000 | 03797nam a22006975i 4500 | ||
---|---|---|---|
001 | 978-3-642-25261-7 | ||
003 | DE-He213 | ||
005 | 20240730184945.0 | ||
007 | cr nn 008mamaa | ||
008 | 120202s2012 gw | s |||| 0|eng d | ||
020 |
_a9783642252617 _9978-3-642-25261-7 |
||
024 | 7 |
_a10.1007/978-3-642-25261-7 _2doi |
|
050 | 4 | _aTK7885-7895 | |
050 | 4 | _aTK5105.5-5105.9 | |
072 | 7 |
_aUK _2bicssc |
|
072 | 7 |
_aCOM067000 _2bisacsh |
|
072 | 7 |
_aUK _2thema |
|
082 | 0 | 4 |
_a621.39 _223 |
082 | 0 | 4 |
_a004.6 _223 |
245 | 1 | 0 |
_aSecurity and Intelligent Information Systems _h[electronic resource] : _bInternational Joint Confererence, SIIS 2011, Warsaw, Poland, June 13-14, 2011, Revised Selected Papers / _cedited by Pascal Bouvry, Mieczyslaw A. Klopotek, Franck Leprevost, Malgorzata Marciniak, Agnieszka Mykowiecka, Henryk Rybinski. |
250 | _a1st ed. 2012. | ||
264 | 1 |
_aBerlin, Heidelberg : _bSpringer Berlin Heidelberg : _bImprint: Springer, _c2012. |
|
300 |
_aXVII, 401 p. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
490 | 1 |
_aInformation Systems and Applications, incl. Internet/Web, and HCI, _x2946-1642 ; _v7053 |
|
520 | _aThis book constitutes the thoroughly refereed post-conference proceedings of the Joint Meeting of the 2nd Luxembourg-Polish Symposium on Security and Trust and the 19th International Conference Intelligent Information Systems, held as International Joint Confererence on Security and Intelligent Information Systems, SIIS 2011, in Warsaw, Poland, in June 2011. The 29 revised full papers presented together with 2 invited lectures were carefully reviewed and selected from 60 initial submissions during two rounds of selection and improvement. The papers are organized in the following three thematic tracks: security and trust, data mining and machine learning, and natural language processing. | ||
650 | 0 |
_aComputer engineering. _910164 |
|
650 | 0 |
_aComputer networks . _931572 |
|
650 | 0 |
_aData protection. _97245 |
|
650 | 0 |
_aArtificial intelligence. _93407 |
|
650 | 0 |
_aCryptography. _91973 |
|
650 | 0 |
_aData encryption (Computer science). _99168 |
|
650 | 0 |
_aApplication software. _9137370 |
|
650 | 1 | 4 |
_aComputer Engineering and Networks. _9137371 |
650 | 2 | 4 |
_aComputer Communication Networks. _9137372 |
650 | 2 | 4 |
_aData and Information Security. _931990 |
650 | 2 | 4 |
_aArtificial Intelligence. _93407 |
650 | 2 | 4 |
_aCryptology. _931769 |
650 | 2 | 4 |
_aComputer and Information Systems Applications. _9137373 |
700 | 1 |
_aBouvry, Pascal. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _9137374 |
|
700 | 1 |
_aKlopotek, Mieczyslaw A. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _9137375 |
|
700 | 1 |
_aLeprevost, Franck. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _9137376 |
|
700 | 1 |
_aMarciniak, Malgorzata. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _9137377 |
|
700 | 1 |
_aMykowiecka, Agnieszka. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _9137378 |
|
700 | 1 |
_aRybinski, Henryk. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _9137379 |
|
710 | 2 |
_aSpringerLink (Online service) _9137380 |
|
773 | 0 | _tSpringer Nature eBook | |
776 | 0 | 8 |
_iPrinted edition: _z9783642252600 |
776 | 0 | 8 |
_iPrinted edition: _z9783642252624 |
830 | 0 |
_aInformation Systems and Applications, incl. Internet/Web, and HCI, _x2946-1642 ; _v7053 _9137381 |
|
856 | 4 | 0 | _uhttps://doi.org/10.1007/978-3-642-25261-7 |
912 | _aZDB-2-SCS | ||
912 | _aZDB-2-SXCS | ||
912 | _aZDB-2-LNC | ||
942 | _cELN | ||
999 |
_c92575 _d92575 |