001463677 000__ 05376cam\a22006737i\4500 001463677 001__ 1463677 001463677 003__ OCoLC 001463677 005__ 20230601003332.0 001463677 006__ m\\\\\o\\d\\\\\\\\ 001463677 007__ cr\un\nnnunnun 001463677 008__ 230503s2023\\\\sz\a\\\\o\\\\\101\0\eng\d 001463677 019__ $$a1378095824 001463677 020__ $$a9783031318603$$q(electronic bk.) 001463677 020__ $$a3031318609$$q(electronic bk.) 001463677 020__ $$z9783031318597 001463677 020__ $$z3031318595 001463677 0247_ $$a10.1007/978-3-031-31860-3$$2doi 001463677 035__ $$aSP(OCoLC)1378118435 001463677 040__ $$aGW5XE$$beng$$erda$$epn$$cGW5XE$$dYDX$$dEBLCP 001463677 049__ $$aISEA 001463677 050_4 $$aQA76.9.A25$$bI58 2023eb 001463677 08204 $$a005.8$$223/eng/20230503 001463677 1112_ $$aInternational Conference on Cyber Security Intelligence and Analytics$$n(5th :$$d2023 :$$cShanghai, China) 001463677 24510 $$aCyber security intelligence and analytics :$$bThe 5th International Conference on Cyber Security Intelligence and Analytics (CSIA 2023).$$nVolume 1 /$$cZheng Xu, Saed Alrabaee, Octavio Loyola-González, Niken Dwi Wahyu Cahyani, Nurul Hidayah Ab Rahman, editors. 001463677 2463_ $$aCSIA 2023 001463677 264_1 $$aCham :$$bSpringer,$$c2023. 001463677 300__ $$a1 online resource (xiv, 578 pages) :$$billustrations (some color). 001463677 336__ $$atext$$btxt$$2rdacontent 001463677 337__ $$acomputer$$bc$$2rdamedia 001463677 338__ $$aonline resource$$bcr$$2rdacarrier 001463677 4901_ $$aLecture notes on data engineering and communications technologies,$$x2367-4520 ;$$v172 001463677 500__ $$aIncludes author index. 001463677 5050_ $$aImage Retrieval Algorithm of Intangible Cultural Heritage Based on Artificial Intelligence Technology -- Network Lossless Information Hiding Communication Method Based on Big Data -- Anomaly Recognition Method of Network Media Large Data Stream Based on Feature Learning -- Design and Implementation of Automatic Quick Report Function for WeChat on Earthquake Information in Liaoning -- Application of BIM + GIS Technology in Smart city 3D Design System -- Myopic retailer's Cooperative Advertising Strategies in Supply Chain Based on Differential Games -- Hardware System of Thermal Imaging Distribution Line Temperature Monitor based on Digital Technology -- Applications of Key Automation Technologies in Machine Manufacturing Industry -- The application of Vr technology in Han Embroidery Digital Museum -- Analysis of International Trade Relations Forecasting Model Based on Digital Trade -- Empirical Analysis of Online Broadcast Based on TAM Model -- A High Resolution Wavelet Chaos Algorithm for Optimization of Image Separation Processing in Graphic Design -- Design and Implementation of Smart Tourism Scenic Spot Monitoring System Based on STM32 -- Herd Effect Analysis of Stock Market Based on Big Data Intelligent Algorithm -- Intelligent Recommendation System for Early Childhood Learning Platform Based on Big Data and Machine Learning Algorithm -- Big Data Technology Driven 5G Network Optimization Analysis -- An Enterprise Financial Statement Identification Method based on Support Vector Machine -- An AIS Trusted Requirements Model for Cloud Accounting Based on Complex Network. 001463677 506__ $$aAccess limited to authorized users. 001463677 520__ $$aThis book provides the proceedings of the 5th International Conference on Cyber Security Intelligence and Analytics. The 5th International Conference on Cyber Security Intelligence and Analytics (CSIA 2023) is an international conference dedicated to promoting novel theoretical and applied research advances in the interdisciplinary agenda of cyber security, particularly focusing on threat intelligence and analytics and countering cybercrime. Cyber security experts, including those in data analytics, incident response and digital forensics, need to be able to rapidly detect, analyze and defend against a diverse range of cyber threats in near real-time conditions. We are organizing the CSIA 2023 at Radisson Blu Shanghai Pudong Jinqiao Hotel. It will feature a technical program of refereed papers selected by the international program committee, keynote address. 001463677 588__ $$aOnline resource; title from PDF title page (SpringerLink, viewed May 3, 2023). 001463677 650_0 $$aComputer security$$vCongresses. 001463677 655_0 $$aElectronic books. 001463677 7001_ $$aXu, Zheng$$c(Of Shanghai da xue),$$eeditor. 001463677 7001_ $$aAlrabaee, Saed,$$eeditor. 001463677 7001_ $$aLoyola-González, Octavio,$$eeditor. 001463677 7001_ $$aCahyani, Niken Dwi Wahyu,$$eeditor. 001463677 7001_ $$aAb Rahman, Nurul Hidayah,$$eeditor. 001463677 77608 $$iPrint version: $$z3031318595$$z9783031318597$$w(OCoLC)1374106899 001463677 830_0 $$aLecture notes on data engineering and communications technologies ;$$vv. 172.$$x2367-4520 001463677 852__ $$bebk 001463677 85640 $$3Springer Nature$$uhttps://univsouthin.idm.oclc.org/login?url=https://link.springer.com/10.1007/978-3-031-31860-3$$zOnline Access$$91397441.1 001463677 909CO $$ooai:library.usi.edu:1463677$$pGLOBAL_SET 001463677 980__ $$aBIB 001463677 980__ $$aEBOOK 001463677 982__ $$aEbook 001463677 983__ $$aOnline 001463677 994__ $$a92$$bISE