|
|
|
|
LEADER |
02372nmm a2200433 u 4500 |
001 |
EB001870606 |
003 |
EBX01000000000000001033977 |
005 |
00000000000000.0 |
007 |
cr||||||||||||||||||||| |
008 |
190802 ||| eng |
020 |
|
|
|a 9789811375613
|
100 |
1 |
|
|a Nandi, Sukumar
|e [editor]
|
245 |
0 |
0 |
|a Security and Privacy
|h Elektronische Ressource
|b Second ISEA International Conference, ISEA-ISAP 2018, Jaipur, India, January, 9–11, 2019, Revised Selected Papers
|c edited by Sukumar Nandi, Devesh Jinwala, Virendra Singh, Vijay Laxmi, Manoj Singh Gaur, Parvez Faruki
|
250 |
|
|
|a 1st ed. 2019
|
260 |
|
|
|a Singapore
|b Springer Nature Singapore
|c 2019, 2019
|
300 |
|
|
|a XII, 303 p. 118 illus., 63 illus. in color
|b online resource
|
505 |
0 |
|
|a Authentication and Access Control -- Malware Analysis -- Network Security -- Privacy Preservation -- Secure Software Systems -- Social Network Analytics
|
653 |
|
|
|a Computer Communication Networks
|
653 |
|
|
|a Mobile and Network Security
|
653 |
|
|
|a Computer networks / Security measures
|
653 |
|
|
|a Artificial Intelligence
|
653 |
|
|
|a Computers
|
653 |
|
|
|a Computer networks
|
653 |
|
|
|a Computer Engineering and Networks
|
653 |
|
|
|a Data protection
|
653 |
|
|
|a Artificial intelligence
|
653 |
|
|
|a Computer engineering
|
653 |
|
|
|a Data and Information Security
|
653 |
|
|
|a Computing Milieux
|
700 |
1 |
|
|a Jinwala, Devesh
|e [editor]
|
700 |
1 |
|
|a Singh, Virendra
|e [editor]
|
700 |
1 |
|
|a Laxmi, Vijay
|e [editor]
|
041 |
0 |
7 |
|a eng
|2 ISO 639-2
|
989 |
|
|
|b Springer
|a Springer eBooks 2005-
|
490 |
0 |
|
|a Communications in Computer and Information Science
|
028 |
5 |
0 |
|a 10.1007/978-981-13-7561-3
|
856 |
4 |
0 |
|u https://doi.org/10.1007/978-981-13-7561-3?nosfx=y
|x Verlag
|3 Volltext
|
082 |
0 |
|
|a 005.8
|
520 |
|
|
|a This book constitutes the refereed proceedings of the Second International Conference on Security and Privacy, ISEA-ISAP 2018, held in Jaipur, India, in January 2019. The conference was originally planned to be held in 2018 which is why the acronym contains "2018". The 21 revised full papers presented were carefully reviewed and selected from 87 submissions. The papers are organized in topical sections: authentication and access control, malware analysis, network security, privacy preservation, secure software systems and social network analytics
|