LEADER 04275nam 22008535 450 001 9910484987903321 005 20251225212238.0 010 $a3-319-65127-7 024 7 $a10.1007/978-3-319-65127-9 035 $a(CKB)3710000001631258 035 $a(DE-He213)978-3-319-65127-9 035 $a(MiAaPQ)EBC6304956 035 $a(MiAaPQ)EBC5591712 035 $a(Au-PeEL)EBL5591712 035 $a(OCoLC)1001287532 035 $a(PPN)203850130 035 $a(EXLCZ)993710000001631258 100 $a20170805d2017 u| 0 101 0 $aeng 135 $aurnn#008mamaa 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aComputer Network Security $e7th International Conference on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2017, Warsaw, Poland, August 28-30, 2017, Proceedings /$fedited by Jacek Rak, John Bay, Igor Kotenko, Leonard Popyack, Victor Skormin, Krzysztof Szczypiorski 205 $a1st ed. 2017. 210 1$aCham :$cSpringer International Publishing :$cImprint: Springer,$d2017. 215 $a1 online resource (XIII, 362 p. 141 illus.) 225 1 $aComputer Communication Networks and Telecommunications,$x2945-9184 ;$v10446 311 08$a3-319-65126-9 327 $aCritical Infrastructure Protection and Visualization -- Security and Resilience of Network Systems -- Adaptive Security -- Anti-malware Techniques: Detection, Analysis, Prevention -- Security of Emerging Technologies.-Applied Cryptography -- New Ideas and Paradigms for Security. 330 $aThis book constitutes the refereed proceedings of the 7th International Conference on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2017, held in Warsaw, Poland, in August 2017. The 12 revised full papers, 13 revised short presentations, and 3 invited papers were carefully reviewed and selected from a total of 40 submissions. The papers are organized in topical sections on Critical Infrastructure Protection and Visualization; Security and Resilience of Network Systems; Adaptive Security; Anti-malware Techniques: Detection, Analysis, Prevention; Security of Emerging Technologies; Applied Cryptography; New Ideas and Paradigms for Security. 410 0$aComputer Communication Networks and Telecommunications,$x2945-9184 ;$v10446 606 $aData protection 606 $aComputer networks 606 $aComputers and civilization 606 $aComputers$xLaw and legislation 606 $aInformation technology$xLaw and legislation 606 $aCryptography 606 $aData encryption (Computer science) 606 $aElectronic digital computers$xEvaluation 606 $aData and Information Security 606 $aComputer Communication Networks 606 $aComputers and Society 606 $aLegal Aspects of Computing 606 $aCryptology 606 $aSystem Performance and Evaluation 615 0$aData protection. 615 0$aComputer networks. 615 0$aComputers and civilization. 615 0$aComputers$xLaw and legislation. 615 0$aInformation technology$xLaw and legislation. 615 0$aCryptography. 615 0$aData encryption (Computer science). 615 0$aElectronic digital computers$xEvaluation. 615 14$aData and Information Security. 615 24$aComputer Communication Networks. 615 24$aComputers and Society. 615 24$aLegal Aspects of Computing. 615 24$aCryptology. 615 24$aSystem Performance and Evaluation. 676 $a004 702 $aRak$b Jacek$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aBay$b John$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aKotenko$b Igor$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aPopyack$b Leonard$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aSkormin$b Victor$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aSzczypiorski$b Krzysztof$4edt$4http://id.loc.gov/vocabulary/relators/edt 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910484987903321 996 $aComputer Network Security$9772631 997 $aUNINA