000761474 000__ 02607cam\a2200493Ii\4500 000761474 001__ 761474 000761474 005__ 20230306142158.0 000761474 006__ m\\\\\o\\d\\\\\\\\ 000761474 007__ cr\cn\nnnunnun 000761474 008__ 160928s2016\\\\si\a\\\\o\\\\\101\0\eng\d 000761474 020__ $$a9789811027413$$q(electronic book) 000761474 020__ $$a9811027412$$q(electronic book) 000761474 020__ $$z9789811027406 000761474 0247_ $$a10.1007/978-981-10-2741-3$$2doi 000761474 035__ $$aSP(OCoLC)ocn959366861 000761474 035__ $$aSP(OCoLC)959366861 000761474 040__ $$aGW5XE$$beng$$erda$$epn$$cGW5XE$$dOCLCO$$dDKU$$dNJR 000761474 049__ $$aISEA 000761474 050_4 $$aQA76.9.A25 000761474 08204 $$a005.8$$223 000761474 1112_ $$aATIS (Conference)$$n(7th :$$d2016 :$$cCairns, Qld.) 000761474 24510 $$aApplications and techniques in information security :$$b6th [i.e. 7th] International Conference, ATIS 2016, Cairns, QLD, Australia, October 26-28, 2016, Proceedings /$$cLynn Batten, Gang Li (eds.). 000761474 2463_ $$aATIS 2016 000761474 264_1 $$aSingapore :$$bSpringer,$$c2016. 000761474 300__ $$a1 online resource (xvi, 163 pages) :$$billustrations. 000761474 336__ $$atext$$btxt$$2rdacontent 000761474 337__ $$acomputer$$bc$$2rdamedia 000761474 338__ $$aonline resource$$bcr$$2rdacarrier 000761474 4901_ $$aCommunications in computer and information science,$$x1865-0929 ;$$v651 000761474 500__ $$aInternational conference proceedings. 000761474 500__ $$aIncludes author index. 000761474 5050_ $$aInvited speeches -- Attacks on data security systems -- Detection of attacks on data security systems -- Data security -- Data privacy. 000761474 506__ $$aAccess limited to authorized users. 000761474 520__ $$aThis book constitutes the refereed proceedings of the International Conference on Applications and Techniques in Information Security, ATIS 2016, held in Cairns, Australia, October 2016. The 10 revised full papers and three short papers presented together with two invited talks were carefully reviewed and selected from 38 submissions. The papers are organized in topical sections on invited speeches; attacks on data security systems; detection of attacks on data security systems; data security; data privacy. 000761474 588__ $$aOnline resource; title from PDF title page (SpringerLink, viewed September 28, 2016). 000761474 650_0 $$aComputer security$$vCongresses. 000761474 650_0 $$aComputer networks$$xSecurity measures$$vCongresses. 000761474 7001_ $$aBatten, Lynn,$$eeditor. 000761474 7001_ $$aLi, Gang$$c(Computer scientist),$$eeditor. 000761474 830_0 $$aCommunications in computer and information science ;$$v651. 000761474 852__ $$bebk 000761474 85640 $$3SpringerLink$$uhttps://univsouthin.idm.oclc.org/login?url=http://link.springer.com/10.1007/978-981-10-2741-3$$zOnline Access$$91397441.1 000761474 909CO $$ooai:library.usi.edu:761474$$pGLOBAL_SET 000761474 980__ $$aEBOOK 000761474 980__ $$aBIB 000761474 982__ $$aEbook 000761474 983__ $$aOnline 000761474 994__ $$a92$$bISE