Machine learning for cyber security third international conference, ML4CS 2020, Guangzhou, China, October 8–10, 2020, proceedings, part II

Gespeichert in:
Bibliographische Detailangaben
Körperschaft: ML4CS Kanton, Stadt (VerfasserIn)
Weitere Verfasser: Chen, Xiaofeng (HerausgeberIn), Yan, Hongyang (HerausgeberIn), Yan, Qiben (HerausgeberIn), Zhang, Xiangliang (HerausgeberIn)
Format: Elektronisch Tagungsbericht E-Book
Sprache:English
Veröffentlicht: Cham, Switzerland Springer [2020]
Schriftenreihe:Lecture notes in computer science 12487
Schlagworte:
Online-Zugang:BTU01
FHA01
FHI01
FHM01
FHN01
FHR01
FKE01
FLA01
FRO01
FWS01
FWS02
HTW01
TUM01
UBA01
UBG01
UBM01
UBR01
UBT01
UBW01
UBY01
UER01
UPA01
URL des Erstveröffentlichers
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!

MARC

LEADER 00000nmm a2200000zcb4500
001 BV047047134
003 DE-604
005 20220301
006 a |||| 10|||
007 cr|uuu---uuuuu
008 201207s2020 |||| o||u| ||||||eng d
020 |a 9783030624606  |c Online  |9 978-3-030-62460-6 
024 7 |a 10.1007/978-3-030-62460-6  |2 doi 
035 |a (ZDB-2-SCS)9783030624606 
035 |a (ZDB-2-LNC)9783030624606 
035 |a (OCoLC)1226699312 
035 |a (DE-599)BVBBV047047134 
040 |a DE-604  |b ger  |e rda 
041 0 |a eng 
049 |a DE-573  |a DE-860  |a DE-91  |a DE-19  |a DE-Aug4  |a DE-898  |a DE-861  |a DE-188  |a DE-523  |a DE-859  |a DE-473  |a DE-29  |a DE-863  |a DE-20  |a DE-862  |a DE-92  |a DE-355  |a DE-384  |a DE-M347  |a DE-703  |a DE-706  |a DE-739  |a DE-634 
082 0 |a 005.8  |2 23 
084 |a DAT 000  |2 stub 
111 2 |a ML4CS  |n 3.  |d 2020  |c Kanton, Stadt  |j Verfasser  |0 (DE-588)1224987179  |4 aut 
245 1 0 |a Machine learning for cyber security  |b third international conference, ML4CS 2020, Guangzhou, China, October 8–10, 2020, proceedings, part II  |c Xiaofeng Chen, Hongyang Yan, Qiben Yan, Xiangliang Zhang (eds.) 
264 1 |a Cham, Switzerland  |b Springer  |c [2020] 
300 |a 1 Online-Ressource (xv, 608 Seiten)  |b 246 Illustrationen, 181 in Farbe 
336 |b txt  |2 rdacontent 
337 |b c  |2 rdamedia 
338 |b cr  |2 rdacarrier 
490 1 |a Lecture notes in computer science  |v 12487  |a Security and cryptology 
650 4 |a Systems and Data Security 
650 4 |a Computer Appl. in Social and Behavioral Sciences 
650 4 |a Computers and Education 
650 4 |a Legal Aspects of Computing 
650 4 |a Cryptology 
650 4 |a Mobile and Network Security 
650 4 |a Computer security 
650 4 |a Application software 
650 4 |a Education—Data processing 
650 4 |a Computers 
650 4 |a Law and legislation 
650 4 |a Data encryption (Computer science) 
650 4 |a Computer networks / Security measures 
650 0 7 |a Kryptologie  |0 (DE-588)4033329-2  |2 gnd  |9 rswk-swf 
650 0 7 |a Datensicherung  |0 (DE-588)4011144-1  |2 gnd  |9 rswk-swf 
650 0 7 |a Computerkriminalität  |0 (DE-588)4010452-7  |2 gnd  |9 rswk-swf 
655 7 |0 (DE-588)1071861417  |a Konferenzschrift  |y 2020  |z Kanton, Stadt  |2 gnd-content 
689 0 0 |a Datensicherung  |0 (DE-588)4011144-1  |D s 
689 0 1 |a Kryptologie  |0 (DE-588)4033329-2  |D s 
689 0 2 |a Computerkriminalität  |0 (DE-588)4010452-7  |D s 
689 0 |5 DE-604 
700 1 |a Chen, Xiaofeng  |4 edt 
700 1 |a Yan, Hongyang  |4 edt 
700 1 |a Yan, Qiben  |4 edt 
700 1 |a Zhang, Xiangliang  |4 edt 
776 0 8 |i Erscheint auch als  |n Druck-Ausgabe  |z 978-3-030-62459-0 
776 0 8 |i Erscheint auch als  |n Druck-Ausgabe  |z 978-3-030-62461-3 
830 0 |a Lecture notes in computer science  |v 12487  |w (DE-604)BV014880109  |9 12487 
856 4 0 |u https://doi.org/10.1007/978-3-030-62460-6  |x Verlag  |z URL des Erstveröffentlichers  |3 Volltext 
912 |a ZDB-2-SCS  |a ZDB-2-LNC 
940 1 |q ZDB-2-SCS_2020 
940 1 |q ZDB-2-LNC_2020 
999 |a oai:aleph.bib-bvb.de:BVB01-032454536 
966 e |u https://doi.org/10.1007/978-3-030-62460-6  |l BTU01  |p ZDB-2-LNC  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-030-62460-6  |l FHA01  |p ZDB-2-LNC  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-030-62460-6  |l FHI01  |p ZDB-2-SCS  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-030-62460-6  |l FHM01  |p ZDB-2-LNC  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-030-62460-6  |l FHN01  |p ZDB-2-LNC  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-030-62460-6  |l FHR01  |p ZDB-2-LNC  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-030-62460-6  |l FKE01  |p ZDB-2-LNC  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-030-62460-6  |l FLA01  |p ZDB-2-LNC  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-030-62460-6  |l FRO01  |p ZDB-2-LNC  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-030-62460-6  |l FWS01  |p ZDB-2-LNC  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-030-62460-6  |l FWS02  |p ZDB-2-LNC  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-030-62460-6  |l HTW01  |p ZDB-2-LNC  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-030-62460-6  |l TUM01  |p ZDB-2-LNC  |q ZDB-2-LNC_2020  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-030-62460-6  |l UBA01  |p ZDB-2-LNC  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-030-62460-6  |l UBG01  |p ZDB-2-LNC  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-030-62460-6  |l UBM01  |p ZDB-2-LNC  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-030-62460-6  |l UBR01  |p ZDB-2-LNC  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-030-62460-6  |l UBT01  |p ZDB-2-LNC  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-030-62460-6  |l UBW01  |p ZDB-2-LNC  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-030-62460-6  |l UBY01  |p ZDB-2-LNC  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-030-62460-6  |l UER01  |p ZDB-2-LNC  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-030-62460-6  |l UPA01  |p ZDB-2-LNC  |x Verlag  |3 Volltext 

Datensatz im Suchindex

DE-BY-FWS_katkey 862146
DE-BY-TUM_katkey 2513725
DE-BY-TUM_local_url https://doi.org/10.1007/978-3-030-62460-6
Verlag
DE-BY-UBG_katkey 196719487
DE-BY-UBG_local_url https://doi.org/10.1007/978-3-030-62460-6
Verlag
_version_ 1816714636738691072
adam_txt
any_adam_object
any_adam_object_boolean
author2 Chen, Xiaofeng
Yan, Hongyang
Yan, Qiben
Zhang, Xiangliang
author2_role edt
edt
edt
edt
author2_variant x c xc
h y hy
q y qy
x z xz
author_corporate ML4CS Kanton, Stadt
author_corporate_role aut
author_facet Chen, Xiaofeng
Yan, Hongyang
Yan, Qiben
Zhang, Xiangliang
ML4CS Kanton, Stadt
author_sort ML4CS Kanton, Stadt
building Verbundindex
bvnumber BV047047134
classification_tum DAT 000
collection ZDB-2-SCS
ZDB-2-LNC
ctrlnum (ZDB-2-SCS)9783030624606
(ZDB-2-LNC)9783030624606
(OCoLC)1226699312
(DE-599)BVBBV047047134
dewey-full 005.8
dewey-hundreds 000 - Computer science, information, general works
dewey-ones 005 - Computer programming, programs, data, security
dewey-raw 005.8
dewey-search 005.8
dewey-sort 15.8
dewey-tens 000 - Computer science, information, general works
discipline Informatik
discipline_str_mv Informatik
doi_str_mv 10.1007/978-3-030-62460-6
format Electronic
Conference Proceeding
eBook
fullrecord <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>05113nmm a2200985zcb4500</leader><controlfield tag="001">BV047047134</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20220301 </controlfield><controlfield tag="006">a |||| 10||| </controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">201207s2020 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783030624606</subfield><subfield code="c">Online</subfield><subfield code="9">978-3-030-62460-6</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1007/978-3-030-62460-6</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-2-SCS)9783030624606</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-2-LNC)9783030624606</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1226699312</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV047047134</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-573</subfield><subfield code="a">DE-860</subfield><subfield code="a">DE-91</subfield><subfield code="a">DE-19</subfield><subfield code="a">DE-Aug4</subfield><subfield code="a">DE-898</subfield><subfield code="a">DE-861</subfield><subfield code="a">DE-188</subfield><subfield code="a">DE-523</subfield><subfield code="a">DE-859</subfield><subfield code="a">DE-473</subfield><subfield code="a">DE-29</subfield><subfield code="a">DE-863</subfield><subfield code="a">DE-20</subfield><subfield code="a">DE-862</subfield><subfield code="a">DE-92</subfield><subfield code="a">DE-355</subfield><subfield code="a">DE-384</subfield><subfield code="a">DE-M347</subfield><subfield code="a">DE-703</subfield><subfield code="a">DE-706</subfield><subfield code="a">DE-739</subfield><subfield code="a">DE-634</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 000</subfield><subfield code="2">stub</subfield></datafield><datafield tag="111" ind1="2" ind2=" "><subfield code="a">ML4CS</subfield><subfield code="n">3.</subfield><subfield code="d">2020</subfield><subfield code="c">Kanton, Stadt</subfield><subfield code="j">Verfasser</subfield><subfield code="0">(DE-588)1224987179</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Machine learning for cyber security</subfield><subfield code="b">third international conference, ML4CS 2020, Guangzhou, China, October 8–10, 2020, proceedings, part II</subfield><subfield code="c">Xiaofeng Chen, Hongyang Yan, Qiben Yan, Xiangliang Zhang (eds.)</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Cham, Switzerland</subfield><subfield code="b">Springer</subfield><subfield code="c">[2020]</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (xv, 608 Seiten)</subfield><subfield code="b">246 Illustrationen, 181 in Farbe</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">Lecture notes in computer science</subfield><subfield code="v">12487</subfield><subfield code="a">Security and cryptology</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Systems and Data Security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer Appl. in Social and Behavioral Sciences</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computers and Education</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Legal Aspects of Computing</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cryptology</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Mobile and Network Security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Application software</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Education—Data processing</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computers</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Law and legislation</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data encryption (Computer science)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks / Security measures</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kryptologie</subfield><subfield code="0">(DE-588)4033329-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computerkriminalität</subfield><subfield code="0">(DE-588)4010452-7</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)1071861417</subfield><subfield code="a">Konferenzschrift</subfield><subfield code="y">2020</subfield><subfield code="z">Kanton, Stadt</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Kryptologie</subfield><subfield code="0">(DE-588)4033329-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Computerkriminalität</subfield><subfield code="0">(DE-588)4010452-7</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Chen, Xiaofeng</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Yan, Hongyang</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Yan, Qiben</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Zhang, Xiangliang</subfield><subfield code="4">edt</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">978-3-030-62459-0</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">978-3-030-62461-3</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">Lecture notes in computer science</subfield><subfield code="v">12487</subfield><subfield code="w">(DE-604)BV014880109</subfield><subfield code="9">12487</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1007/978-3-030-62460-6</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Erstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-2-SCS</subfield><subfield code="a">ZDB-2-LNC</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">ZDB-2-SCS_2020</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">ZDB-2-LNC_2020</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-032454536</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-030-62460-6</subfield><subfield code="l">BTU01</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-030-62460-6</subfield><subfield code="l">FHA01</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-030-62460-6</subfield><subfield code="l">FHI01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-030-62460-6</subfield><subfield code="l">FHM01</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-030-62460-6</subfield><subfield code="l">FHN01</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-030-62460-6</subfield><subfield code="l">FHR01</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-030-62460-6</subfield><subfield code="l">FKE01</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-030-62460-6</subfield><subfield code="l">FLA01</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-030-62460-6</subfield><subfield code="l">FRO01</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-030-62460-6</subfield><subfield code="l">FWS01</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-030-62460-6</subfield><subfield code="l">FWS02</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-030-62460-6</subfield><subfield code="l">HTW01</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-030-62460-6</subfield><subfield code="l">TUM01</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="q">ZDB-2-LNC_2020</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-030-62460-6</subfield><subfield code="l">UBA01</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-030-62460-6</subfield><subfield code="l">UBG01</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-030-62460-6</subfield><subfield code="l">UBM01</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-030-62460-6</subfield><subfield code="l">UBR01</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-030-62460-6</subfield><subfield code="l">UBT01</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-030-62460-6</subfield><subfield code="l">UBW01</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-030-62460-6</subfield><subfield code="l">UBY01</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-030-62460-6</subfield><subfield code="l">UER01</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-030-62460-6</subfield><subfield code="l">UPA01</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection>
genre (DE-588)1071861417 Konferenzschrift 2020 Kanton, Stadt gnd-content
genre_facet Konferenzschrift 2020 Kanton, Stadt
id DE-604.BV047047134
illustrated Not Illustrated
index_date 2024-07-03T16:07:20Z
indexdate 2024-11-25T17:57:35Z
institution BVB
institution_GND (DE-588)1224987179
isbn 9783030624606
language English
oai_aleph_id oai:aleph.bib-bvb.de:BVB01-032454536
oclc_num 1226699312
open_access_boolean
owner DE-573
DE-860
DE-91
DE-BY-TUM
DE-19
DE-BY-UBM
DE-Aug4
DE-898
DE-BY-UBR
DE-861
DE-188
DE-523
DE-859
DE-473
DE-BY-UBG
DE-29
DE-863
DE-BY-FWS
DE-20
DE-862
DE-BY-FWS
DE-92
DE-355
DE-BY-UBR
DE-384
DE-M347
DE-703
DE-706
DE-739
DE-634
owner_facet DE-573
DE-860
DE-91
DE-BY-TUM
DE-19
DE-BY-UBM
DE-Aug4
DE-898
DE-BY-UBR
DE-861
DE-188
DE-523
DE-859
DE-473
DE-BY-UBG
DE-29
DE-863
DE-BY-FWS
DE-20
DE-862
DE-BY-FWS
DE-92
DE-355
DE-BY-UBR
DE-384
DE-M347
DE-703
DE-706
DE-739
DE-634
physical 1 Online-Ressource (xv, 608 Seiten) 246 Illustrationen, 181 in Farbe
psigel ZDB-2-SCS
ZDB-2-LNC
ZDB-2-SCS_2020
ZDB-2-LNC_2020
ZDB-2-LNC ZDB-2-LNC_2020
publishDate 2020
publishDateSearch 2020
publishDateSort 2020
publisher Springer
record_format marc
series Lecture notes in computer science
series2 Lecture notes in computer science
Security and cryptology
spellingShingle Machine learning for cyber security third international conference, ML4CS 2020, Guangzhou, China, October 8–10, 2020, proceedings, part II
Lecture notes in computer science
Systems and Data Security
Computer Appl. in Social and Behavioral Sciences
Computers and Education
Legal Aspects of Computing
Cryptology
Mobile and Network Security
Computer security
Application software
Education—Data processing
Computers
Law and legislation
Data encryption (Computer science)
Computer networks / Security measures
Kryptologie (DE-588)4033329-2 gnd
Datensicherung (DE-588)4011144-1 gnd
Computerkriminalität (DE-588)4010452-7 gnd
subject_GND (DE-588)4033329-2
(DE-588)4011144-1
(DE-588)4010452-7
(DE-588)1071861417
title Machine learning for cyber security third international conference, ML4CS 2020, Guangzhou, China, October 8–10, 2020, proceedings, part II
title_auth Machine learning for cyber security third international conference, ML4CS 2020, Guangzhou, China, October 8–10, 2020, proceedings, part II
title_exact_search Machine learning for cyber security third international conference, ML4CS 2020, Guangzhou, China, October 8–10, 2020, proceedings, part II
title_exact_search_txtP Machine learning for cyber security third international conference, ML4CS 2020, Guangzhou, China, October 8–10, 2020, proceedings, part II
title_full Machine learning for cyber security third international conference, ML4CS 2020, Guangzhou, China, October 8–10, 2020, proceedings, part II Xiaofeng Chen, Hongyang Yan, Qiben Yan, Xiangliang Zhang (eds.)
title_fullStr Machine learning for cyber security third international conference, ML4CS 2020, Guangzhou, China, October 8–10, 2020, proceedings, part II Xiaofeng Chen, Hongyang Yan, Qiben Yan, Xiangliang Zhang (eds.)
title_full_unstemmed Machine learning for cyber security third international conference, ML4CS 2020, Guangzhou, China, October 8–10, 2020, proceedings, part II Xiaofeng Chen, Hongyang Yan, Qiben Yan, Xiangliang Zhang (eds.)
title_short Machine learning for cyber security
title_sort machine learning for cyber security third international conference ml4cs 2020 guangzhou china october 8 10 2020 proceedings part ii
title_sub third international conference, ML4CS 2020, Guangzhou, China, October 8–10, 2020, proceedings, part II
topic Systems and Data Security
Computer Appl. in Social and Behavioral Sciences
Computers and Education
Legal Aspects of Computing
Cryptology
Mobile and Network Security
Computer security
Application software
Education—Data processing
Computers
Law and legislation
Data encryption (Computer science)
Computer networks / Security measures
Kryptologie (DE-588)4033329-2 gnd
Datensicherung (DE-588)4011144-1 gnd
Computerkriminalität (DE-588)4010452-7 gnd
topic_facet Systems and Data Security
Computer Appl. in Social and Behavioral Sciences
Computers and Education
Legal Aspects of Computing
Cryptology
Mobile and Network Security
Computer security
Application software
Education—Data processing
Computers
Law and legislation
Data encryption (Computer science)
Computer networks / Security measures
Kryptologie
Datensicherung
Computerkriminalität
Konferenzschrift 2020 Kanton, Stadt
url https://doi.org/10.1007/978-3-030-62460-6
volume_link (DE-604)BV014880109
work_keys_str_mv AT ml4cskantonstadt machinelearningforcybersecuritythirdinternationalconferenceml4cs2020guangzhouchinaoctober8102020proceedingspartii
AT chenxiaofeng machinelearningforcybersecuritythirdinternationalconferenceml4cs2020guangzhouchinaoctober8102020proceedingspartii
AT yanhongyang machinelearningforcybersecuritythirdinternationalconferenceml4cs2020guangzhouchinaoctober8102020proceedingspartii
AT yanqiben machinelearningforcybersecuritythirdinternationalconferenceml4cs2020guangzhouchinaoctober8102020proceedingspartii
AT zhangxiangliang machinelearningforcybersecuritythirdinternationalconferenceml4cs2020guangzhouchinaoctober8102020proceedingspartii