001441363 000__ 03191cam\a2200673\i\4500 001441363 001__ 1441363 001441363 003__ OCoLC 001441363 005__ 20230309004734.0 001441363 006__ m\\\\\o\\d\\\\\\\\ 001441363 007__ cr\un\nnnunnun 001441363 008__ 211218s2021\\\\sz\a\\\\ob\\\\101\0\eng\d 001441363 019__ $$a1288961918$$a1289244923$$a1289341764$$a1289371705$$a1292518839$$a1294352167 001441363 020__ $$a9783030925710$$q(electronic bk.) 001441363 020__ $$a3030925714$$q(electronic bk.) 001441363 020__ $$z9783030925703 001441363 020__ $$z3030925706 001441363 0247_ $$a10.1007/978-3-030-92571-0$$2doi 001441363 035__ $$aSP(OCoLC)1289365887 001441363 040__ $$aYDX$$beng$$erda$$epn$$cYDX$$dGW5XE$$dEBLCP$$dMUU$$dOCLCF$$dDKU$$dOCLCO$$dDCT$$dOCLCQ$$dOCLCO$$dOCLCQ 001441363 049__ $$aISEA 001441363 050_4 $$aQA76.9.A25$$b.I35 2021 001441363 08204 $$a005.8$$223 001441363 1112_ $$aICISS (Conference)$$n(17th :$$d2021 :$$cPatna, India : Online) 001441363 24510 $$aInformation systems security :$$b17th international conference, ICISS 2021, Patna, India, December 16-20, 2021 : proceedings /$$cSomanath Tripathy, Rudrapatna K. Shyamasundar, Rajiv Ranjan (eds.). 001441363 24630 $$aICISS 2021 001441363 264_1 $$aCham :$$bSpringer,$$c[2021] 001441363 264_4 $$c©2021 001441363 300__ $$a1 online resource :$$billustrations (chiefly color) 001441363 336__ $$atext$$btxt$$2rdacontent 001441363 337__ $$acomputer$$bc$$2rdamedia 001441363 338__ $$aonline resource$$bcr$$2rdacarrier 001441363 347__ $$atext file 001441363 347__ $$bPDF 001441363 4901_ $$aLecture notes in computer science ;$$v13146 001441363 4901_ $$aLNCS sublibrary: SL4 - Security and cryptology 001441363 500__ $$aInternational conference proceedings. 001441363 500__ $$aConference held in hybrid mode. 001441363 504__ $$aIncludes bibliographical references and author index. 001441363 506__ $$aAccess limited to authorized users. 001441363 520__ $$aThis book constitutes the proceedings of the 17th International Conference on Information Systems Security, ICISS 2021, held in Patna, India, during December 16-20, 2021. The 9 regular papers, 2 short papers and 4 work-in-progress papers included in this volume were carefully reviewed and selected from a total of 48 submissions. The papers were organized in topical sections named: attack detection, malware identification, data security in distributed systems, and applied cryptography. 001441363 588__ $$aOnline resource; title from PDF title page (SpringerLink, viewed December 22, 2021). 001441363 650_0 $$aComputer security$$vCongresses. 001441363 650_0 $$aComputer networks$$xAccess control$$vCongresses. 001441363 650_6 $$aSécurité informatique$$vCongrès. 001441363 655_7 $$aConference papers and proceedings.$$2fast$$0(OCoLC)fst01423772 001441363 655_7 $$aConference papers and proceedings.$$2lcgft 001441363 655_7 $$aActes de congrès.$$2rvmgf 001441363 655_0 $$aElectronic books. 001441363 7001_ $$aTripathy, Somanath,$$eeditor. 001441363 7001_ $$aShyamasundar, Rudrapatna,$$d1950-$$eeditor. 001441363 7001_ $$aRanjan, Rajiv,$$eeditor. 001441363 830_0 $$aLecture notes in computer science ;$$v13146. 001441363 830_0 $$aLNCS sublibrary.$$nSL 4,$$pSecurity and cryptology. 001441363 852__ $$bebk 001441363 85640 $$3Springer Nature$$uhttps://univsouthin.idm.oclc.org/login?url=https://link.springer.com/10.1007/978-3-030-92571-0$$zOnline Access$$91397441.1 001441363 909CO $$ooai:library.usi.edu:1441363$$pGLOBAL_SET 001441363 980__ $$aBIB 001441363 980__ $$aEBOOK 001441363 982__ $$aEbook 001441363 983__ $$aOnline 001441363 994__ $$a92$$bISE