|
|
|
|
LEADER |
02122nmm a2200385 u 4500 |
001 |
EB001905695 |
003 |
EBX01000000000000001068599 |
005 |
00000000000000.0 |
007 |
cr||||||||||||||||||||| |
008 |
210104 ||| eng |
020 |
|
|
|a 9783030652999
|
100 |
1 |
|
|a You, Ilsun
|e [editor]
|
245 |
0 |
0 |
|a Information Security Applications
|h Elektronische Ressource
|b 21st International Conference, WISA 2020, Jeju Island, South Korea, August 26–28, 2020, Revised Selected Papers
|c edited by Ilsun You
|
250 |
|
|
|a 1st ed. 2020
|
260 |
|
|
|a Cham
|b Springer International Publishing
|c 2020, 2020
|
300 |
|
|
|a XI, 418 p. 141 illus., 101 illus. in color
|b online resource
|
505 |
0 |
|
|a AI Security and Intrusion Detection -- Steganography and Malware -- Application, System, and Hardware Security -- Cryptography -- Advances in Network Security and Attack Defense -- Cyber Security
|
653 |
|
|
|a Mobile and Network Security
|
653 |
|
|
|a Computer networks / Security measures
|
653 |
|
|
|a Cryptography
|
653 |
|
|
|a Artificial Intelligence
|
653 |
|
|
|a Computers
|
653 |
|
|
|a Data protection
|
653 |
|
|
|a Data encryption (Computer science)
|
653 |
|
|
|a Artificial intelligence
|
653 |
|
|
|a Cryptology
|
653 |
|
|
|a Data and Information Security
|
653 |
|
|
|a Computing Milieux
|
041 |
0 |
7 |
|a eng
|2 ISO 639-2
|
989 |
|
|
|b Springer
|a Springer eBooks 2005-
|
490 |
0 |
|
|a Security and Cryptology
|
028 |
5 |
0 |
|a 10.1007/978-3-030-65299-9
|
856 |
4 |
0 |
|u https://doi.org/10.1007/978-3-030-65299-9?nosfx=y
|x Verlag
|3 Volltext
|
082 |
0 |
|
|a 005.8
|
520 |
|
|
|a This book constitutes the thoroughly refereed proceedings of the 21st International Conference on Information Security Applications, WISA 2020, held in Jeju Island, South Korea, in August 2020. The 30 full research papers included in this book were carefully reviewed and selected from 89 submissions. They are organized in the following topical sections: AI Security and Intrusion Detection; Steganography and Malware; Application, System, and Hardware Security; Cryptography; Advances in Network Security and Attack Defense; and Cyber Security
|