Artificial intelligence and security : (Record no. 646626)

MARC details
000 -LEADER
fixed length control field 08669cam a2200877 i 4500
001 - CONTROL NUMBER
control field on1113425157
003 - CONTROL NUMBER IDENTIFIER
control field OCoLC
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20250707092549.0
006 - FIXED-LENGTH DATA ELEMENTS--ADDITIONAL MATERIAL CHARACTERISTICS
fixed length control field m o d
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION
fixed length control field cr cnu---unuuu
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 190710s2019 sz o 101 0 eng d
040 ## - CATALOGING SOURCE
Original cataloging agency DKU
Language of cataloging eng
Description conventions rda
-- pn
Transcribing agency DKU
Modifying agency YDXIT
-- GW5XE
-- VT2
-- UPM
-- OCLCF
-- EBLCP
-- LEATE
-- OCLCQ
-- SFB
-- DCT
-- OCLCO
-- OCLCQ
-- ORU
-- OCL
-- OCLCQ
-- OCLCO
-- OCLCQ
-- OCLCO
-- OCLCL
019 ## -
-- 1115110144
-- 1122815727
-- 1125762380
-- 1126205187
-- 1136461374
-- 1144295421
-- 1154933511
-- 1167452977
-- 1203987020
-- 1204591906
-- 1237490973
-- 1241769945
-- 1244635817
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9783030242688
Qualifying information (electronic book)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 3030242684
Qualifying information (electronic book)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
Canceled/invalid ISBN 9783030242695
Qualifying information (print)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
Canceled/invalid ISBN 3030242692
Qualifying information (print)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
Canceled/invalid ISBN 9783030242671
Qualifying information (print)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
Canceled/invalid ISBN 3030242676
Qualifying information (print)
024 7# - OTHER STANDARD IDENTIFIER
Standard number or code 10.1007/978-3-030-24268-8
Source of number or code doi
029 1# - (OCLC)
OCLC library identifier AU@
System control number 000066048921
029 1# - (OCLC)
OCLC library identifier AU@
System control number 000066057489
029 1# - (OCLC)
OCLC library identifier DKDLA
System control number 820120-katalog:999886714805765
035 ## - SYSTEM CONTROL NUMBER
System control number (OCoLC)1113425157
Canceled/invalid control number (OCoLC)1115110144
-- (OCoLC)1122815727
-- (OCoLC)1125762380
-- (OCoLC)1126205187
-- (OCoLC)1136461374
-- (OCoLC)1144295421
-- (OCoLC)1154933511
-- (OCoLC)1167452977
-- (OCoLC)1203987020
-- (OCoLC)1204591906
-- (OCoLC)1237490973
-- (OCoLC)1241769945
-- (OCoLC)1244635817
037 ## - SOURCE OF ACQUISITION
Source of stock number/acquisition Springer
050 #4 - LIBRARY OF CONGRESS CALL NUMBER
Classification number QA76.9.A25
Item number I23 2019
072 #7 - SUBJECT CATEGORY CODE
Subject category code UR
Source bicssc
072 #7 - SUBJECT CATEGORY CODE
Subject category code COM053000
Source bisacsh
072 #7 - SUBJECT CATEGORY CODE
Subject category code UR
Source thema
072 #7 - SUBJECT CATEGORY CODE
Subject category code UTN
Source thema
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 005.8
Edition number 23
049 ## - LOCAL HOLDINGS (OCLC)
Holding library MAIN
111 2# - MAIN ENTRY--MEETING NAME
Meeting name or jurisdiction name as entry element ICAIS (Conference)
Number of part/section/meeting (5th :
Date of meeting 2019 :
Location of meeting New York, N.Y.)
245 10 - TITLE STATEMENT
Title Artificial intelligence and security :
Remainder of title 5th International Conference, ICAIS 2019, New York, NY, USA, July 26-28, 2019, proceedings.
Number of part/section of a work Part IV /
Statement of responsibility, etc. Xingming Sun, Zhaoqing Pan, Elisa Bertino (Eds.).
246 3# - VARYING FORM OF TITLE
Title proper/short title ICAIS 2019
264 #1 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE
Place of production, publication, distribution, manufacture Cham, Switzerland :
Name of producer, publisher, distributor, manufacturer Springer,
Date of production, publication, distribution, manufacture, or copyright notice [2019]
300 ## - PHYSICAL DESCRIPTION
Extent 1 online resource
336 ## - CONTENT TYPE
Content type term text
Content type code txt
Source rdacontent
337 ## - MEDIA TYPE
Media type term computer
Media type code c
Source rdamedia
338 ## - CARRIER TYPE
Carrier type term online resource
Carrier type code cr
Source rdacarrier
347 ## - DIGITAL FILE CHARACTERISTICS
File type text file
347 ## - DIGITAL FILE CHARACTERISTICS
Encoding format PDF
490 1# - SERIES STATEMENT
Series statement Lecture notes in computer science ;
Volume/sequential designation 11635
490 1# - SERIES STATEMENT
Series statement LNCS sublibrary: SL4 - security and cryptology
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note Encryption and Cybersecurity -- A Gray-Box Vulnerability Discovery Model based on Path Coverage -- Quantum Network Coding Based on Entanglement Distribution -- Moving Target Defense in Preventing SQL Injection -- Design and Security Analysis of Certificateless Aggregate Signature Scheme -- SuperEye: a Distributed Port Scanning System -- An Improved Multi-classification Algorithm for Imbalanced Online Public Opinion Data -- NCGs: Building A Trustworthy Environment to Identify Abnormal Events Based on Network Connection Behavior Analysis -- Short Text Topic Recognition and Optimization Method for University Online Community -- A Survey on Network Traffic Identification -- A Survey of Network Security Situational Awareness Technology -- Multi-function Quantum Cryptography Protocol Based On Bell State -- The Attack Case of ECDSA on Blockchain based on Improved Simple Power Analysis -- A Weight-Based Channel Estimation Implementation Algorithm -- ^Multi-Party Quantum Communication Complexity on Composite Boolean-Valued Function -- BlockZone: A Blockchain-based DNS Storage and Retrieval Scheme -- Robust Analysis of Grid System Based on Complex Network Attack Mode -- A Secure Data Aggregation Protocol in VANETs based on Multi-key FHE -- Research on SQL Injection and Defense Technology -- A Review of the Factorization Problem of Large Integers -- A Comparison of Machine Learning Algorithms for Detecting XSS Attacks -- A Survey of Privacy-Preserving Techniques for Blockchain -- A Survey of Software Reverse Engineering Applications -- A Fast IP Matching Algorithm under Large Traffic -- An Effective Load Balance using Link Bandwidth for SDN-based Data Centers -- Zero-Day Vulnerability Risk Assessment and Attack Path Analysis Using Security Metric -- Research on Content Extraction of Rich Text Web Pages -- Network Protocol Analysis base on WeChat PC Version -- Bitcoin Network Size Estimation Based on Coupon Collection Model -- ^A Survey of the Software Vulnerability Discovery using Machine Learning Techniques -- A Distributed Cryptanalysis Framework based on Mobile Phones -- A Novel Threshold Signature Scheme Based on Elliptic Curve with designated verifier -- A Congestion Control Methodology with Probability Routing based on MNL for Datacenter Network -- Fast Failover for Link Failures in Software Defined Networks -- Steady-state Topology Discovery of Target Networks based on Statistics Method -- A Novel Method for Weighted Throughput Fairness in Contention-based WLANs with Multiple Priority Levels -- Bitcoin Node Discovery: Large-scale Empirical Evaluation of Network Churn -- DDoS Attack Situation Information Fusion Method Based on Dempster-Shafer Evidence Theory -- Webshell Detection Model based on Deep Learning -- A Security-Sensitive Function Mining Framework for Source Code -- Abstraction of Operations in Trusted Components Based on OR-transition Colored Petri Net -- ^Trusted Component Decomposition Based on OR-transition Colored Petri Net -- High-Speed File Transferring over Linux Bridge for QGA Enhancement in Cyber Range -- Playing First-Person-Shooter Games with A3C-Anticipator Network Based Agents using Reinforcement Learning -- Identify Influentials Based on User behavior Across Different Topics -- Taylor Series Localization Algorithm Based on Semi-definite Programming -- Research on Pedestrian Attribute Recognition Based on Semantic Segmentation in Natural Scene -- An evolving network model based on a triangular connecting mechanism for the Internet topology -- A new quantum private query protocol with better performance in resisting joint-measurement attack -- PPCSB:A Privacy-Preserving Electricity Consumption Statistics and Billing Scheme in Smart Grid -- Blockchain Private Key Storage Algorithm Based on Image Information Hiding -- Heuristic-Q: A Privacy Data Pricing Method Based on Heuristic Reinforcement Learning
520 ## - SUMMARY, ETC.
Summary, etc. The 4-volume set LNCS 11632 until LNCS 11635 constitutes the refereed proceedings of the 5th International Conference on Artificial Intelligence and Security, ICAIS 2019, which was held in New York, USA, in July 2019. The conference was formerly called "International Conference on Cloud Computing and Security" with the acronym ICCCS. The total of 230 full papers presented in this 4-volume proceedings was carefully reviewed and selected from 1529 submissions. The papers were organized in topical sections as follows: Part I: cloud computing; Part II: artificial intelligence; big data; and cloud computing and security; Part III: cloud computing and security; information hiding; IoT security; multimedia forensics; and encryption and cybersecurity; Part IV: encryption and cybersecurity. --
Assigning source Provided by publisher
500 ## - GENERAL NOTE
General note Formerly the International Conference on Cloud Computing and Security.
500 ## - GENERAL NOTE
General note International conference proceedings.
504 ## - BIBLIOGRAPHY, ETC. NOTE
Bibliography, etc Includes author index.
588 0# - SOURCE OF DESCRIPTION NOTE
Source of description note Online resource; title from digital title page (viewed on August 26, 2019).
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Artificial intelligence
Form subdivision Congresses.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Cloud computing
General subdivision Security measures
Form subdivision Congresses.
9 (RLIN) 53800
650 #6 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Intelligence artificielle
Form subdivision Congrès.
9 (RLIN) 17678
650 #6 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Infonuagique
General subdivision Sécurité
-- Mesures
Form subdivision Congrès.
9 (RLIN) 967692
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Artificial intelligence
Source of heading or term fast
9 (RLIN) 1340
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer security
Source of heading or term fast
9 (RLIN) 2191
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computers
General subdivision Law and legislation
Source of heading or term fast
9 (RLIN) 20256
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Data encryption (Computer science)
Source of heading or term fast
9 (RLIN) 13647
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Software engineering
Source of heading or term fast
9 (RLIN) 14736
655 #2 - INDEX TERM--GENRE/FORM
Genre/form data or focus term Congress
9 (RLIN) 11670
655 #7 - INDEX TERM--GENRE/FORM
Genre/form data or focus term proceedings (reports)
Source of term aat
655 #7 - INDEX TERM--GENRE/FORM
Genre/form data or focus term Conference papers and proceedings
Source of term fast
9 (RLIN) 6065
655 #7 - INDEX TERM--GENRE/FORM
Genre/form data or focus term Conference papers and proceedings.
Source of term lcgft
9 (RLIN) 6065
655 #7 - INDEX TERM--GENRE/FORM
Genre/form data or focus term Actes de congrès.
Source of term rvmgf
9 (RLIN) 609890
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Sun, Xingming,
Relator term editor.
9 (RLIN) 56253
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Pan, Zhaoqing,
Relator term editor.
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Bertino, Elisa,
Relator term editor.
9 (RLIN) 15010
758 ## -
-- has work:
-- Part IV Artificial intelligence and security (Text)
-- https://id.oclc.org/worldcat/entity/E39PCGkGRkcfyYG6WfvDMdg9pd
-- https://id.oclc.org/worldcat/ontology/hasWork
776 08 - ADDITIONAL PHYSICAL FORM ENTRY
Relationship information Printed edition:
International Standard Book Number 9783030242671
776 08 - ADDITIONAL PHYSICAL FORM ENTRY
Relationship information Printed edition:
International Standard Book Number 9783030242695
830 #0 - SERIES ADDED ENTRY--UNIFORM TITLE
Uniform title Lecture notes in computer science ;
Volume number/sequential designation 11635.
830 #0 - SERIES ADDED ENTRY--UNIFORM TITLE
Uniform title LNCS sublibrary.
Number of part/section of a work SL 4,
Name of part/section of a work Security and cryptology.
9 (RLIN) 20708
856 40 - ELECTRONIC LOCATION AND ACCESS
Uniform Resource Identifier <a href="https://link.springer.com/10.1007/978-3-030-24268-8">https://link.springer.com/10.1007/978-3-030-24268-8</a>
938 ## -
-- ProQuest Ebook Central
-- EBLB
-- EBL5919726
994 ## -
-- 92
-- ATIST
Holdings
Withdrawn status Lost status Damaged status Not for loan Collection code Home library Current library Date acquired Total Checkouts Date last seen Price effective from Koha item type
  Not Lost     eBook LNCS e-Library e-Library 29/07/2022   29/07/2022 29/07/2022 eBook

Powered by Koha