|
|
|
|
LEADER |
02214nmm a2200409 u 4500 |
001 |
EB001901067 |
003 |
EBX01000000000000001063976 |
005 |
00000000000000.0 |
007 |
cr||||||||||||||||||||| |
008 |
200911 ||| eng |
020 |
|
|
|a 9783030578848
|
100 |
1 |
|
|a Sun, Xingming
|e [editor]
|
245 |
0 |
0 |
|a Artificial Intelligence and Security
|h Elektronische Ressource
|b 6th International Conference, ICAIS 2020, Hohhot, China, July 17–20, 2020, Proceedings, Part I
|c edited by Xingming Sun, Jinwei Wang, Elisa Bertino
|
250 |
|
|
|a 1st ed. 2020
|
260 |
|
|
|a Cham
|b Springer International Publishing
|c 2020, 2020
|
300 |
|
|
|a XXVII, 828 p. 121 illus
|b online resource
|
653 |
|
|
|a Computer Communication Networks
|
653 |
|
|
|a Machine learning
|
653 |
|
|
|a Machine Learning
|
653 |
|
|
|a Artificial Intelligence
|
653 |
|
|
|a Computers
|
653 |
|
|
|a Application software
|
653 |
|
|
|a Computer networks
|
653 |
|
|
|a Data protection
|
653 |
|
|
|a Artificial intelligence
|
653 |
|
|
|a Computer and Information Systems Applications
|
653 |
|
|
|a Data and Information Security
|
653 |
|
|
|a Computing Milieux
|
700 |
1 |
|
|a Wang, Jinwei
|e [editor]
|
700 |
1 |
|
|a Bertino, Elisa
|e [editor]
|
041 |
0 |
7 |
|a eng
|2 ISO 639-2
|
989 |
|
|
|b Springer
|a Springer eBooks 2005-
|
490 |
0 |
|
|a Information Systems and Applications, incl. Internet/Web, and HCI
|
028 |
5 |
0 |
|a 10.1007/978-3-030-57884-8
|
856 |
4 |
0 |
|u https://doi.org/10.1007/978-3-030-57884-8?nosfx=y
|x Verlag
|3 Volltext
|
082 |
0 |
|
|a 005.3
|
520 |
|
|
|a This two-volume set LNCS 12239-12240 constitutes the refereed proceedings of the 6th International Conference on Artificial Intelligence and Security, ICAIS 2020, which was held in Hohhot, China, in July 2020. The conference was formerly called “International Conference on Cloud Computing and Security” with the acronym ICCCS. The total of 142 full papers presented in this two-volume proceedings was carefully reviewed and selected from 1064 submissions. The papers were organized in topical sections as follows: Part I: Artificial intelligence and internet of things. Part II: Internet of things, information security, big data and cloud computing, and information processing
|