000 03465nam a22005415i 4500
001 978-981-15-1465-4
003 DE-He213
005 20220801215828.0
007 cr nn 008mamaa
008 191218s2020 si | s |||| 0|eng d
020 _a9789811514654
_9978-981-15-1465-4
024 7 _a10.1007/978-981-15-1465-4
_2doi
050 4 _aTK5101-5105.9
072 7 _aTJK
_2bicssc
072 7 _aTEC041000
_2bisacsh
072 7 _aTJK
_2thema
082 0 4 _a621.382
_223
245 1 0 _aInformation Science and Applications
_h[electronic resource] :
_bICISA 2019 /
_cedited by Kuinam J. Kim, Hye-Young Kim.
250 _a1st ed. 2020.
264 1 _aSingapore :
_bSpringer Nature Singapore :
_bImprint: Springer,
_c2020.
300 _aXIX, 727 p. 285 illus., 209 illus. in color.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
490 1 _aLecture Notes in Electrical Engineering,
_x1876-1119 ;
_v621
505 0 _aTrack 1. Ubiquitous Computing -- Track 2. Networks and Information Systems -- Track 3. Multimedia and Visualization -- Track 4. Middleware and Operating Systems -- Track 5. Security and Privacy -- Track 6. Data Mining and Artificial Intelligence -- Track 7. Software Engineering -- Track 8. Web Technology -- Track 9. Internet of Things.
520 _aThis book presents selected papers from the 10th International Conference on Information Science and Applications (ICISA 2019), held on December 16–18, 2019, in Seoul, Korea, and provides a snapshot of the latest issues regarding technical convergence and convergences of security technologies. It explores how information science is at the core of most current research as well as industrial and commercial activities. The respective chapters cover a broad range of topics, including ubiquitous computing, networks and information systems, multimedia and visualization, middleware and operating systems, security and privacy, data mining and artificial intelligence, software engineering and web technology, as well as applications and problems related to technology convergence, which are reviewed and illustrated with the aid of case studies. Researchers in academia, industry, and at institutes focusing on information science and technology will gain a deeper understanding of the current state of the art in information strategies and technologies for convergence security.
650 0 _aTelecommunication.
_910437
650 0 _aData protection.
_97245
650 0 _aComputational intelligence.
_97716
650 1 4 _aCommunications Engineering, Networks.
_931570
650 2 4 _aData and Information Security.
_931990
650 2 4 _aComputational Intelligence.
_97716
700 1 _aKim, Kuinam J.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
_946703
700 1 _aKim, Hye-Young.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
_946704
710 2 _aSpringerLink (Online service)
_946705
773 0 _tSpringer Nature eBook
776 0 8 _iPrinted edition:
_z9789811514647
776 0 8 _iPrinted edition:
_z9789811514661
830 0 _aLecture Notes in Electrical Engineering,
_x1876-1119 ;
_v621
_946706
856 4 0 _uhttps://doi.org/10.1007/978-981-15-1465-4
912 _aZDB-2-ENG
912 _aZDB-2-SXE
942 _cEBK
999 _c77906
_d77906