001449015 000__ 02995cam\a2200589\a\4500 001449015 001__ 1449015 001449015 003__ OCoLC 001449015 005__ 20230310004338.0 001449015 006__ m\\\\\o\\d\\\\\\\\ 001449015 007__ cr\un\nnnunnun 001449015 008__ 220827s2022\\\\sz\\\\\\o\\\\\100\0\eng\d 001449015 019__ $$a1342248804 001449015 020__ $$a9783031157776$$q(electronic bk.) 001449015 020__ $$a303115777X$$q(electronic bk.) 001449015 020__ $$z3031157761 001449015 020__ $$z9783031157769 001449015 0247_ $$a10.1007/978-3-031-15777-6$$2doi 001449015 035__ $$aSP(OCoLC)1342502097 001449015 040__ $$aEBLCP$$beng$$epn$$cEBLCP$$dGW5XE$$dYDX$$dEBLCP$$dOCLCQ$$dOCLCF$$dOCLCQ 001449015 049__ $$aISEA 001449015 050_4 $$aQA76.9.A25$$bI35 2022eb 001449015 08204 $$a005.8$$223/eng/20220901 001449015 1112_ $$aICICS (Conference)$$n(24th :$$d2022 :$$cCanterbury, England ; Online) 001449015 24510 $$aInformation and communications security :$$b24th International Conference, ICICS 2022, Canterbury, UK, September 5-8, 2022, Proceedings /$$cCristina Alcaraz, Liqun Chen, Shujun Li, Pierangela Samarati (eds.). 001449015 2463_ $$aICICS 2022 001449015 260__ $$aCham, Switzerland :$$bSpringer,$$c2022. 001449015 300__ $$a1 online resource (649 pages) 001449015 336__ $$atext$$btxt$$2rdacontent 001449015 337__ $$acomputer$$bc$$2rdamedia 001449015 338__ $$aonline resource$$bcr$$2rdacarrier 001449015 4901_ $$aLecture notes in computer science ;$$v13407 001449015 5050_ $$aCryptography -- Authentication -- Privacy and Anonymity -- Attacks and Vulnerability Analysis -- Artificial Intelligence for Detection -- Network Security and Forensics. 001449015 506__ $$aAccess limited to authorized users. 001449015 520__ $$aThis LNCS 13407 constitutes the refereed proceedings of the 24th International Conference on Information and Communications Security, ICICS 2022, held in Canterbury, UK, in September 2022. The 34 revised full papers presented in the book were carefully selected from 150 submissions The papers are organized around the following topics: Cryptography, Authentication, Privacy and Anonymity, Attacks and Vulnerability Analysis, Artificial Intelligence for Detection, and Network Security and Forensics. 001449015 588__ $$aOnline resource; title from PDF title page (SpringerLink, viewed September 1, 2022). 001449015 650_0 $$aCryptography$$vCongresses. 001449015 650_0 $$aComputer security$$vCongresses. 001449015 650_0 $$aTelecommunication$$xSecurity measures$$vCongresses. 001449015 655_7 $$aConference papers and proceedings.$$2fast$$0(OCoLC)fst01423772 001449015 655_0 $$aElectronic books. 001449015 7001_ $$aAlcaraz, Cristina. 001449015 7001_ $$aChen, Liqun. 001449015 7001_ $$aLi, Shujun. 001449015 7001_ $$aSamarati, Pierangela. 001449015 77608 $$iPrint version:$$aAlcaraz, Cristina.$$tInformation and Communications Security.$$dCham : Springer International Publishing AG, ©2022$$z9783031157769 001449015 830_0 $$aLecture notes in computer science ;$$v13407. 001449015 852__ $$bebk 001449015 85640 $$3Springer Nature$$uhttps://univsouthin.idm.oclc.org/login?url=https://link.springer.com/10.1007/978-3-031-15777-6$$zOnline Access$$91397441.1 001449015 909CO $$ooai:library.usi.edu:1449015$$pGLOBAL_SET 001449015 980__ $$aBIB 001449015 980__ $$aEBOOK 001449015 982__ $$aEbook 001449015 983__ $$aOnline 001449015 994__ $$a92$$bISE