03462nam 22006855 450 991029929550332120200701071535.0981-13-2907-910.1007/978-981-13-2907-4(CKB)4100000007110554(DE-He213)978-981-13-2907-4(MiAaPQ)EBC6246457(PPN)231461941(EXLCZ)99410000000711055420181006d2018 u| 0engurnn|008mamaatxtrdacontentcrdamediacrrdacarrierApplications and Techniques in Information Security 9th International Conference, ATIS 2018, Nanning, China, November 9–11, 2018, Proceedings /edited by Qingfeng Chen, Jia Wu, Shichao Zhang, Changan Yuan, Lynn Batten, Gang Li1st ed. 2018.Singapore :Springer Singapore :Imprint: Springer,2018.1 online resource (XII, 223 p. 65 illus.) Communications in Computer and Information Science,1865-0929 ;950981-13-2906-0 Includes bibliographical references and index.Information Security -- Information Abuse Prevention -- Security Implementations -- Knowledge Discovery -- Applications.This book constitutes the refereed proceedings of the 9th International Conference on Applications and Techniques in Information Security, ATIS 2018, held in Nanning, China, in November 2018. The 19 full papers were carefully reviewed and selected from 59 submissions. The papers are organized in the following topical sections: information security, information abuse prevention, security implementations, knowledge discovery, and applications.Communications in Computer and Information Science,1865-0929 ;950Computer securityData miningArtificial intelligenceData encryption (Computer science)Systems and Data Securityhttps://scigraph.springernature.com/ontologies/product-market-codes/I28060Data Mining and Knowledge Discoveryhttps://scigraph.springernature.com/ontologies/product-market-codes/I18030Artificial Intelligencehttps://scigraph.springernature.com/ontologies/product-market-codes/I21000Cryptologyhttps://scigraph.springernature.com/ontologies/product-market-codes/I28020Computer security.Data mining.Artificial intelligence.Data encryption (Computer science).Systems and Data Security.Data Mining and Knowledge Discovery.Artificial Intelligence.Cryptology.005.8Chen Qingfengedthttp://id.loc.gov/vocabulary/relators/edtWu Jiaedthttp://id.loc.gov/vocabulary/relators/edtZhang Shichaoedthttp://id.loc.gov/vocabulary/relators/edtYuan Changanedthttp://id.loc.gov/vocabulary/relators/edtBatten Lynnedthttp://id.loc.gov/vocabulary/relators/edtLi Gangedthttp://id.loc.gov/vocabulary/relators/edtMiAaPQMiAaPQMiAaPQBOOK9910299295503321Applications and Techniques in Information Security2028776UNINA