MARC details
| 000 -LEADER |
| fixed length control field |
08669cam a2200877 i 4500 |
| 001 - CONTROL NUMBER |
| control field |
on1113425157 |
| 003 - CONTROL NUMBER IDENTIFIER |
| control field |
OCoLC |
| 005 - DATE AND TIME OF LATEST TRANSACTION |
| control field |
20250707092549.0 |
| 006 - FIXED-LENGTH DATA ELEMENTS--ADDITIONAL MATERIAL CHARACTERISTICS |
| fixed length control field |
m o d |
| 007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION |
| fixed length control field |
cr cnu---unuuu |
| 008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION |
| fixed length control field |
190710s2019 sz o 101 0 eng d |
| 040 ## - CATALOGING SOURCE |
| Original cataloging agency |
DKU |
| Language of cataloging |
eng |
| Description conventions |
rda |
| -- |
pn |
| Transcribing agency |
DKU |
| Modifying agency |
YDXIT |
| -- |
GW5XE |
| -- |
VT2 |
| -- |
UPM |
| -- |
OCLCF |
| -- |
EBLCP |
| -- |
LEATE |
| -- |
OCLCQ |
| -- |
SFB |
| -- |
DCT |
| -- |
OCLCO |
| -- |
OCLCQ |
| -- |
ORU |
| -- |
OCL |
| -- |
OCLCQ |
| -- |
OCLCO |
| -- |
OCLCQ |
| -- |
OCLCO |
| -- |
OCLCL |
| 019 ## - |
| -- |
1115110144 |
| -- |
1122815727 |
| -- |
1125762380 |
| -- |
1126205187 |
| -- |
1136461374 |
| -- |
1144295421 |
| -- |
1154933511 |
| -- |
1167452977 |
| -- |
1203987020 |
| -- |
1204591906 |
| -- |
1237490973 |
| -- |
1241769945 |
| -- |
1244635817 |
| 020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
| International Standard Book Number |
9783030242688 |
| Qualifying information |
(electronic book) |
| 020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
| International Standard Book Number |
3030242684 |
| Qualifying information |
(electronic book) |
| 020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
| Canceled/invalid ISBN |
9783030242695 |
| Qualifying information |
(print) |
| 020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
| Canceled/invalid ISBN |
3030242692 |
| Qualifying information |
(print) |
| 020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
| Canceled/invalid ISBN |
9783030242671 |
| Qualifying information |
(print) |
| 020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
| Canceled/invalid ISBN |
3030242676 |
| Qualifying information |
(print) |
| 024 7# - OTHER STANDARD IDENTIFIER |
| Standard number or code |
10.1007/978-3-030-24268-8 |
| Source of number or code |
doi |
| 029 1# - (OCLC) |
| OCLC library identifier |
AU@ |
| System control number |
000066048921 |
| 029 1# - (OCLC) |
| OCLC library identifier |
AU@ |
| System control number |
000066057489 |
| 029 1# - (OCLC) |
| OCLC library identifier |
DKDLA |
| System control number |
820120-katalog:999886714805765 |
| 035 ## - SYSTEM CONTROL NUMBER |
| System control number |
(OCoLC)1113425157 |
| Canceled/invalid control number |
(OCoLC)1115110144 |
| -- |
(OCoLC)1122815727 |
| -- |
(OCoLC)1125762380 |
| -- |
(OCoLC)1126205187 |
| -- |
(OCoLC)1136461374 |
| -- |
(OCoLC)1144295421 |
| -- |
(OCoLC)1154933511 |
| -- |
(OCoLC)1167452977 |
| -- |
(OCoLC)1203987020 |
| -- |
(OCoLC)1204591906 |
| -- |
(OCoLC)1237490973 |
| -- |
(OCoLC)1241769945 |
| -- |
(OCoLC)1244635817 |
| 037 ## - SOURCE OF ACQUISITION |
| Source of stock number/acquisition |
Springer |
| 050 #4 - LIBRARY OF CONGRESS CALL NUMBER |
| Classification number |
QA76.9.A25 |
| Item number |
I23 2019 |
| 072 #7 - SUBJECT CATEGORY CODE |
| Subject category code |
UR |
| Source |
bicssc |
| 072 #7 - SUBJECT CATEGORY CODE |
| Subject category code |
COM053000 |
| Source |
bisacsh |
| 072 #7 - SUBJECT CATEGORY CODE |
| Subject category code |
UR |
| Source |
thema |
| 072 #7 - SUBJECT CATEGORY CODE |
| Subject category code |
UTN |
| Source |
thema |
| 082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER |
| Classification number |
005.8 |
| Edition number |
23 |
| 049 ## - LOCAL HOLDINGS (OCLC) |
| Holding library |
MAIN |
| 111 2# - MAIN ENTRY--MEETING NAME |
| Meeting name or jurisdiction name as entry element |
ICAIS (Conference) |
| Number of part/section/meeting |
(5th : |
| Date of meeting |
2019 : |
| Location of meeting |
New York, N.Y.) |
| 245 10 - TITLE STATEMENT |
| Title |
Artificial intelligence and security : |
| Remainder of title |
5th International Conference, ICAIS 2019, New York, NY, USA, July 26-28, 2019, proceedings. |
| Number of part/section of a work |
Part IV / |
| Statement of responsibility, etc. |
Xingming Sun, Zhaoqing Pan, Elisa Bertino (Eds.). |
| 246 3# - VARYING FORM OF TITLE |
| Title proper/short title |
ICAIS 2019 |
| 264 #1 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE |
| Place of production, publication, distribution, manufacture |
Cham, Switzerland : |
| Name of producer, publisher, distributor, manufacturer |
Springer, |
| Date of production, publication, distribution, manufacture, or copyright notice |
[2019] |
| 300 ## - PHYSICAL DESCRIPTION |
| Extent |
1 online resource |
| 336 ## - CONTENT TYPE |
| Content type term |
text |
| Content type code |
txt |
| Source |
rdacontent |
| 337 ## - MEDIA TYPE |
| Media type term |
computer |
| Media type code |
c |
| Source |
rdamedia |
| 338 ## - CARRIER TYPE |
| Carrier type term |
online resource |
| Carrier type code |
cr |
| Source |
rdacarrier |
| 347 ## - DIGITAL FILE CHARACTERISTICS |
| File type |
text file |
| 347 ## - DIGITAL FILE CHARACTERISTICS |
| Encoding format |
PDF |
| 490 1# - SERIES STATEMENT |
| Series statement |
Lecture notes in computer science ; |
| Volume/sequential designation |
11635 |
| 490 1# - SERIES STATEMENT |
| Series statement |
LNCS sublibrary: SL4 - security and cryptology |
| 505 0# - FORMATTED CONTENTS NOTE |
| Formatted contents note |
Encryption and Cybersecurity -- A Gray-Box Vulnerability Discovery Model based on Path Coverage -- Quantum Network Coding Based on Entanglement Distribution -- Moving Target Defense in Preventing SQL Injection -- Design and Security Analysis of Certificateless Aggregate Signature Scheme -- SuperEye: a Distributed Port Scanning System -- An Improved Multi-classification Algorithm for Imbalanced Online Public Opinion Data -- NCGs: Building A Trustworthy Environment to Identify Abnormal Events Based on Network Connection Behavior Analysis -- Short Text Topic Recognition and Optimization Method for University Online Community -- A Survey on Network Traffic Identification -- A Survey of Network Security Situational Awareness Technology -- Multi-function Quantum Cryptography Protocol Based On Bell State -- The Attack Case of ECDSA on Blockchain based on Improved Simple Power Analysis -- A Weight-Based Channel Estimation Implementation Algorithm -- ^Multi-Party Quantum Communication Complexity on Composite Boolean-Valued Function -- BlockZone: A Blockchain-based DNS Storage and Retrieval Scheme -- Robust Analysis of Grid System Based on Complex Network Attack Mode -- A Secure Data Aggregation Protocol in VANETs based on Multi-key FHE -- Research on SQL Injection and Defense Technology -- A Review of the Factorization Problem of Large Integers -- A Comparison of Machine Learning Algorithms for Detecting XSS Attacks -- A Survey of Privacy-Preserving Techniques for Blockchain -- A Survey of Software Reverse Engineering Applications -- A Fast IP Matching Algorithm under Large Traffic -- An Effective Load Balance using Link Bandwidth for SDN-based Data Centers -- Zero-Day Vulnerability Risk Assessment and Attack Path Analysis Using Security Metric -- Research on Content Extraction of Rich Text Web Pages -- Network Protocol Analysis base on WeChat PC Version -- Bitcoin Network Size Estimation Based on Coupon Collection Model -- ^A Survey of the Software Vulnerability Discovery using Machine Learning Techniques -- A Distributed Cryptanalysis Framework based on Mobile Phones -- A Novel Threshold Signature Scheme Based on Elliptic Curve with designated verifier -- A Congestion Control Methodology with Probability Routing based on MNL for Datacenter Network -- Fast Failover for Link Failures in Software Defined Networks -- Steady-state Topology Discovery of Target Networks based on Statistics Method -- A Novel Method for Weighted Throughput Fairness in Contention-based WLANs with Multiple Priority Levels -- Bitcoin Node Discovery: Large-scale Empirical Evaluation of Network Churn -- DDoS Attack Situation Information Fusion Method Based on Dempster-Shafer Evidence Theory -- Webshell Detection Model based on Deep Learning -- A Security-Sensitive Function Mining Framework for Source Code -- Abstraction of Operations in Trusted Components Based on OR-transition Colored Petri Net -- ^Trusted Component Decomposition Based on OR-transition Colored Petri Net -- High-Speed File Transferring over Linux Bridge for QGA Enhancement in Cyber Range -- Playing First-Person-Shooter Games with A3C-Anticipator Network Based Agents using Reinforcement Learning -- Identify Influentials Based on User behavior Across Different Topics -- Taylor Series Localization Algorithm Based on Semi-definite Programming -- Research on Pedestrian Attribute Recognition Based on Semantic Segmentation in Natural Scene -- An evolving network model based on a triangular connecting mechanism for the Internet topology -- A new quantum private query protocol with better performance in resisting joint-measurement attack -- PPCSB:A Privacy-Preserving Electricity Consumption Statistics and Billing Scheme in Smart Grid -- Blockchain Private Key Storage Algorithm Based on Image Information Hiding -- Heuristic-Q: A Privacy Data Pricing Method Based on Heuristic Reinforcement Learning |
| 520 ## - SUMMARY, ETC. |
| Summary, etc. |
The 4-volume set LNCS 11632 until LNCS 11635 constitutes the refereed proceedings of the 5th International Conference on Artificial Intelligence and Security, ICAIS 2019, which was held in New York, USA, in July 2019. The conference was formerly called "International Conference on Cloud Computing and Security" with the acronym ICCCS. The total of 230 full papers presented in this 4-volume proceedings was carefully reviewed and selected from 1529 submissions. The papers were organized in topical sections as follows: Part I: cloud computing; Part II: artificial intelligence; big data; and cloud computing and security; Part III: cloud computing and security; information hiding; IoT security; multimedia forensics; and encryption and cybersecurity; Part IV: encryption and cybersecurity. -- |
| Assigning source |
Provided by publisher |
| 500 ## - GENERAL NOTE |
| General note |
Formerly the International Conference on Cloud Computing and Security. |
| 500 ## - GENERAL NOTE |
| General note |
International conference proceedings. |
| 504 ## - BIBLIOGRAPHY, ETC. NOTE |
| Bibliography, etc |
Includes author index. |
| 588 0# - SOURCE OF DESCRIPTION NOTE |
| Source of description note |
Online resource; title from digital title page (viewed on August 26, 2019). |
| 650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
| Topical term or geographic name as entry element |
Artificial intelligence |
| Form subdivision |
Congresses. |
| 650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
| Topical term or geographic name as entry element |
Cloud computing |
| General subdivision |
Security measures |
| Form subdivision |
Congresses. |
| 9 (RLIN) |
53800 |
| 650 #6 - SUBJECT ADDED ENTRY--TOPICAL TERM |
| Topical term or geographic name as entry element |
Intelligence artificielle |
| Form subdivision |
Congrès. |
| 9 (RLIN) |
17678 |
| 650 #6 - SUBJECT ADDED ENTRY--TOPICAL TERM |
| Topical term or geographic name as entry element |
Infonuagique |
| General subdivision |
Sécurité |
| -- |
Mesures |
| Form subdivision |
Congrès. |
| 9 (RLIN) |
967692 |
| 650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM |
| Topical term or geographic name as entry element |
Artificial intelligence |
| Source of heading or term |
fast |
| 9 (RLIN) |
1340 |
| 650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM |
| Topical term or geographic name as entry element |
Computer security |
| Source of heading or term |
fast |
| 9 (RLIN) |
2191 |
| 650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM |
| Topical term or geographic name as entry element |
Computers |
| General subdivision |
Law and legislation |
| Source of heading or term |
fast |
| 9 (RLIN) |
20256 |
| 650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM |
| Topical term or geographic name as entry element |
Data encryption (Computer science) |
| Source of heading or term |
fast |
| 9 (RLIN) |
13647 |
| 650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM |
| Topical term or geographic name as entry element |
Software engineering |
| Source of heading or term |
fast |
| 9 (RLIN) |
14736 |
| 655 #2 - INDEX TERM--GENRE/FORM |
| Genre/form data or focus term |
Congress |
| 9 (RLIN) |
11670 |
| 655 #7 - INDEX TERM--GENRE/FORM |
| Genre/form data or focus term |
proceedings (reports) |
| Source of term |
aat |
| 655 #7 - INDEX TERM--GENRE/FORM |
| Genre/form data or focus term |
Conference papers and proceedings |
| Source of term |
fast |
| 9 (RLIN) |
6065 |
| 655 #7 - INDEX TERM--GENRE/FORM |
| Genre/form data or focus term |
Conference papers and proceedings. |
| Source of term |
lcgft |
| 9 (RLIN) |
6065 |
| 655 #7 - INDEX TERM--GENRE/FORM |
| Genre/form data or focus term |
Actes de congrès. |
| Source of term |
rvmgf |
| 9 (RLIN) |
609890 |
| 700 1# - ADDED ENTRY--PERSONAL NAME |
| Personal name |
Sun, Xingming, |
| Relator term |
editor. |
| 9 (RLIN) |
56253 |
| 700 1# - ADDED ENTRY--PERSONAL NAME |
| Personal name |
Pan, Zhaoqing, |
| Relator term |
editor. |
| 700 1# - ADDED ENTRY--PERSONAL NAME |
| Personal name |
Bertino, Elisa, |
| Relator term |
editor. |
| 9 (RLIN) |
15010 |
| 758 ## - |
| -- |
has work: |
| -- |
Part IV Artificial intelligence and security (Text) |
| -- |
https://id.oclc.org/worldcat/entity/E39PCGkGRkcfyYG6WfvDMdg9pd |
| -- |
https://id.oclc.org/worldcat/ontology/hasWork |
| 776 08 - ADDITIONAL PHYSICAL FORM ENTRY |
| Relationship information |
Printed edition: |
| International Standard Book Number |
9783030242671 |
| 776 08 - ADDITIONAL PHYSICAL FORM ENTRY |
| Relationship information |
Printed edition: |
| International Standard Book Number |
9783030242695 |
| 830 #0 - SERIES ADDED ENTRY--UNIFORM TITLE |
| Uniform title |
Lecture notes in computer science ; |
| Volume number/sequential designation |
11635. |
| 830 #0 - SERIES ADDED ENTRY--UNIFORM TITLE |
| Uniform title |
LNCS sublibrary. |
| Number of part/section of a work |
SL 4, |
| Name of part/section of a work |
Security and cryptology. |
| 9 (RLIN) |
20708 |
| 856 40 - ELECTRONIC LOCATION AND ACCESS |
| Uniform Resource Identifier |
<a href="https://link.springer.com/10.1007/978-3-030-24268-8">https://link.springer.com/10.1007/978-3-030-24268-8</a> |
| 938 ## - |
| -- |
ProQuest Ebook Central |
| -- |
EBLB |
| -- |
EBL5919726 |
| 994 ## - |
| -- |
92 |
| -- |
ATIST |