000 | 03403nam a22006735i 4500 | ||
---|---|---|---|
001 | 978-3-030-62463-7 | ||
003 | DE-He213 | ||
005 | 20240730200602.0 | ||
007 | cr nn 008mamaa | ||
008 | 201110s2020 sz | s |||| 0|eng d | ||
020 |
_a9783030624637 _9978-3-030-62463-7 |
||
024 | 7 |
_a10.1007/978-3-030-62463-7 _2doi |
|
050 | 4 | _aQA76.9.A25 | |
072 | 7 |
_aUR _2bicssc |
|
072 | 7 |
_aUTN _2bicssc |
|
072 | 7 |
_aCOM053000 _2bisacsh |
|
072 | 7 |
_aUR _2thema |
|
072 | 7 |
_aUTN _2thema |
|
082 | 0 | 4 |
_a005.8 _223 |
245 | 1 | 0 |
_aMachine Learning for Cyber Security _h[electronic resource] : _bThird International Conference, ML4CS 2020, Guangzhou, China, October 8-10, 2020, Proceedings, Part III / _cedited by Xiaofeng Chen, Hongyang Yan, Qiben Yan, Xiangliang Zhang. |
250 | _a1st ed. 2020. | ||
264 | 1 |
_aCham : _bSpringer International Publishing : _bImprint: Springer, _c2020. |
|
300 |
_aXV, 554 p. 261 illus., 163 illus. in color. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
490 | 1 |
_aSecurity and Cryptology, _x2946-1863 ; _v12488 |
|
505 | 0 | _aMachine learning -- Security. Privacy-preserving -- Cyber security -- Adversarial machine Learning -- Malware detection and analysis -- Data mining -- AI. | |
520 | _aThis three volume book set constitutes the proceedings of the Third International Conference on Machine Learning for Cyber Security, ML4CS 2020, held in Xi'an, China in October 2020. The 118 full papers and 40 short papers presented were carefully reviewed and selected from 360 submissions. The papers offer a wide range of the following subjects: Machine learning, security, privacy-preserving, cyber security, Adversarial machine Learning, Malware detection and analysis, Data mining, and Artificial Intelligence. | ||
650 | 0 |
_aData protection. _97245 |
|
650 | 0 |
_aSocial sciences _xData processing. _983360 |
|
650 | 0 |
_aEducation _xData processing. _982607 |
|
650 | 0 |
_aMachine learning. _91831 |
|
650 | 0 |
_aComputer networks . _931572 |
|
650 | 0 |
_aComputer systems. _9163981 |
|
650 | 1 | 4 |
_aData and Information Security. _931990 |
650 | 2 | 4 |
_aComputer Application in Social and Behavioral Sciences. _931815 |
650 | 2 | 4 |
_aComputers and Education. _941129 |
650 | 2 | 4 |
_aMachine Learning. _91831 |
650 | 2 | 4 |
_aComputer Communication Networks. _9163982 |
650 | 2 | 4 |
_aComputer System Implementation. _938514 |
700 | 1 |
_aChen, Xiaofeng. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _9163983 |
|
700 | 1 |
_aYan, Hongyang. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _9163984 |
|
700 | 1 |
_aYan, Qiben. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _9163985 |
|
700 | 1 |
_aZhang, Xiangliang. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _9163986 |
|
710 | 2 |
_aSpringerLink (Online service) _9163987 |
|
773 | 0 | _tSpringer Nature eBook | |
776 | 0 | 8 |
_iPrinted edition: _z9783030624620 |
776 | 0 | 8 |
_iPrinted edition: _z9783030624644 |
830 | 0 |
_aSecurity and Cryptology, _x2946-1863 ; _v12488 _9163988 |
|
856 | 4 | 0 | _uhttps://doi.org/10.1007/978-3-030-62463-7 |
912 | _aZDB-2-SCS | ||
912 | _aZDB-2-SXCS | ||
912 | _aZDB-2-LNC | ||
942 | _cELN | ||
999 |
_c96127 _d96127 |