LEADER 06004nam 22012735 450 001 9910447240103321 005 20230125232920.0 010 $a981-334-922-0 024 7 $a10.1007/978-981-33-4922-3 035 $a(CKB)4100000011728434 035 $a(DE-He213)978-981-33-4922-3 035 $a(MiAaPQ)EBC6458353 035 $a(Au-PeEL)EBL6458353 035 $a(OCoLC)1232278670 035 $a(oapen)https://directory.doabooks.org/handle/20.500.12854/63624 035 $a(PPN)253253640 035 $a(EXLCZ)994100000011728434 100 $a20210118d2020 u| 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aCyber Security$b[electronic resource] $e17th China Annual Conference, CNCERT 2020, Beijing, China, August 12, 2020, Revised Selected Papers /$fedited by Wei Lu, Qiaoyan Wen, Yuqing Zhang, Bo Lang, Weiping Wen, Hanbing Yan, Chao Li, Li Ding, Ruiguang Li, Yu Zhou 205 $a1st ed. 2020. 210 $cSpringer Nature$d2020 210 1$aSingapore :$cSpringer Singapore :$cImprint: Springer,$d2020. 215 $a1 online resource (X, 235 p. 108 illus., 70 illus. in color.) 225 1 $aCommunications in Computer and Information Science,$x1865-0929 ;$v1299 311 $a981-334-921-2 327 $aAccess Control -- Cryptography -- Denial-of-Service Attacks -- Hardware Security Implementation -- Intrusion/Anomaly Detection and Malware Mitigation -- Social Network Security and Privacy.-Systems Security. 330 $aThis open access book constitutes the refereed proceedings of the 16th International Annual Conference on Cyber Security, CNCERT 2020, held in Beijing, China, in August 2020. The 17 papers presented were carefully reviewed and selected from 58 submissions. The papers are organized according to the following topical sections: access control; cryptography; denial-of-service attacks; hardware security implementation; intrusion/anomaly detection and malware mitigation; social network security and privacy; systems security. 410 0$aCommunications in Computer and Information Science,$x1865-0929 ;$v1299 606 $aComputer security 606 $aComputer communication systems 606 $aApplication software 606 $aArchitecture, Computer 606 $aData encryption (Computer science) 606 $aComputer networks$xSecurity measures 606 $aSystems and Data Security$3https://scigraph.springernature.com/ontologies/product-market-codes/I28060 606 $aComputer Communication Networks$3https://scigraph.springernature.com/ontologies/product-market-codes/I13022 606 $aInformation Systems Applications (incl. Internet)$3https://scigraph.springernature.com/ontologies/product-market-codes/I18040 606 $aComputer System Implementation$3https://scigraph.springernature.com/ontologies/product-market-codes/I13057 606 $aCryptology$3https://scigraph.springernature.com/ontologies/product-market-codes/I28020 606 $aMobile and Network Security$3https://scigraph.springernature.com/ontologies/product-market-codes/I28050 610 $aSystems and Data Security 610 $aComputer Communication Networks 610 $aInformation Systems Applications (incl. Internet) 610 $aComputer System Implementation 610 $aCryptology 610 $aMobile and Network Security 610 $aData and Information Security 610 $aComputer and Information Systems Applications 610 $acommunication channels (information theory) 610 $acommunication systems 610 $acomputer crime 610 $acomputer hardware 610 $acomputer networks 610 $acomputer security 610 $acomputer systems 610 $acryptography 610 $adata communication systems 610 $adata security 610 $adatabases 610 $anetwork protocols 610 $anetwork security 610 $asensors 610 $asignal processing 610 $atelecommunication networks 610 $atelecommunication systems 610 $atelecommunication traffic 610 $awireless telecommunication systems 610 $aNetwork hardware 610 $aInformation retrieval 610 $aInternet searching 610 $aSystems analysis & design 610 $aCoding theory & cryptology 610 $aData encryption 615 0$aComputer security. 615 0$aComputer communication systems. 615 0$aApplication software. 615 0$aArchitecture, Computer. 615 0$aData encryption (Computer science). 615 0$aComputer networks$xSecurity measures. 615 14$aSystems and Data Security. 615 24$aComputer Communication Networks. 615 24$aInformation Systems Applications (incl. Internet). 615 24$aComputer System Implementation. 615 24$aCryptology. 615 24$aMobile and Network Security. 676 $a005.8 700 $aLu$b Wei$4edt$0955719 702 $aLu$b Wei$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aWen$b Qiaoyan$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aZhang$b Yuqing$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aLang$b Bo$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aWen$b Weiping$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aYan$b Hanbing$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aLi$b Chao$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aDing$b Li$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aLi$b Ruiguang$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aZhou$b Yu$4edt$4http://id.loc.gov/vocabulary/relators/edt 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910447240103321 996 $aCyber Security$93358412 997 $aUNINA