000 | 05230nam a22006255i 4500 | ||
---|---|---|---|
001 | 978-3-031-31860-3 | ||
003 | DE-He213 | ||
005 | 20240207153441.0 | ||
007 | cr nn 008mamaa | ||
008 | 230429s2023 sz | s |||| 0|eng d | ||
020 |
_a9783031318603 _9978-3-031-31860-3 |
||
050 | 4 | _aQ342 | |
072 | 7 |
_aUYQ _2bicssc |
|
072 | 7 |
_aTEC009000 _2bisacsh |
|
072 | 7 |
_aUYQ _2thema |
|
082 | 0 | 4 |
_a006.3 _223 |
245 | 1 | 0 |
_aCyber Security Intelligence and Analytics _h[electronic resource] : _bThe 5th International Conference on Cyber Security Intelligence and Analytics (CSIA 2023), Volume 1 / _cedited by Zheng Xu, Saed Alrabaee, Octavio Loyola-González, Niken Dwi Wahyu Cahyani, Nurul Hidayah Ab Rahman. |
250 | _a1st ed. 2023. | ||
264 | 1 |
_aCham : _bSpringer Nature Switzerland : _bImprint: Springer, _c2023. |
|
300 |
_aXIV, 578 p. 201 illus., 161 illus. in color. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
490 | 1 |
_aLecture Notes on Data Engineering and Communications Technologies, _x2367-4520 ; _v172 |
|
500 | _aAcceso multiusuario | ||
505 | 0 | _aImage Retrieval Algorithm of Intangible Cultural Heritage Based on Artificial Intelligence Technology -- Network Lossless Information Hiding Communication Method Based on Big Data -- Anomaly Recognition Method of Network Media Large Data Stream Based on Feature Learning -- Design and Implementation of Automatic Quick Report Function for WeChat on Earthquake Information in Liaoning -- Application of BIM + GIS Technology in Smart city 3D Design System -- Myopic retailer's Cooperative Advertising Strategies in Supply Chain Based on Differential Games -- Hardware System of Thermal Imaging Distribution Line Temperature Monitor based on Digital Technology -- Applications of Key Automation Technologies in Machine Manufacturing Industry -- The application of Vr technology in Han Embroidery Digital Museum -- Analysis of International Trade Relations Forecasting Model Based on Digital Trade -- Empirical Analysis of Online Broadcast Based on TAM Model -- A High Resolution Wavelet Chaos Algorithm for Optimization of Image Separation Processing in Graphic Design -- Design and Implementation of Smart Tourism Scenic Spot Monitoring System Based on STM32 -- Herd Effect Analysis of Stock Market Based on Big Data Intelligent Algorithm -- Intelligent Recommendation System for Early Childhood Learning Platform Based on Big Data and Machine Learning Algorithm -- Big Data Technology Driven 5G Network Optimization Analysis -- An Enterprise Financial Statement Identification Method based on Support Vector Machine -- An AIS Trusted Requirements Model for Cloud Accounting Based on Complex Network. | |
520 | _aThis book provides the proceedings of the 5th International Conference on Cyber Security Intelligence and Analytics. The 5th International Conference on Cyber Security Intelligence and Analytics (CSIA 2023) is an international conference dedicated to promoting novel theoretical and applied research advances in the interdisciplinary agenda of cyber security, particularly focusing on threat intelligence and analytics and countering cybercrime. Cyber security experts, including those in data analytics, incident response and digital forensics, need to be able to rapidly detect, analyze and defend against a diverse range of cyber threats in near real-time conditions. We are organizing the CSIA 2023 at Radisson Blu Shanghai Pudong Jinqiao Hotel. It will feature a technical program of refereed papers selected by the international program committee, keynote address. | ||
541 |
_fUABC ; _cPerpetuidad |
||
650 | 0 | _aComputational intelligence. | |
650 | 0 |
_aEngineering _xData processing. |
|
650 | 0 | _aCooperating objects (Computer systems). | |
650 | 0 | _aData protection. | |
650 | 1 | 4 | _aComputational Intelligence. |
650 | 2 | 4 | _aData Engineering. |
650 | 2 | 4 | _aCyber-Physical Systems. |
650 | 2 | 4 | _aData and Information Security. |
700 | 1 |
_aXu, Zheng. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt |
|
700 | 1 |
_aAlrabaee, Saed. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt |
|
700 | 1 |
_aLoyola-González, Octavio. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt |
|
700 | 1 |
_aCahyani, Niken Dwi Wahyu. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt |
|
700 | 1 |
_aAb Rahman, Nurul Hidayah. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt |
|
710 | 2 | _aSpringerLink (Online service) | |
773 | 0 | _tSpringer Nature eBook | |
776 | 0 | 8 |
_iPrinted edition: _z9783031318597 |
776 | 0 | 8 |
_iPrinted edition: _z9783031318610 |
830 | 0 |
_aLecture Notes on Data Engineering and Communications Technologies, _x2367-4520 ; _v172 |
|
856 | 4 | 0 |
_zLibro electrónico _uhttp://libcon.rec.uabc.mx:2048/login?url=https://doi.org/10.1007/978-3-031-31860-3 |
912 | _aZDB-2-INR | ||
912 | _aZDB-2-SXIT | ||
942 | _cLIBRO_ELEC | ||
999 |
_c260325 _d260324 |