001439756 000__ 03445cam\a2200697\i\4500 001439756 001__ 1439756 001439756 003__ OCoLC 001439756 005__ 20230309004519.0 001439756 006__ m\\\\\o\\d\\\\\\\\ 001439756 007__ cr\un\nnnunnun 001439756 008__ 210919s2021\\\\sz\a\\\\o\\\\\101\0\eng\d 001439756 020__ $$a9783030868901$$q(electronic bk.) 001439756 020__ $$a3030868907$$q(electronic bk.) 001439756 020__ $$z9783030868895 001439756 020__ $$z3030868893 001439756 0247_ $$a10.1007/978-3-030-86890-1$$2doi 001439756 035__ $$aSP(OCoLC)1268441124 001439756 040__ $$aYDX$$beng$$erda$$epn$$cYDX$$dGW5XE$$dOCLCO$$dEBLCP$$dOCLCF$$dN$T$$dBRX$$dOCLCO$$dOCLCQ$$dCOM$$dOCLCO$$dOCLCQ 001439756 049__ $$aISEA 001439756 050_4 $$aQA76.9.A25$$bI35 2021 001439756 08204 $$a005.8$$223 001439756 1112_ $$aICICS (Conference)$$n(23rd :$$d2021 :$$cChongqing, China) 001439756 24510 $$aInformation and communications security :$$b23rd international conference, ICICS 2021, Chongqing, China, November 19-21, 2021 : proceedings.$$nPart I /$$cDebin Gao, Qi Li, Xiaohong Guan, Xiaofeng Liao (eds.). 001439756 24630 $$aICICS 2021 001439756 264_1 $$aCham :$$bSpringer,$$c[2021] 001439756 264_4 $$c©2021 001439756 300__ $$a1 online resource :$$billustrations (chiefly color) 001439756 336__ $$atext$$btxt$$2rdacontent 001439756 337__ $$acomputer$$bc$$2rdamedia 001439756 338__ $$aonline resource$$bcr$$2rdacarrier 001439756 4901_ $$aLecture notes in computer science ;$$v12918 001439756 4901_ $$aLNCS sublibrary: SL4 - Security and cryptology 001439756 500__ $$aInternational conference proceedings. 001439756 500__ $$aIncludes author index. 001439756 5050_ $$aBlockchain and Federated Learning -- Malware Analysis and Detection -- IoT Security -- Software Security -- Internet Security -- Data-Driven Cybersecurity. 001439756 506__ $$aAccess limited to authorized users. 001439756 520__ $$aThis two-volume set LNCS 12918 - 12919 constitutes the refereed proceedings of the 23nd International Conference on Information and Communications Security, ICICS 2021, held in Chongqing, China, in September 2021. The 49 revised full papers presented in the book were carefully selected from 182 submissions. The papers in Part I are organized in the following thematic blocks: blockchain and federated learning; malware analysis and detection; IoT security; software security; Internet security; data-driven cybersecurity. 001439756 588__ $$aOnline resource; title from PDF title page (SpringerLink, viewed September 24, 2021). 001439756 650_0 $$aCryptography$$vCongresses. 001439756 650_0 $$aComputer security$$vCongresses. 001439756 650_0 $$aTelecommunication$$xSecurity measures$$vCongresses. 001439756 650_6 $$aCryptographie$$vCongrès. 001439756 650_6 $$aSécurité informatique$$vCongrès. 001439756 650_6 $$aTélécommunications$$xSécurité$$xMesures$$vCongrès. 001439756 655_7 $$aConference papers and proceedings.$$2fast$$0(OCoLC)fst01423772 001439756 655_7 $$aConference papers and proceedings.$$2lcgft 001439756 655_7 $$aActes de congrès.$$2rvmgf 001439756 655_0 $$aElectronic books. 001439756 7001_ $$aGao, Debin,$$eeditor. 001439756 7001_ $$aLi, Qi,$$eeditor. 001439756 7001_ $$aGuan, Xiaohong,$$eeditor. 001439756 7001_ $$aLiao, Xiaofeng,$$eeditor. 001439756 77608 $$iPrint version:$$z3030868893$$z9783030868895$$w(OCoLC)1263865965 001439756 830_0 $$aLecture notes in computer science ;$$v12918. 001439756 830_0 $$aLNCS sublibrary.$$nSL 4,$$pSecurity and cryptology. 001439756 852__ $$bebk 001439756 85640 $$3Springer Nature$$uhttps://univsouthin.idm.oclc.org/login?url=https://link.springer.com/10.1007/978-3-030-86890-1$$zOnline Access$$91397441.1 001439756 909CO $$ooai:library.usi.edu:1439756$$pGLOBAL_SET 001439756 980__ $$aBIB 001439756 980__ $$aEBOOK 001439756 982__ $$aEbook 001439756 983__ $$aOnline 001439756 994__ $$a92$$bISE