LEADER 03626nam 22007455 450 001 9910357850203321 005 20230706193608.0 010 $a981-15-0871-2 024 7 $a10.1007/978-981-15-0871-4 035 $a(CKB)4100000009844698 035 $a(DE-He213)978-981-15-0871-4 035 $a(MiAaPQ)EBC5978843 035 $a(PPN)260301647 035 $a(EXLCZ)994100000009844698 100 $a20191014d2019 u| 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aApplications and Techniques in Information Security $e10th International Conference, ATIS 2019, Thanjavur, India, November 22?24, 2019, Proceedings /$fedited by V. S. Shankar Sriram, V. Subramaniyaswamy, N. Sasikaladevi, Leo Zhang, Lynn Batten, Gang Li 205 $a1st ed. 2019. 210 1$aSingapore :$cSpringer Nature Singapore :$cImprint: Springer,$d2019. 215 $a1 online resource (XI, 313 p. 157 illus., 101 illus. in color.) 225 1 $aCommunications in Computer and Information Science,$x1865-0937 ;$v1116 311 $a981-15-0870-4 327 $aInformation Security -- Network Security -- Intrusion Detection System -- Authentication and Key Management System -- Security Centric Applications. . 330 $aThis book constitutes the refereed proceedings of the 10th International Conference on Applications and Techniques in Information Security, ATIS 2019, held in Tamil Nadul, India, in November 2019. The 22 full papers and 2 short papers presented in the volume were carefully reviewed and selected from 50 submissions. The papers are organized in the following topical sections: information security; network security; intrusion detection system; authentication and key management system; security centric applications. . 410 0$aCommunications in Computer and Information Science,$x1865-0937 ;$v1116 606 $aData protection 606 $aComputers?Law and legislation 606 $aInformation technology?Law and legislation 606 $aArtificial intelligence 606 $aApplication software 606 $aComputer networks 606 $aData and Information Security 606 $aLegal Aspects of Computing 606 $aArtificial Intelligence 606 $aComputer and Information Systems Applications 606 $aComputer Communication Networks 615 0$aData protection. 615 0$aComputers?Law and legislation. 615 0$aInformation technology?Law and legislation. 615 0$aArtificial intelligence. 615 0$aApplication software. 615 0$aComputer networks. 615 14$aData and Information Security. 615 24$aLegal Aspects of Computing. 615 24$aArtificial Intelligence. 615 24$aComputer and Information Systems Applications. 615 24$aComputer Communication Networks. 676 $a005.8 702 $aShankar Sriram$b V. S$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aSubramaniyaswamy$b V$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aSasikaladevi$b N$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aZhang$b Leo$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aBatten$b Lynn$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aLi$b Gang$4edt$4http://id.loc.gov/vocabulary/relators/edt 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910357850203321 996 $aApplications and Techniques in Information Security$92028776 997 $aUNINA