000 | 03394nam a22006735i 4500 | ||
---|---|---|---|
001 | 978-3-030-62223-7 | ||
003 | DE-He213 | ||
005 | 20240730200559.0 | ||
007 | cr nn 008mamaa | ||
008 | 201110s2020 sz | s |||| 0|eng d | ||
020 |
_a9783030622237 _9978-3-030-62223-7 |
||
024 | 7 |
_a10.1007/978-3-030-62223-7 _2doi |
|
050 | 4 | _aQA76.9.A25 | |
072 | 7 |
_aUR _2bicssc |
|
072 | 7 |
_aUTN _2bicssc |
|
072 | 7 |
_aCOM053000 _2bisacsh |
|
072 | 7 |
_aUR _2thema |
|
072 | 7 |
_aUTN _2thema |
|
082 | 0 | 4 |
_a005.8 _223 |
245 | 1 | 0 |
_aMachine Learning for Cyber Security _h[electronic resource] : _bThird International Conference, ML4CS 2020, Guangzhou, China, October 8-10, 2020, Proceedings, Part I / _cedited by Xiaofeng Chen, Hongyang Yan, Qiben Yan, Xiangliang Zhang. |
250 | _a1st ed. 2020. | ||
264 | 1 |
_aCham : _bSpringer International Publishing : _bImprint: Springer, _c2020. |
|
300 |
_aXXVII, 650 p. 282 illus., 183 illus. in color. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
490 | 1 |
_aSecurity and Cryptology, _x2946-1863 ; _v12486 |
|
505 | 0 | _aMachine learning -- Security. Privacy-preserving -- Cyber security -- Adversarial machine Learning -- Malware detection and analysis -- Data mining -- AI. | |
520 | _aThis three volume book set constitutes the proceedings of the Third International Conference on Machine Learning for Cyber Security, ML4CS 2020, held in Xi'an, China in October 2020. The 118 full papers and 40 short papers presented were carefully reviewed and selected from 360 submissions. The papers offer a wide range of the following subjects: Machine learning, security, privacy-preserving, cyber security, Adversarial machine Learning, Malware detection and analysis, Data mining, and Artificial Intelligence. | ||
650 | 0 |
_aData protection. _97245 |
|
650 | 0 |
_aSocial sciences _xData processing. _983360 |
|
650 | 0 |
_aEducation _xData processing. _982607 |
|
650 | 0 |
_aComputers and civilization. _921733 |
|
650 | 0 |
_aCryptography. _91973 |
|
650 | 0 |
_aData encryption (Computer science). _99168 |
|
650 | 1 | 4 |
_aData and Information Security. _931990 |
650 | 2 | 4 |
_aComputer Application in Social and Behavioral Sciences. _931815 |
650 | 2 | 4 |
_aComputers and Education. _941129 |
650 | 2 | 4 |
_aComputers and Society. _931668 |
650 | 2 | 4 |
_aCryptology. _931769 |
650 | 2 | 4 |
_aSecurity Services. _978910 |
700 | 1 |
_aChen, Xiaofeng. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _9163969 |
|
700 | 1 |
_aYan, Hongyang. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _9163970 |
|
700 | 1 |
_aYan, Qiben. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _9163971 |
|
700 | 1 |
_aZhang, Xiangliang. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _9163972 |
|
710 | 2 |
_aSpringerLink (Online service) _9163973 |
|
773 | 0 | _tSpringer Nature eBook | |
776 | 0 | 8 |
_iPrinted edition: _z9783030622220 |
776 | 0 | 8 |
_iPrinted edition: _z9783030622244 |
830 | 0 |
_aSecurity and Cryptology, _x2946-1863 ; _v12486 _9163974 |
|
856 | 4 | 0 | _uhttps://doi.org/10.1007/978-3-030-62223-7 |
912 | _aZDB-2-SCS | ||
912 | _aZDB-2-SXCS | ||
912 | _aZDB-2-LNC | ||
942 | _cELN | ||
999 |
_c96125 _d96125 |