000 | 03198nam a22006615i 4500 | ||
---|---|---|---|
001 | 978-981-15-3817-9 | ||
003 | DE-He213 | ||
005 | 20240423125214.0 | ||
007 | cr nn 008mamaa | ||
008 | 200305s2020 si | s |||| 0|eng d | ||
020 |
_a9789811538179 _9978-981-15-3817-9 |
||
024 | 7 |
_a10.1007/978-981-15-3817-9 _2doi |
|
050 | 4 | _aQ334-342 | |
050 | 4 | _aTA347.A78 | |
072 | 7 |
_aUYQ _2bicssc |
|
072 | 7 |
_aCOM004000 _2bisacsh |
|
072 | 7 |
_aUYQ _2thema |
|
082 | 0 | 4 |
_a006.3 _223 |
245 | 1 | 0 |
_aSecure Knowledge Management In Artificial Intelligence Era _h[electronic resource] : _b8th International Conference, SKM 2019, Goa, India, December 21–22, 2019, Proceedings / _cedited by Sanjay K. Sahay, Nihita Goel, Vishwas Patil, Murtuza Jadliwala. |
250 | _a1st ed. 2020. | ||
264 | 1 |
_aSingapore : _bSpringer Nature Singapore : _bImprint: Springer, _c2020. |
|
300 |
_aXXII, 203 p. 113 illus., 29 illus. in color. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
490 | 1 |
_aCommunications in Computer and Information Science, _x1865-0937 ; _v1186 |
|
505 | 0 | _aCyber Security -- Security and Artificial Intelligence -- Access Control Models -- Social Networks. | |
520 | _aThis book constitutes the refereed proceedings of the 8th International Conference On Secure Knowledge Management In Artificial Intelligence Era, SKM 2019, held in Goa, India, in December 2019. The 12 full papers presented were carefully reviewed and selected from 34 submissions. They were organized according to the following topical sections: cyber security; security and artifcial intelligence; access control models; and social networks. | ||
650 | 0 | _aArtificial intelligence. | |
650 | 0 | _aApplication software. | |
650 | 0 | _aComputer networks . | |
650 | 0 | _aData protection. | |
650 | 0 | _aCryptography. | |
650 | 0 | _aData encryption (Computer science). | |
650 | 0 |
_aComputer networks _xSecurity measures. |
|
650 | 1 | 4 | _aArtificial Intelligence. |
650 | 2 | 4 | _aComputer and Information Systems Applications. |
650 | 2 | 4 | _aComputer Communication Networks. |
650 | 2 | 4 | _aData and Information Security. |
650 | 2 | 4 | _aCryptology. |
650 | 2 | 4 | _aMobile and Network Security. |
700 | 1 |
_aSahay, Sanjay K. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt |
|
700 | 1 |
_aGoel, Nihita. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt |
|
700 | 1 |
_aPatil, Vishwas. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt |
|
700 | 1 |
_aJadliwala, Murtuza. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt |
|
710 | 2 | _aSpringerLink (Online service) | |
773 | 0 | _tSpringer Nature eBook | |
776 | 0 | 8 |
_iPrinted edition: _z9789811538162 |
776 | 0 | 8 |
_iPrinted edition: _z9789811538186 |
830 | 0 |
_aCommunications in Computer and Information Science, _x1865-0937 ; _v1186 |
|
856 | 4 | 0 | _uhttps://doi.org/10.1007/978-981-15-3817-9 |
912 | _aZDB-2-SCS | ||
912 | _aZDB-2-SXCS | ||
942 | _cSPRINGER | ||
999 |
_c175405 _d175405 |