LEADER 04239nam 22009015 450 001 9910447240103321 005 20251113211221.0 010 $a981-334-922-0 024 7 $a10.1007/978-981-33-4922-3 035 $a(CKB)4100000011728434 035 $a(DE-He213)978-981-33-4922-3 035 $a(MiAaPQ)EBC6458353 035 $a(Au-PeEL)EBL6458353 035 $a(OCoLC)1232278670 035 $a(oapen)https://directory.doabooks.org/handle/20.500.12854/63624 035 $a(PPN)253253640 035 $a(oapen)doab63624 035 $a(EXLCZ)994100000011728434 100 $a20210118d2020 u| 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aCyber Security $e17th China Annual Conference, CNCERT 2020, Beijing, China, August 12, 2020, Revised Selected Papers /$fedited by Wei Lu, Qiaoyan Wen, Yuqing Zhang, Bo Lang, Weiping Wen, Hanbing Yan, Chao Li, Li Ding, Ruiguang Li, Yu Zhou 205 $a1st ed. 2020. 210 1$aSingapore :$cSpringer Nature Singapore :$cImprint: Springer,$d2020. 215 $a1 online resource (X, 235 p. 108 illus., 70 illus. in color.) 225 1 $aCommunications in Computer and Information Science,$x1865-0937 ;$v1299 311 08$a981-334-921-2 327 $aAccess Control -- Cryptography -- Denial-of-Service Attacks -- Hardware Security Implementation -- Intrusion/Anomaly Detection and Malware Mitigation -- Social Network Security and Privacy.-Systems Security. 330 $aThis open access book constitutes the refereed proceedings of the 16th International Annual Conference on Cyber Security, CNCERT 2020, held in Beijing, China, in August 2020. The 17 papers presented were carefully reviewed and selected from 58 submissions. The papers are organized according to the following topical sections: access control; cryptography; denial-of-service attacks; hardware security implementation; intrusion/anomaly detection and malware mitigation; social network security and privacy; systems security. 410 0$aCommunications in Computer and Information Science,$x1865-0937 ;$v1299 606 $aData protection 606 $aComputer networks 606 $aApplication software 606 $aComputer systems 606 $aCryptography 606 $aData encryption (Computer science) 606 $aComputer networks$xSecurity measures 606 $aData and Information Security 606 $aComputer Communication Networks 606 $aComputer and Information Systems Applications 606 $aComputer System Implementation 606 $aCryptology 606 $aMobile and Network Security 615 0$aData protection. 615 0$aComputer networks. 615 0$aApplication software. 615 0$aComputer systems. 615 0$aCryptography. 615 0$aData encryption (Computer science) 615 0$aComputer networks$xSecurity measures. 615 14$aData and Information Security. 615 24$aComputer Communication Networks. 615 24$aComputer and Information Systems Applications. 615 24$aComputer System Implementation. 615 24$aCryptology. 615 24$aMobile and Network Security. 676 $a005.8 700 $aLu$b Wei$4edt$0955719 702 $aLu$b Wei$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aWen$b Qiaoyan$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aZhang$b Yuqing$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aLang$b Bo$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aWen$b Weiping$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aYan$b Hanbing$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aLi$b Chao$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aDing$b Li$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aLi$b Ruiguang$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aZhou$b Yu$4edt$4http://id.loc.gov/vocabulary/relators/edt 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910447240103321 996 $aCyber Security$93358412 997 $aUNINA