000838883 000__ 04053cam\a2200613Ii\4500 000838883 001__ 838883 000838883 005__ 20230306144700.0 000838883 006__ m\\\\\o\\d\\\\\\\\ 000838883 007__ cr\un\nnnunnu 000838883 008__ 180504s2018\\\\sz\a\\\\o\\\\\101\0\eng\d 000838883 019__ $$a1034550939$$a1038450621 000838883 020__ $$a9783319788166$$q(electronic book) 000838883 020__ $$a3319788167$$q(electronic book) 000838883 020__ $$z9783319788159 000838883 0247_ $$a10.1007/978-3-319-78816-6$$2doi 000838883 035__ $$aSP(OCoLC)on1034005912 000838883 035__ $$aSP(OCoLC)1034005912$$z(OCoLC)1034550939$$z(OCoLC)1038450621 000838883 040__ $$aGW5XE$$beng$$erda$$epn$$cGW5XE$$dAZU$$dUPM$$dCOO$$dUAB$$dOCLCF 000838883 049__ $$aISEA 000838883 050_4 $$aTK5102.85 000838883 08204 $$a005.8$$223 000838883 1112_ $$aInternational Workshop on Applications and Techniques in Cyber Security$$d(2017 :$$cNiagara Falls, Ont.) 000838883 24510 $$aSecurity and privacy in communication networks :$$bSecureComm 2017 International Workshops, ATCS and SePrIoT, Niagara Falls, ON, Canada, October 22-25, 2017, Proceedings /$$cXiaodong Lin, Ali Ghorbani, Kui Ren, Sencun Zhu, Aiqing Zhang (eds.). 000838883 2463_ $$aATCS 2017 000838883 2463_ $$aSePrIoT 2017 000838883 2463_ $$aSecureComm 20177 000838883 264_1 $$aCham, Switzerland :$$bSpringer,$$c2018. 000838883 300__ $$a1 online resource (xi, 339 pages) :$$billustrations. 000838883 336__ $$atext$$btxt$$2rdacontent 000838883 337__ $$acomputer$$bc$$2rdamedia 000838883 338__ $$aonline resource$$bcr$$2rdacarrier 000838883 347__ $$atext file$$bPDF$$2rda 000838883 4901_ $$aLecture notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering,$$x1867-8211 ;$$v239 000838883 500__ $$aInternational conference proceedings. 000838883 500__ $$aIncludes author index. 000838883 5050_ $$aAccess control -- Language-based security -- Malicious software -- Network security -- Cloud security -- Software security -- Operating system security -- Privacy protection -- Database security -- Security models -- Novel models -- Techniques -- Protocols -- Algorithms -- Architectures. 000838883 506__ $$aAccess limited to authorized users. 000838883 520__ $$aThis book constitutes the refereed proceedings of two workshops held at the 13th International Conference on Security and Privacy in Communications Networks, SecureComm 2017, held in Niagara Falls, ON, Canada, in October 2017: the 5th International Workshop on Applications and Techniques in Cyber Security, ATCS 2017, and the First Workshop on Security and Privacy in the Internet Of Things, SePrIoT 2017. The 22 revised regular papers were carefully reviewed and selected from 105 submissions. The topics range from access control; language-based security; malicious software; network security; cloud security; software security; operating system security; privacy protection, database security, security models; and many more. The SePrIoT workshop targets to address novel approaches in security and privacy. The papers focuse, amongst others, on novel models, techniques, protocols, algorithms, or architectures. 000838883 588__ $$aOnline resource; title from PDF title page (SpringerLink, viewed May 4, 2018). 000838883 650_0 $$aTelecommunication systems$$xSecurity measures$$vCongresses. 000838883 650_0 $$aComputer networks$$xSecurity measures$$vCongresses. 000838883 7001_ $$aLin, Xiaodong$$c(Computer scientist),$$eeditor. 000838883 7001_ $$aGhorbani, Ali,$$d1954-$$eeditor. 000838883 7001_ $$aRen, Kui,$$eeditor. 000838883 7001_ $$aZhu, Sencun,$$eeditor. 000838883 7001_ $$aZhang, Aiqing,$$eeditor. 000838883 7112_ $$aWorkshop on Security and Privacy in the Internet of Things$$n(1st :$$d2017 :$$cNiagara Falls, Ont.),$$jjointly held conference. 000838883 7112_ $$aInternational Conference on Security and Privacy for Emerging Areas in Communications Networks$$n(13th :$$d2017 :$$cNiagara Falls, Ont.) 000838883 77608 $$iPrint version: $$z9783319788159 000838883 830_0 $$aLecture notes of the Institute for Computer Sciences, Social Informatics, and Telecommunications Engineering ;$$v239. 000838883 852__ $$bebk 000838883 85640 $$3SpringerLink$$uhttps://univsouthin.idm.oclc.org/login?url=http://link.springer.com/10.1007/978-3-319-78816-6$$zOnline Access$$91397441.1 000838883 909CO $$ooai:library.usi.edu:838883$$pGLOBAL_SET 000838883 980__ $$aEBOOK 000838883 980__ $$aBIB 000838883 982__ $$aEbook 000838883 983__ $$aOnline 000838883 994__ $$a92$$bISE