000922465 000__ 02715cam\a2200517Ii\4500 000922465 001__ 922465 000922465 005__ 20230306150836.0 000922465 006__ m\\\\\o\\d\\\\\\\\ 000922465 007__ cr\cn\nnnunnun 000922465 008__ 190903s2020\\\\sz\a\\\\ob\\\\101\0\eng\d 000922465 019__ $$a1117306066$$a1117701131 000922465 020__ $$a9783030251284$$q(electronic book) 000922465 020__ $$a3030251284$$q(electronic book) 000922465 020__ $$z9783030251277 000922465 0247_ $$a10.1007/978-3-030-25128-4$$2doi 000922465 0247_ $$a10.1007/978-3-030-25 000922465 035__ $$aSP(OCoLC)on1117276430 000922465 035__ $$aSP(OCoLC)1117276430$$z(OCoLC)1117306066$$z(OCoLC)1117701131 000922465 040__ $$aGW5XE$$beng$$erda$$epn$$cGW5XE$$dLQU$$dUKMGB$$dOCLCF 000922465 049__ $$aISEA 000922465 050_4 $$aQA76.9.A25 000922465 08204 $$a005.8$$223 000922465 1112_ $$aInternational Conference on Applications and Techniques in Cyber Intelligence$$d(2019 :$$cHuainan Shi, China) 000922465 24510 $$aInternational Conference on Applications and Techniques in Cyber Intelligence ATCI 2019 :$$bApplications and Techniques in Cyber Intelligence /$$cJemal H. Abawajy, Kim-Kwang Raymond Choo, Rafiqul Islam, Zheng Xu, Mohammed Atiquzzaman (editors). 000922465 264_1 $$aCham, Switzerland :$$bSpringer,$$c[2020] 000922465 300__ $$a1 online resource (xxxii, 2132 pages) :$$billustrations. 000922465 336__ $$atext$$btxt$$2rdacontent 000922465 337__ $$acomputer$$bc$$2rdamedia 000922465 338__ $$aonline resource$$bcr$$2rdacarrier 000922465 4901_ $$aAdvances in intelligent systems and computing,$$x2194-5365 ;$$vvolume 1017 000922465 504__ $$aIncludes bibliographical references and index. 000922465 506__ $$aAccess limited to authorized users. 000922465 520__ $$aThis book presents innovative ideas, cutting-edge findings, and novel techniques, methods, and applications in a broad range of cybersecurity and cyberthreat intelligence areas. As our society becomes smarter, there is a corresponding need to be able to secure our cyberfuture. The approaches and findings described in this book are of interest to businesses and governments seeking to secure our data and underpin infrastructures, as well as to individual users. 000922465 588__ $$aOnline resource; title from PDF title page (SpringerLink, viewed September 3, 2019). 000922465 650_0 $$aCyber intelligence (Computer security)$$vCongresses. 000922465 650_0 $$aComputer security$$vCongresses. 000922465 7001_ $$aAbawajy, Jemal H.,$$d1982-$$eeditor. 000922465 7001_ $$aChoo, Kim-Kwang Raymond,$$eeditor. 000922465 7001_ $$aIslam, Rafiqul,$$eeditor. 000922465 7001_ $$aXu, Zheng,$$eeditor. 000922465 7001_ $$aAtiquzzaman, Mohammed,$$eeditor. 000922465 830_0 $$aAdvances in intelligent systems and computing ;$$v1017. 000922465 852__ $$bebk 000922465 85640 $$3SpringerLink$$uhttps://univsouthin.idm.oclc.org/login?url=http://link.springer.com/10.1007/978-3-030-25128-4$$zOnline Access$$91397441.1 000922465 909CO $$ooai:library.usi.edu:922465$$pGLOBAL_SET 000922465 980__ $$aEBOOK 000922465 980__ $$aBIB 000922465 982__ $$aEbook 000922465 983__ $$aOnline 000922465 994__ $$a92$$bISE