000824160 000__ 02656cam\a2200517Ii\4500 000824160 001__ 824160 000824160 005__ 20230306144107.0 000824160 006__ m\\\\\o\\d\\\\\\\\ 000824160 007__ cr\cn\nnnunnun 000824160 008__ 171025s2018\\\\sz\a\\\\ob\\\\101\0\eng\d 000824160 019__ $$a1013497835 000824160 020__ $$a9783319670713$$q(electronic book) 000824160 020__ $$a3319670719$$q(electronic book) 000824160 020__ $$z9783319670706 000824160 0247_ $$a10.1007/978-3-319-67071-3$$2doi 000824160 035__ $$aSP(OCoLC)on1007520860 000824160 035__ $$aSP(OCoLC)1007520860$$z(OCoLC)1013497835 000824160 040__ $$aN$T$$beng$$erda$$epn$$cN$T$$dN$T$$dGW5XE$$dAZU$$dOCLCF$$dCOO$$dUAB$$dOCLCQ$$dOCLCA$$dU3W$$dCAUOI 000824160 049__ $$aISEA 000824160 050_4 $$aQA76.9.A25 000824160 08204 $$a005.8$$223 000824160 1112_ $$aInternational Conference on Applications and Techniques in Cyber Security and Intelligence$$d(2017) 000824160 24510 $$aInternational Conference on Applications and Techniques in Cyber Security and Intelligence :$$bapplications and techniques in cyber security and intelligence /$$cJemal Abawajy, Kim-Kwang Raymond Choo, Rafiqul Islam, editors. 000824160 264_1 $$aCham, Switzerland :$$bSpringer,$$c2018. 000824160 300__ $$a1 online resource :$$billustrations. 000824160 336__ $$atext$$btxt$$2rdacontent 000824160 337__ $$acomputer$$bc$$2rdamedia 000824160 338__ $$aonline resource$$bcr$$2rdacarrier 000824160 347__ $$atext file$$bPDF$$2rda 000824160 4901_ $$aAdvances in intelligent systems and computing,$$x2194-5365 ;$$v580 000824160 504__ $$aIncludes bibliographical references and index. 000824160 506__ $$aAccess limited to authorized users. 000824160 520__ $$aThis book presents the outcomes of the 2017 International Conference on Applications and Techniques in Cyber Security and Intelligence, which focused on all aspects of techniques and applications in cyber and electronic security and intelligence research. The conference provides a forum for presenting and discussing innovative ideas, cutting-edge research findings, and novel techniques, methods and applications on all aspects of cyber and electronic security and intelligence. 000824160 588__ $$aOnline resource; title from PDF title page (viewed October 27, 2017). 000824160 650_0 $$aComputer security$$vCongresses. 000824160 650_0 $$aComputer crimes$$vCongresses. 000824160 650_0 $$aArtificial intelligence$$vCongresses. 000824160 7001_ $$aAbawajy, Jemal H.,$$d1982-$$eeditor. 000824160 7001_ $$aChoo, Kim-Kwang Raymond,$$eeditor. 000824160 7001_ $$aIslam, Rafiqul,$$eeditor. 000824160 77608 $$iPrint version: $$z9783319670706 000824160 830_0 $$aAdvances in intelligent systems and computing ;$$v580. 000824160 852__ $$bebk 000824160 85640 $$3SpringerLink$$uhttps://univsouthin.idm.oclc.org/login?url=http://link.springer.com/10.1007/978-3-319-67071-3$$zOnline Access$$91397441.1 000824160 909CO $$ooai:library.usi.edu:824160$$pGLOBAL_SET 000824160 980__ $$aEBOOK 000824160 980__ $$aBIB 000824160 982__ $$aEbook 000824160 983__ $$aOnline 000824160 994__ $$a92$$bISE