000 | 02980nam a22006135i 4500 | ||
---|---|---|---|
001 | 978-3-031-29504-1 | ||
003 | DE-He213 | ||
005 | 20240423125434.0 | ||
007 | cr nn 008mamaa | ||
008 | 230403s2023 sz | s |||| 0|eng d | ||
020 |
_a9783031295041 _9978-3-031-29504-1 |
||
024 | 7 |
_a10.1007/978-3-031-29504-1 _2doi |
|
050 | 4 | _aQA76.9.A25 | |
072 | 7 |
_aUR _2bicssc |
|
072 | 7 |
_aCOM053000 _2bisacsh |
|
072 | 7 |
_aUR _2thema |
|
082 | 0 | 4 |
_a005.8 _223 |
245 | 1 | 0 |
_aSecurity and Trust Management _h[electronic resource] : _b18th International Workshop, STM 2022, Copenhagen, Denmark, September 29, 2022, Proceedings / _cedited by Gabriele Lenzini, Weizhi Meng. |
250 | _a1st ed. 2023. | ||
264 | 1 |
_aCham : _bSpringer International Publishing : _bImprint: Springer, _c2023. |
|
300 |
_aX, 199 p. 38 illus., 23 illus. in color. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
490 | 1 |
_aLecture Notes in Computer Science, _x1611-3349 ; _v13867 |
|
505 | 0 | _aSecurity and Authentication -- Deep Learning for security and trust -- Data Analysis of security and trust -- Trust and Security. | |
520 | _aThis book constitutes the post proceedings of the 18th International Workshop on Security and Trust Management, STM 2022, co-located with the 27th European Symposium on Research in Computer Security, ESORICS 2022, which took place in Copenhagen, Denmark, in September 2022. The 7 full papers together with 4 short papers included in this volume were carefully reviewed and selected from 18 submissions. The workshop presents papers with topics such as security and trust access control, cryptographic protocols, identity management, security metrics, and privacy. | ||
650 | 0 | _aData protection. | |
650 | 0 | _aComputer networks . | |
650 | 0 | _aSoftware engineering. | |
650 | 0 | _aData mining. | |
650 | 0 | _aApplication software. | |
650 | 1 | 4 | _aSecurity Services. |
650 | 2 | 4 | _aData and Information Security. |
650 | 2 | 4 | _aComputer Communication Networks. |
650 | 2 | 4 | _aSoftware Engineering. |
650 | 2 | 4 | _aData Mining and Knowledge Discovery. |
650 | 2 | 4 | _aComputer and Information Systems Applications. |
700 | 1 |
_aLenzini, Gabriele. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt |
|
700 | 1 |
_aMeng, Weizhi. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt |
|
710 | 2 | _aSpringerLink (Online service) | |
773 | 0 | _tSpringer Nature eBook | |
776 | 0 | 8 |
_iPrinted edition: _z9783031295034 |
776 | 0 | 8 |
_iPrinted edition: _z9783031295058 |
830 | 0 |
_aLecture Notes in Computer Science, _x1611-3349 ; _v13867 |
|
856 | 4 | 0 | _uhttps://doi.org/10.1007/978-3-031-29504-1 |
912 | _aZDB-2-SCS | ||
912 | _aZDB-2-SXCS | ||
912 | _aZDB-2-LNC | ||
942 | _cSPRINGER | ||
999 |
_c177941 _d177941 |