Machine learning for cyber security third international conference, ML4CS 2020, Guangzhou, China, October 8–10, 2020, proceedings, part I

Gespeichert in:
Bibliographische Detailangaben
Körperschaft: ML4CS Kanton, Stadt (VerfasserIn)
Weitere Verfasser: Chen, Xiaofeng (HerausgeberIn), Yan, Hongyang (HerausgeberIn), Yan, Qiben (HerausgeberIn), Zhang, Xiangliang (HerausgeberIn)
Format: Elektronisch Tagungsbericht E-Book
Sprache:English
Veröffentlicht: Cham, Switzerland Springer [2020]
Schriftenreihe:Lecture notes in computer science 12486
Schlagworte:
Online-Zugang:BTU01
FHA01
FHI01
FHM01
FHN01
FHR01
FKE01
FLA01
FRO01
FWS01
FWS02
HTW01
TUM01
UBA01
UBG01
UBM01
UBR01
UBT01
UBW01
UBY01
UER01
UPA01
URL des Erstveröffentlichers
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!

MARC

LEADER 00000nmm a2200000zcb4500
001 BV047047132
003 DE-604
005 20220301
006 a |||| 10|||
007 cr|uuu---uuuuu
008 201207s2020 |||| o||u| ||||||eng d
020 |a 9783030622237  |c Online  |9 978-3-030-62223-7 
024 7 |a 10.1007/978-3-030-62223-7  |2 doi 
035 |a (ZDB-2-SCS)9783030622237 
035 |a (ZDB-2-LNC)9783030622237 
035 |a (OCoLC)1226705696 
035 |a (DE-599)BVBBV047047132 
040 |a DE-604  |b ger  |e rda 
041 0 |a eng 
049 |a DE-573  |a DE-860  |a DE-91  |a DE-19  |a DE-Aug4  |a DE-898  |a DE-861  |a DE-188  |a DE-523  |a DE-859  |a DE-473  |a DE-29  |a DE-863  |a DE-20  |a DE-862  |a DE-92  |a DE-355  |a DE-384  |a DE-M347  |a DE-703  |a DE-706  |a DE-739  |a DE-634 
082 0 |a 005.8  |2 23 
084 |a DAT 000  |2 stub 
111 2 |a ML4CS  |n 3.  |d 2020  |c Kanton, Stadt  |j Verfasser  |0 (DE-588)1224987179  |4 aut 
245 1 0 |a Machine learning for cyber security  |b third international conference, ML4CS 2020, Guangzhou, China, October 8–10, 2020, proceedings, part I  |c Xiaofeng Chen, Hongyang Yan, Qiben Yan, Xiangliang Zhang (eds.) 
264 1 |a Cham, Switzerland  |b Springer  |c [2020] 
300 |a 1 Online-Ressource (xxvii, 650 Seiten)  |b 282 Illustrationen, 183 in Farbe 
336 |b txt  |2 rdacontent 
337 |b c  |2 rdamedia 
338 |b cr  |2 rdacarrier 
490 1 |a Lecture notes in computer science  |v 12486  |a Security and cryptology 
650 4 |a Systems and Data Security 
650 4 |a Computer Appl. in Social and Behavioral Sciences 
650 4 |a Computers and Education 
650 4 |a Computers and Society 
650 4 |a Cryptology 
650 4 |a Security Services 
650 4 |a Computer security 
650 4 |a Application software 
650 4 |a Education—Data processing 
650 4 |a Computers and civilization 
650 4 |a Data encryption (Computer science) 
650 0 7 |a Datensicherung  |0 (DE-588)4011144-1  |2 gnd  |9 rswk-swf 
650 0 7 |a Computerkriminalität  |0 (DE-588)4010452-7  |2 gnd  |9 rswk-swf 
650 0 7 |a Kryptologie  |0 (DE-588)4033329-2  |2 gnd  |9 rswk-swf 
655 7 |0 (DE-588)1071861417  |a Konferenzschrift  |y 2020  |z Kanton, Stadt  |2 gnd-content 
689 0 0 |a Datensicherung  |0 (DE-588)4011144-1  |D s 
689 0 1 |a Kryptologie  |0 (DE-588)4033329-2  |D s 
689 0 2 |a Computerkriminalität  |0 (DE-588)4010452-7  |D s 
689 0 |5 DE-604 
700 1 |a Chen, Xiaofeng  |4 edt 
700 1 |a Yan, Hongyang  |4 edt 
700 1 |a Yan, Qiben  |4 edt 
700 1 |a Zhang, Xiangliang  |4 edt 
776 0 8 |i Erscheint auch als  |n Druck-Ausgabe  |z 978-3-030-62222-0 
776 0 8 |i Erscheint auch als  |n Druck-Ausgabe  |z 978-3-030-62224-4 
830 0 |a Lecture notes in computer science  |v 12486  |w (DE-604)BV014880109  |9 12486 
856 4 0 |u https://doi.org/10.1007/978-3-030-62223-7  |x Verlag  |z URL des Erstveröffentlichers  |3 Volltext 
912 |a ZDB-2-SCS  |a ZDB-2-LNC 
940 1 |q ZDB-2-SCS_2020 
940 1 |q ZDB-2-LNC_2020 
999 |a oai:aleph.bib-bvb.de:BVB01-032454534 
966 e |u https://doi.org/10.1007/978-3-030-62223-7  |l BTU01  |p ZDB-2-LNC  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-030-62223-7  |l FHA01  |p ZDB-2-LNC  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-030-62223-7  |l FHI01  |p ZDB-2-SCS  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-030-62223-7  |l FHM01  |p ZDB-2-LNC  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-030-62223-7  |l FHN01  |p ZDB-2-LNC  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-030-62223-7  |l FHR01  |p ZDB-2-LNC  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-030-62223-7  |l FKE01  |p ZDB-2-LNC  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-030-62223-7  |l FLA01  |p ZDB-2-LNC  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-030-62223-7  |l FRO01  |p ZDB-2-LNC  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-030-62223-7  |l FWS01  |p ZDB-2-LNC  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-030-62223-7  |l FWS02  |p ZDB-2-LNC  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-030-62223-7  |l HTW01  |p ZDB-2-LNC  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-030-62223-7  |l TUM01  |p ZDB-2-LNC  |q ZDB-2-LNC_2020  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-030-62223-7  |l UBA01  |p ZDB-2-LNC  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-030-62223-7  |l UBG01  |p ZDB-2-LNC  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-030-62223-7  |l UBM01  |p ZDB-2-LNC  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-030-62223-7  |l UBR01  |p ZDB-2-LNC  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-030-62223-7  |l UBT01  |p ZDB-2-LNC  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-030-62223-7  |l UBW01  |p ZDB-2-LNC  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-030-62223-7  |l UBY01  |p ZDB-2-LNC  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-030-62223-7  |l UER01  |p ZDB-2-LNC  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-030-62223-7  |l UPA01  |p ZDB-2-LNC  |x Verlag  |3 Volltext 

Datensatz im Suchindex

DE-BY-FWS_katkey 862144
DE-BY-TUM_katkey 2513723
DE-BY-TUM_local_url https://doi.org/10.1007/978-3-030-62223-7
Verlag
DE-BY-UBG_katkey 196719485
DE-BY-UBG_local_url https://doi.org/10.1007/978-3-030-62223-7
Verlag
_version_ 1816714636748128256
adam_txt
any_adam_object
any_adam_object_boolean
author2 Chen, Xiaofeng
Yan, Hongyang
Yan, Qiben
Zhang, Xiangliang
author2_role edt
edt
edt
edt
author2_variant x c xc
h y hy
q y qy
x z xz
author_corporate ML4CS Kanton, Stadt
author_corporate_role aut
author_facet Chen, Xiaofeng
Yan, Hongyang
Yan, Qiben
Zhang, Xiangliang
ML4CS Kanton, Stadt
author_sort ML4CS Kanton, Stadt
building Verbundindex
bvnumber BV047047132
classification_tum DAT 000
collection ZDB-2-SCS
ZDB-2-LNC
ctrlnum (ZDB-2-SCS)9783030622237
(ZDB-2-LNC)9783030622237
(OCoLC)1226705696
(DE-599)BVBBV047047132
dewey-full 005.8
dewey-hundreds 000 - Computer science, information, general works
dewey-ones 005 - Computer programming, programs, data, security
dewey-raw 005.8
dewey-search 005.8
dewey-sort 15.8
dewey-tens 000 - Computer science, information, general works
discipline Informatik
discipline_str_mv Informatik
doi_str_mv 10.1007/978-3-030-62223-7
format Electronic
Conference Proceeding
eBook
fullrecord <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>05027nmm a2200961zcb4500</leader><controlfield tag="001">BV047047132</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20220301 </controlfield><controlfield tag="006">a |||| 10||| </controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">201207s2020 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783030622237</subfield><subfield code="c">Online</subfield><subfield code="9">978-3-030-62223-7</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1007/978-3-030-62223-7</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-2-SCS)9783030622237</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-2-LNC)9783030622237</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1226705696</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV047047132</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-573</subfield><subfield code="a">DE-860</subfield><subfield code="a">DE-91</subfield><subfield code="a">DE-19</subfield><subfield code="a">DE-Aug4</subfield><subfield code="a">DE-898</subfield><subfield code="a">DE-861</subfield><subfield code="a">DE-188</subfield><subfield code="a">DE-523</subfield><subfield code="a">DE-859</subfield><subfield code="a">DE-473</subfield><subfield code="a">DE-29</subfield><subfield code="a">DE-863</subfield><subfield code="a">DE-20</subfield><subfield code="a">DE-862</subfield><subfield code="a">DE-92</subfield><subfield code="a">DE-355</subfield><subfield code="a">DE-384</subfield><subfield code="a">DE-M347</subfield><subfield code="a">DE-703</subfield><subfield code="a">DE-706</subfield><subfield code="a">DE-739</subfield><subfield code="a">DE-634</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 000</subfield><subfield code="2">stub</subfield></datafield><datafield tag="111" ind1="2" ind2=" "><subfield code="a">ML4CS</subfield><subfield code="n">3.</subfield><subfield code="d">2020</subfield><subfield code="c">Kanton, Stadt</subfield><subfield code="j">Verfasser</subfield><subfield code="0">(DE-588)1224987179</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Machine learning for cyber security</subfield><subfield code="b">third international conference, ML4CS 2020, Guangzhou, China, October 8–10, 2020, proceedings, part I</subfield><subfield code="c">Xiaofeng Chen, Hongyang Yan, Qiben Yan, Xiangliang Zhang (eds.)</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Cham, Switzerland</subfield><subfield code="b">Springer</subfield><subfield code="c">[2020]</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (xxvii, 650 Seiten)</subfield><subfield code="b">282 Illustrationen, 183 in Farbe</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">Lecture notes in computer science</subfield><subfield code="v">12486</subfield><subfield code="a">Security and cryptology</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Systems and Data Security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer Appl. in Social and Behavioral Sciences</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computers and Education</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computers and Society</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cryptology</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Security Services</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Application software</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Education—Data processing</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computers and civilization</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data encryption (Computer science)</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computerkriminalität</subfield><subfield code="0">(DE-588)4010452-7</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kryptologie</subfield><subfield code="0">(DE-588)4033329-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)1071861417</subfield><subfield code="a">Konferenzschrift</subfield><subfield code="y">2020</subfield><subfield code="z">Kanton, Stadt</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Kryptologie</subfield><subfield code="0">(DE-588)4033329-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Computerkriminalität</subfield><subfield code="0">(DE-588)4010452-7</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Chen, Xiaofeng</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Yan, Hongyang</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Yan, Qiben</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Zhang, Xiangliang</subfield><subfield code="4">edt</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">978-3-030-62222-0</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">978-3-030-62224-4</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">Lecture notes in computer science</subfield><subfield code="v">12486</subfield><subfield code="w">(DE-604)BV014880109</subfield><subfield code="9">12486</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1007/978-3-030-62223-7</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Erstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-2-SCS</subfield><subfield code="a">ZDB-2-LNC</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">ZDB-2-SCS_2020</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">ZDB-2-LNC_2020</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-032454534</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-030-62223-7</subfield><subfield code="l">BTU01</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-030-62223-7</subfield><subfield code="l">FHA01</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-030-62223-7</subfield><subfield code="l">FHI01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-030-62223-7</subfield><subfield code="l">FHM01</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-030-62223-7</subfield><subfield code="l">FHN01</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-030-62223-7</subfield><subfield code="l">FHR01</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-030-62223-7</subfield><subfield code="l">FKE01</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-030-62223-7</subfield><subfield code="l">FLA01</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-030-62223-7</subfield><subfield code="l">FRO01</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-030-62223-7</subfield><subfield code="l">FWS01</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-030-62223-7</subfield><subfield code="l">FWS02</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-030-62223-7</subfield><subfield code="l">HTW01</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-030-62223-7</subfield><subfield code="l">TUM01</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="q">ZDB-2-LNC_2020</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-030-62223-7</subfield><subfield code="l">UBA01</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-030-62223-7</subfield><subfield code="l">UBG01</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-030-62223-7</subfield><subfield code="l">UBM01</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-030-62223-7</subfield><subfield code="l">UBR01</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-030-62223-7</subfield><subfield code="l">UBT01</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-030-62223-7</subfield><subfield code="l">UBW01</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-030-62223-7</subfield><subfield code="l">UBY01</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-030-62223-7</subfield><subfield code="l">UER01</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-030-62223-7</subfield><subfield code="l">UPA01</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection>
genre (DE-588)1071861417 Konferenzschrift 2020 Kanton, Stadt gnd-content
genre_facet Konferenzschrift 2020 Kanton, Stadt
id DE-604.BV047047132
illustrated Not Illustrated
index_date 2024-07-03T16:07:20Z
indexdate 2024-11-25T17:57:35Z
institution BVB
institution_GND (DE-588)1224987179
isbn 9783030622237
language English
oai_aleph_id oai:aleph.bib-bvb.de:BVB01-032454534
oclc_num 1226705696
open_access_boolean
owner DE-573
DE-860
DE-91
DE-BY-TUM
DE-19
DE-BY-UBM
DE-Aug4
DE-898
DE-BY-UBR
DE-861
DE-188
DE-523
DE-859
DE-473
DE-BY-UBG
DE-29
DE-863
DE-BY-FWS
DE-20
DE-862
DE-BY-FWS
DE-92
DE-355
DE-BY-UBR
DE-384
DE-M347
DE-703
DE-706
DE-739
DE-634
owner_facet DE-573
DE-860
DE-91
DE-BY-TUM
DE-19
DE-BY-UBM
DE-Aug4
DE-898
DE-BY-UBR
DE-861
DE-188
DE-523
DE-859
DE-473
DE-BY-UBG
DE-29
DE-863
DE-BY-FWS
DE-20
DE-862
DE-BY-FWS
DE-92
DE-355
DE-BY-UBR
DE-384
DE-M347
DE-703
DE-706
DE-739
DE-634
physical 1 Online-Ressource (xxvii, 650 Seiten) 282 Illustrationen, 183 in Farbe
psigel ZDB-2-SCS
ZDB-2-LNC
ZDB-2-SCS_2020
ZDB-2-LNC_2020
ZDB-2-LNC ZDB-2-LNC_2020
publishDate 2020
publishDateSearch 2020
publishDateSort 2020
publisher Springer
record_format marc
series Lecture notes in computer science
series2 Lecture notes in computer science
Security and cryptology
spellingShingle Machine learning for cyber security third international conference, ML4CS 2020, Guangzhou, China, October 8–10, 2020, proceedings, part I
Lecture notes in computer science
Systems and Data Security
Computer Appl. in Social and Behavioral Sciences
Computers and Education
Computers and Society
Cryptology
Security Services
Computer security
Application software
Education—Data processing
Computers and civilization
Data encryption (Computer science)
Datensicherung (DE-588)4011144-1 gnd
Computerkriminalität (DE-588)4010452-7 gnd
Kryptologie (DE-588)4033329-2 gnd
subject_GND (DE-588)4011144-1
(DE-588)4010452-7
(DE-588)4033329-2
(DE-588)1071861417
title Machine learning for cyber security third international conference, ML4CS 2020, Guangzhou, China, October 8–10, 2020, proceedings, part I
title_auth Machine learning for cyber security third international conference, ML4CS 2020, Guangzhou, China, October 8–10, 2020, proceedings, part I
title_exact_search Machine learning for cyber security third international conference, ML4CS 2020, Guangzhou, China, October 8–10, 2020, proceedings, part I
title_exact_search_txtP Machine learning for cyber security third international conference, ML4CS 2020, Guangzhou, China, October 8–10, 2020, proceedings, part I
title_full Machine learning for cyber security third international conference, ML4CS 2020, Guangzhou, China, October 8–10, 2020, proceedings, part I Xiaofeng Chen, Hongyang Yan, Qiben Yan, Xiangliang Zhang (eds.)
title_fullStr Machine learning for cyber security third international conference, ML4CS 2020, Guangzhou, China, October 8–10, 2020, proceedings, part I Xiaofeng Chen, Hongyang Yan, Qiben Yan, Xiangliang Zhang (eds.)
title_full_unstemmed Machine learning for cyber security third international conference, ML4CS 2020, Guangzhou, China, October 8–10, 2020, proceedings, part I Xiaofeng Chen, Hongyang Yan, Qiben Yan, Xiangliang Zhang (eds.)
title_short Machine learning for cyber security
title_sort machine learning for cyber security third international conference ml4cs 2020 guangzhou china october 8 10 2020 proceedings part i
title_sub third international conference, ML4CS 2020, Guangzhou, China, October 8–10, 2020, proceedings, part I
topic Systems and Data Security
Computer Appl. in Social and Behavioral Sciences
Computers and Education
Computers and Society
Cryptology
Security Services
Computer security
Application software
Education—Data processing
Computers and civilization
Data encryption (Computer science)
Datensicherung (DE-588)4011144-1 gnd
Computerkriminalität (DE-588)4010452-7 gnd
Kryptologie (DE-588)4033329-2 gnd
topic_facet Systems and Data Security
Computer Appl. in Social and Behavioral Sciences
Computers and Education
Computers and Society
Cryptology
Security Services
Computer security
Application software
Education—Data processing
Computers and civilization
Data encryption (Computer science)
Datensicherung
Computerkriminalität
Kryptologie
Konferenzschrift 2020 Kanton, Stadt
url https://doi.org/10.1007/978-3-030-62223-7
volume_link (DE-604)BV014880109
work_keys_str_mv AT ml4cskantonstadt machinelearningforcybersecuritythirdinternationalconferenceml4cs2020guangzhouchinaoctober8102020proceedingsparti
AT chenxiaofeng machinelearningforcybersecuritythirdinternationalconferenceml4cs2020guangzhouchinaoctober8102020proceedingsparti
AT yanhongyang machinelearningforcybersecuritythirdinternationalconferenceml4cs2020guangzhouchinaoctober8102020proceedingsparti
AT yanqiben machinelearningforcybersecuritythirdinternationalconferenceml4cs2020guangzhouchinaoctober8102020proceedingsparti
AT zhangxiangliang machinelearningforcybersecuritythirdinternationalconferenceml4cs2020guangzhouchinaoctober8102020proceedingsparti