000 | 04111nam a22005895i 4500 | ||
---|---|---|---|
001 | 978-3-031-77229-0 | ||
003 | DE-He213 | ||
005 | 20250516160157.0 | ||
007 | cr nn 008mamaa | ||
008 | 241117s2024 sz | s |||| 0|eng d | ||
020 |
_a9783031772290 _9978-3-031-77229-0 |
||
050 | 4 | _aTA345-345.5 | |
072 | 7 |
_aUN _2bicssc |
|
072 | 7 |
_aCOM018000 _2bisacsh |
|
072 | 7 |
_aUN _2thema |
|
082 | 0 | 4 |
_a620.00285 _223 |
245 | 1 | 0 |
_aAISMA-2023: International Workshop on Advanced Information Security Management and Applications _h[electronic resource] / _cedited by Zahid Raza, Mikhail Babenko, Mohammad Sajid, Maria Lapina, Vyacheslav Zolotarev. |
250 | _a1st ed. 2024. | ||
264 | 1 |
_aCham : _bSpringer Nature Switzerland : _bImprint: Springer, _c2024. |
|
300 |
_aXII, 258 p. 120 illus., 84 illus. in color. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
490 | 1 |
_aLecture Notes in Networks and Systems, _x2367-3389 ; _v1207 |
|
505 | 0 | _aGeneral model for assessing the quality of socially significant activities as a part of Information Security Management -- Use of Blockchain Technology for Maintaining Authenticity and Credibility of Digital Information -- Detection of Anomalous Activity in Wireless Communication Channels -- Development of an Approach to Confidential Learning with Errors in the Design of Neural Networks. | |
520 | _aThis book is based on the best papers accepted for presentation during the AISMA-2023: International Workshop on Advanced in Information Security Management and Applications on September 29 - October 1, 2023 in online mode at Stavropol, Krasnoyarsk, Russia. The book includes research on information security problems and solutions in the field of information security management, blockchain and cryptography, anomalies activity detection, authentication and key distribution, digital forensics. The scope of research methods in information security management presents original research, including mathematical models and software implementations, related to the following topics: social activities quality, blockchain technology, anomaly detection in wireless sensor networks, DDoS attack detection, incident regulation and trust assessment. In addition, some papers focus on dynamics risks infrastructural genesis at critical information infrastructure facilities. Finally, the book gives insights into some problems using blockchain technology in various applications. The book intends for readership specializing in the field of information security management and applications, information security methods and features. | ||
541 |
_fUABC ; _cPerpetuidad |
||
650 | 0 |
_aEngineering _xData processing. |
|
650 | 0 | _aComputational intelligence. | |
650 | 0 | _aData protection. | |
650 | 1 | 4 | _aData Engineering. |
650 | 2 | 4 | _aComputational Intelligence. |
650 | 2 | 4 | _aData and Information Security. |
700 | 1 |
_aRaza, Zahid. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt |
|
700 | 1 |
_aBabenko, Mikhail. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt |
|
700 | 1 |
_aSajid, Mohammad. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt |
|
700 | 1 |
_aLapina, Maria. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt |
|
700 | 1 |
_aZolotarev, Vyacheslav. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt |
|
710 | 2 | _aSpringerLink (Online service) | |
773 | 0 | _tSpringer Nature eBook | |
776 | 0 | 8 |
_iPrinted edition: _z9783031772283 |
776 | 0 | 8 |
_iPrinted edition: _z9783031772306 |
830 | 0 |
_aLecture Notes in Networks and Systems, _x2367-3389 ; _v1207 |
|
856 | 4 | 0 |
_zLibro electrónico _uhttp://libcon.rec.uabc.mx:2048/login?url=https://doi.org/10.1007/978-3-031-77229-0 |
912 | _aZDB-2-INR | ||
912 | _aZDB-2-SXIT | ||
942 | _cLIBRO_ELEC | ||
999 |
_c276838 _d276837 |