001431564 000__ 02816nam\a2200589\i\4500 001431564 001__ 1431564 001431564 003__ OCoLC 001431564 005__ 20230308003242.0 001431564 006__ m\\\\\o\\d\\\\\\\\ 001431564 007__ cr\cn\nnnunnun 001431564 008__ 221228s2022\\\\si\a\\\\o\\\\\101\0\eng\d 001431564 020__ $$a9789811982859$$q(electronic bk.) 001431564 020__ $$a9811982856$$q(electronic bk.) 001431564 020__ $$z9789811982842 001431564 0247_ $$a10.1007/978-981-19-8285-9$$2doi 001431564 035__ $$aSP(OCoLC)1356408695 001431564 040__ $$aGW5XE$$beng$$erda$$epn$$cGW5XE 001431564 049__ $$aISEA 001431564 050_4 $$aTK5105.875.I57 001431564 08204 $$a005.8$$223/eng/20221228 001431564 1112_ $$aChina Cyber Security Annual Conference$$n(19th :$$d2022 :$$cBeijing, China). 001431564 24510 $$aCyber security :$$b19th China Annual Conference, CNCERT 2022, Beijing, China, August 16-17, 2022 : revised selected papers /$$cWei Lu, Yuqing Zhang, Weiping Wen, Hanbing Yan, Chao Li (eds.). 001431564 24630 $$aCNCERT 2022 001431564 264_1 $$aSingapore :$$bSpringer,$$c[2022] 001431564 264_4 $$c©2022 001431564 300__ $$a1 online resource (x, 239 pages) :$$billustrations (some color). 001431564 336__ $$atext$$btxt$$2rdacontent 001431564 337__ $$acomputer$$bc$$2rdamedia 001431564 338__ $$aonline resource$$bcr$$2rdacarrier 001431564 4901_ $$aCommunications in computer and information science,$$x1865-0937 ;$$v1699 001431564 500__ $$aConference proceedings. 001431564 500__ $$aIncludes author index. 001431564 5050_ $$aData Security -- Anomaly Detection -- Cryptocurrency -- Information Security -- Vulnerabilities -- Mobile Internet -- Threat Intelligence -- Text Recognition. 001431564 5060_ $$aOpen access$$5GW5XE 001431564 520__ $$aThis open access book constitutes the refereed proceedings of the 18th China Annual Conference on Cyber Security, CNCERT 2022, held in Beijing, China, in August 2022. The 17 papers presented were carefully reviewed and selected from 64 submissions. The papers are organized according to the following topical sections: data security; anomaly detection; cryptocurrency; information security; vulnerabilities; mobile internet; threat intelligence; text recognition. 001431564 588__ $$aOnline resource; title from PDF title page (SpringerLink, viewed December 28, 2022). 001431564 650_0 $$aInternet$$xSecurity measures$$vCongresses. 001431564 650_0 $$aComputer networks$$xSecurity measures$$vCongresses. 001431564 655_7 $$aConference papers and proceedings.$$2lcgft 001431564 655_0 $$aElectronic books. 001431564 7001_ $$aLu, Wei,$$eeditor. 001431564 7001_ $$aZhang, Yuqing,$$d1966-$$eeditor. 001431564 7001_ $$aWen, Weiping,$$eeditor. 001431564 7001_ $$aYan, Hanbing,$$eeditor. 001431564 7001_ $$aLi, Chao,$$eeditor. 001431564 830_0 $$aCommunications in computer and information science ;$$v1699.$$x1865-0937 001431564 852__ $$bebk 001431564 85640 $$3Springer Nature$$uhttps://link.springer.com/10.1007/978-981-19-8285-9$$zOnline Access$$91397441.2 001431564 909CO $$ooai:library.usi.edu:1431564$$pGLOBAL_SET 001431564 980__ $$aBIB 001431564 980__ $$aEBOOK 001431564 982__ $$aEbook 001431564 983__ $$aOnline 001431564 994__ $$a92$$bISE