 gnd  |9 rswk-swf 
650 0 7 |a Kryptoanalyse  |0 (DE-588)4830502-9  |2 gnd  |9 rswk-swf 
650 0 7 |a Eindringerkennung  |0 (DE-588)4706627-1  |2 gnd  |9 rswk-swf 
650 0 7 |a Malware  |0 (DE-588)4687059-3  |2 gnd  |9 rswk-swf 
650 0 7 |a Trusted Computing  |0 (DE-588)7562931-8  |2 gnd  |9 rswk-swf 
655 7 |0 (DE-588)1071861417  |a Konferenzschrift  |2 gnd-content 
689 0 0 |a Eindringerkennung  |0 (DE-588)4706627-1  |D s 
689 0 1 |a Kryptoanalyse  |0 (DE-588)4830502-9  |D s 
689 0 2 |a Malware  |0 (DE-588)4687059-3  |D s 
689 0 3 |a Trusted Computing  |0 (DE-588)7562931-8  |D s 
689 0 4 |a Rechnernetz  |0 (DE-588)4070085-9  |D s 
689 0 5 |a Cloud Computing  |0 (DE-588)7623494-0  |D s 
689 0 |5 DE-604 
700 1 |a Bailey, Michael  |d 1953-  |0 (DE-588)140274022  |4 edt 
700 1 |a Holz, Thorsten  |0 (DE-588)138293430  |4 edt 
700 1 |a Stamatogiannakis, Manolis  |4 edt 
700 1 |a Ioannidis, Sotiris  |4 edt 
776 0 8 |i Erscheint auch als  |n Druck-Ausgabe  |z 978-3-030-00469-9 
776 0 8 |i Erscheint auch als  |n Druck-Ausgabe  |z 978-3-030-00471-2 
830 0 |a Lecture notes in computer science  |v 11050 : Security and cryptology  |w (DE-604)BV014880109  |9 11050 
856 4 0 |u https://doi.org/10.1007/978-3-030-00470-5  |x Verlag  |z URL des Erstveröffentlichers  |3 Volltext 
912 |a ZDB-2-SCS 
912 |a ZDB-2-LNC 
940 1 |q ZDB-2-SCS_2018 
940 1 |q ZDB-2-LNC_2018 
943 1 |a oai:aleph.bib-bvb.de:BVB01-030662403 
966 e |u https://doi.org/10.1007/978-3-030-00470-5  |l DE-634  |p ZDB-2-LNC  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-030-00470-5  |l DE-Aug4  |p ZDB-2-LNC  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-030-00470-5  |l DE-573  |p ZDB-2-LNC  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-030-00470-5  |l DE-M347  |p ZDB-2-LNC  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-030-00470-5  |l DE-92  |p ZDB-2-LNC  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-030-00470-5  |l DE-898  |p ZDB-2-LNC  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-030-00470-5  |l DE-859  |p ZDB-2-LNC  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-030-00470-5  |l DE-860  |p ZDB-2-LNC  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-030-00470-5  |l DE-861  |p ZDB-2-LNC  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-030-00470-5  |l DE-863  |p ZDB-2-LNC  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-030-00470-5  |l DE-862  |p ZDB-2-LNC  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-030-00470-5  |l DE-523  |p ZDB-2-LNC  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-030-00470-5  |l DE-91  |p ZDB-2-LNC  |q ZDB-2-LNC_2018  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-030-00470-5  |l DE-384  |p ZDB-2-LNC  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-030-00470-5  |l DE-473  |p ZDB-2-LNC  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-030-00470-5  |l DE-19  |p ZDB-2-LNC  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-030-00470-5  |l DE-355  |p ZDB-2-SCS  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-030-00470-5  |l DE-703  |p ZDB-2-LNC  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-030-00470-5  |l DE-20  |p ZDB-2-LNC  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-030-00470-5  |l DE-706  |p ZDB-2-LNC  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-030-00470-5  |l DE-29  |p ZDB-2-LNC  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-030-00470-5  |l DE-739  |p ZDB-2-LNC  |x Verlag  |3 Volltext 

Datensatz im Suchindex

DE-BY-TUM_katkey 2372522
DE-BY-UBM_katkey 5689792
DE-BY-UBM_local_url Verlag
https://doi.org/10.1007/978-3-030-00470-5
_version_ 1823056641350696960
adam_text
any_adam_object
author2 Bailey, Michael 1953-
Holz, Thorsten
Stamatogiannakis, Manolis
Ioannidis, Sotiris
author2_role edt
edt
edt
edt
author2_variant m b mb
t h th
m s ms
s i si
author_GND (DE-588)140274022
(DE-588)138293430
author_corporate RAID Heraklion
author_corporate_role aut
author_facet Bailey, Michael 1953-
Holz, Thorsten
Stamatogiannakis, Manolis
Ioannidis, Sotiris
RAID Heraklion
author_sort RAID Heraklion
building Verbundindex
bvnumber BV045274717
classification_rvk SS 4800
classification_tum DAT 055f
DAT 462f
DAT 000
DAT 465f
collection ZDB-2-SCS
ZDB-2-LNC
ctrlnum (ZDB-2-SCS)9783030004705
(ZDB-2-LNC)9783030004705
(OCoLC)1066053283
(DE-599)BVBBV045274717
dewey-full 005.8
dewey-hundreds 000 - Computer science, information, general works
dewey-ones 005 - Computer programming, programs, data, security
dewey-raw 005.8
dewey-search 005.8
dewey-sort 15.8
dewey-tens 000 - Computer science, information, general works
discipline Informatik
doi_str_mv 10.1007/978-3-030-00470-5
format Electronic
Conference Proceeding
eBook
fullrecord <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>00000nam a2200000zcb4500</leader><controlfield tag="001">BV045274717</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20190114</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">181107s2018 xx a||| o|||| 10||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783030004705</subfield><subfield code="c">Online</subfield><subfield code="9">978-3-030-00470-5</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1007/978-3-030-00470-5</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-2-SCS)9783030004705</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-2-LNC)9783030004705</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1066053283</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV045274717</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-355</subfield><subfield code="a">DE-860</subfield><subfield code="a">DE-91</subfield><subfield code="a">DE-19</subfield><subfield code="a">DE-Aug4</subfield><subfield code="a">DE-898</subfield><subfield code="a">DE-861</subfield><subfield code="a">DE-523</subfield><subfield code="a">DE-859</subfield><subfield code="a">DE-473</subfield><subfield code="a">DE-29</subfield><subfield code="a">DE-863</subfield><subfield code="a">DE-20</subfield><subfield code="a">DE-862</subfield><subfield code="a">DE-92</subfield><subfield code="a">DE-384</subfield><subfield code="a">DE-573</subfield><subfield code="a">DE-M347</subfield><subfield code="a">DE-703</subfield><subfield code="a">DE-706</subfield><subfield code="a">DE-739</subfield><subfield code="a">DE-634</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 055f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 462f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 000</subfield><subfield code="2">stub</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 465f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="111" ind1="2" ind2=" "><subfield code="a">RAID</subfield><subfield code="n">21.</subfield><subfield code="d">2018</subfield><subfield code="c">Heraklion</subfield><subfield code="j">Verfasser</subfield><subfield code="0">(DE-588)1168770068</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Research in attacks, intrusions, and defenses</subfield><subfield code="b">21st International Symposium, RAID 2018, Heraklion, Crete, Greece, September 10-12, 2018 : proceedings</subfield><subfield code="c">Michael Bailey, Thorsten Holz, Manolis Stamatogiannakis, Sotiris Ioannidis (Eds.)</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Cham</subfield><subfield code="b">Springer</subfield><subfield code="c">[2018]</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (XIV, 712 Seiten)</subfield><subfield code="b">Illustrationen, Diagramme</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">Lecture notes in computer science</subfield><subfield code="v">11050</subfield><subfield code="a">Security and cryptology</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Systems and Data Security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computers and Society</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Legal Aspects of Computing</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Information Systems Applications (incl. Internet)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Operating Systems</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer Communication Networks</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data protection</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer science</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computers / Law and legislation</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Operating systems (Computers)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer Communication Networks</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Cloud Computing</subfield><subfield code="0">(DE-588)7623494-0</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Rechnernetz</subfield><subfield code="0">(DE-588)4070085-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kryptoanalyse</subfield><subfield code="0">(DE-588)4830502-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Eindringerkennung</subfield><subfield code="0">(DE-588)4706627-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Malware</subfield><subfield code="0">(DE-588)4687059-3</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Trusted Computing</subfield><subfield code="0">(DE-588)7562931-8</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)1071861417</subfield><subfield code="a">Konferenzschrift</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Eindringerkennung</subfield><subfield code="0">(DE-588)4706627-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Kryptoanalyse</subfield><subfield code="0">(DE-588)4830502-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Malware</subfield><subfield code="0">(DE-588)4687059-3</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="3"><subfield code="a">Trusted Computing</subfield><subfield code="0">(DE-588)7562931-8</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="4"><subfield code="a">Rechnernetz</subfield><subfield code="0">(DE-588)4070085-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="5"><subfield code="a">Cloud Computing</subfield><subfield code="0">(DE-588)7623494-0</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Bailey, Michael</subfield><subfield code="d">1953-</subfield><subfield code="0">(DE-588)140274022</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Holz, Thorsten</subfield><subfield code="0">(DE-588)138293430</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Stamatogiannakis, Manolis</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Ioannidis, Sotiris</subfield><subfield code="4">edt</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">978-3-030-00469-9</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">978-3-030-00471-2</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">Lecture notes in computer science</subfield><subfield code="v">11050 : Security and cryptology</subfield><subfield code="w">(DE-604)BV014880109</subfield><subfield code="9">11050</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1007/978-3-030-00470-5</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Erstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-2-SCS</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-2-LNC</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">ZDB-2-SCS_2018</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">ZDB-2-LNC_2018</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-030662403</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-030-00470-5</subfield><subfield code="l">DE-634</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-030-00470-5</subfield><subfield code="l">DE-Aug4</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-030-00470-5</subfield><subfield code="l">DE-573</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-030-00470-5</subfield><subfield code="l">DE-M347</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-030-00470-5</subfield><subfield code="l">DE-92</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-030-00470-5</subfield><subfield code="l">DE-898</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-030-00470-5</subfield><subfield code="l">DE-859</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-030-00470-5</subfield><subfield code="l">DE-860</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-030-00470-5</subfield><subfield code="l">DE-861</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-030-00470-5</subfield><subfield code="l">DE-863</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-030-00470-5</subfield><subfield code="l">DE-862</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-030-00470-5</subfield><subfield code="l">DE-523</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-030-00470-5</subfield><subfield code="l">DE-91</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="q">ZDB-2-LNC_2018</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-030-00470-5</subfield><subfield code="l">DE-384</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-030-00470-5</subfield><subfield code="l">DE-473</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-030-00470-5</subfield><subfield code="l">DE-19</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-030-00470-5</subfield><subfield code="l">DE-355</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-030-00470-5</subfield><subfield code="l">DE-703</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-030-00470-5</subfield><subfield code="l">DE-20</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-030-00470-5</subfield><subfield code="l">DE-706</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-030-00470-5</subfield><subfield code="l">DE-29</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-030-00470-5</subfield><subfield code="l">DE-739</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection>
genre (DE-588)1071861417 Konferenzschrift gnd-content
genre_facet Konferenzschrift
id DE-604.BV045274717
illustrated Illustrated
indexdate 2025-02-03T17:57:29Z
institution BVB
institution_GND (DE-588)1168770068
isbn 9783030004705
language English
oai_aleph_id oai:aleph.bib-bvb.de:BVB01-030662403
oclc_num 1066053283
open_access_boolean
owner DE-355
DE-BY-UBR
DE-860
DE-91
DE-BY-TUM
DE-19
DE-BY-UBM
DE-Aug4
DE-898
DE-BY-UBR
DE-861
DE-523
DE-859
DE-473
DE-BY-UBG
DE-29
DE-863
DE-BY-FWS
DE-20
DE-862
DE-BY-FWS
DE-92
DE-384
DE-573
DE-M347
DE-703
DE-706
DE-739
DE-634
owner_facet DE-355
DE-BY-UBR
DE-860
DE-91
DE-BY-TUM
DE-19
DE-BY-UBM
DE-Aug4
DE-898
DE-BY-UBR
DE-861
DE-523
DE-859
DE-473
DE-BY-UBG
DE-29
DE-863
DE-BY-FWS
DE-20
DE-862
DE-BY-FWS
DE-92
DE-384
DE-573
DE-M347
DE-703
DE-706
DE-739
DE-634
physical 1 Online-Ressource (XIV, 712 Seiten) Illustrationen, Diagramme
psigel ZDB-2-SCS
ZDB-2-LNC
ZDB-2-SCS_2018
ZDB-2-LNC_2018
ZDB-2-LNC ZDB-2-LNC_2018
publishDate 2018
publishDateSearch 2018
publishDateSort 2018
publisher Springer
record_format marc
series Lecture notes in computer science
series2 Lecture notes in computer science
Security and cryptology
spellingShingle Research in attacks, intrusions, and defenses 21st International Symposium, RAID 2018, Heraklion, Crete, Greece, September 10-12, 2018 : proceedings
Lecture notes in computer science
Systems and Data Security
Computers and Society
Legal Aspects of Computing
Information Systems Applications (incl. Internet)
Operating Systems
Computer Communication Networks
Data protection
Computer science
Computers / Law and legislation
Operating systems (Computers)
Cloud Computing (DE-588)7623494-0 gnd
Rechnernetz (DE-588)4070085-9 gnd
Kryptoanalyse (DE-588)4830502-9 gnd
Eindringerkennung (DE-588)4706627-1 gnd
Malware (DE-588)4687059-3 gnd
Trusted Computing (DE-588)7562931-8 gnd
subject_GND (DE-588)7623494-0
(DE-588)4070085-9
(DE-588)4830502-9
(DE-588)4706627-1
(DE-588)4687059-3
(DE-588)7562931-8
(DE-588)1071861417
title Research in attacks, intrusions, and defenses 21st International Symposium, RAID 2018, Heraklion, Crete, Greece, September 10-12, 2018 : proceedings
title_auth Research in attacks, intrusions, and defenses 21st International Symposium, RAID 2018, Heraklion, Crete, Greece, September 10-12, 2018 : proceedings
title_exact_search Research in attacks, intrusions, and defenses 21st International Symposium, RAID 2018, Heraklion, Crete, Greece, September 10-12, 2018 : proceedings
title_full Research in attacks, intrusions, and defenses 21st International Symposium, RAID 2018, Heraklion, Crete, Greece, September 10-12, 2018 : proceedings Michael Bailey, Thorsten Holz, Manolis Stamatogiannakis, Sotiris Ioannidis (Eds.)
title_fullStr Research in attacks, intrusions, and defenses 21st International Symposium, RAID 2018, Heraklion, Crete, Greece, September 10-12, 2018 : proceedings Michael Bailey, Thorsten Holz, Manolis Stamatogiannakis, Sotiris Ioannidis (Eds.)
title_full_unstemmed Research in attacks, intrusions, and defenses 21st International Symposium, RAID 2018, Heraklion, Crete, Greece, September 10-12, 2018 : proceedings Michael Bailey, Thorsten Holz, Manolis Stamatogiannakis, Sotiris Ioannidis (Eds.)
title_short Research in attacks, intrusions, and defenses
title_sort research in attacks intrusions and defenses 21st international symposium raid 2018 heraklion crete greece september 10 12 2018 proceedings
title_sub 21st International Symposium, RAID 2018, Heraklion, Crete, Greece, September 10-12, 2018 : proceedings
topic Systems and Data Security
Computers and Society
Legal Aspects of Computing
Information Systems Applications (incl. Internet)
Operating Systems
Computer Communication Networks
Data protection
Computer science
Computers / Law and legislation
Operating systems (Computers)
Cloud Computing (DE-588)7623494-0 gnd
Rechnernetz (DE-588)4070085-9 gnd
Kryptoanalyse (DE-588)4830502-9 gnd
Eindringerkennung (DE-588)4706627-1 gnd
Malware (DE-588)4687059-3 gnd
Trusted Computing (DE-588)7562931-8 gnd
topic_facet Systems and Data Security
Computers and Society
Legal Aspects of Computing
Information Systems Applications (incl. Internet)
Operating Systems
Computer Communication Networks
Data protection
Computer science
Computers / Law and legislation
Operating systems (Computers)
Cloud Computing
Rechnernetz
Kryptoanalyse
Eindringerkennung
Malware
Trusted Computing
Konferenzschrift
url https://doi.org/10.1007/978-3-030-00470-5
volume_link (DE-604)BV014880109
work_keys_str_mv AT raidheraklion researchinattacksintrusionsanddefenses21stinternationalsymposiumraid2018heraklioncretegreeceseptember10122018proceedings
AT baileymichael researchinattacksintrusionsanddefenses21stinternationalsymposiumraid2018heraklioncretegreeceseptember10122018proceedings
AT holzthorsten researchinattacksintrusionsanddefenses21stinternationalsymposiumraid2018heraklioncretegreeceseptember10122018proceedings
AT stamatogiannakismanolis researchinattacksintrusionsanddefenses21stinternationalsymposiumraid2018heraklioncretegreeceseptember10122018proceedings
AT ioannidissotiris researchinattacksintrusionsanddefenses21stinternationalsymposiumraid2018heraklioncretegreeceseptember10122018proceedings