LEADER 03965nam 22009135 450 001 9910590068903321 005 20241209121622.0 010 $a9783031157776 010 $a303115777X 024 7 $a10.1007/978-3-031-15777-6 035 $a(MiAaPQ)EBC7077207 035 $a(Au-PeEL)EBL7077207 035 $a(CKB)24739004900041 035 $a(DE-He213)978-3-031-15777-6 035 $a(PPN)264191560 035 $a(EXLCZ)9924739004900041 100 $a20220823d2022 u| 0 101 0 $aeng 135 $aurcnu|||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aInformation and Communications Security $e24th International Conference, ICICS 2022, Canterbury, UK, September 5?8, 2022, Proceedings /$fedited by Cristina Alcaraz, Liqun Chen, Shujun Li, Pierangela Samarati 205 $a1st ed. 2022. 210 1$aCham :$cSpringer International Publishing :$cImprint: Springer,$d2022. 215 $a1 online resource (649 pages) 225 1 $aLecture Notes in Computer Science,$x1611-3349 ;$v13407 311 08$aPrint version: Alcaraz, Cristina Information and Communications Security Cham : Springer International Publishing AG,c2022 9783031157769 320 $aIncludes bibliographical references and index. 327 $aCryptography -- Authentication -- Privacy and Anonymity -- Attacks and Vulnerability Analysis -- Artificial Intelligence for Detection -- Network Security and Forensics. . 330 $aThis LNCS 13407 constitutes the refereed proceedings of the 24th International Conference on Information and Communications Security, ICICS 2022, held in Canterbury, UK,, in September 2022. The 34 revised full papers presented in the book were carefully selected from 150 submissions The papers are organized around the following topics: Cryptography, Authentication, Privacy and Anonymity, Attacks and Vulnerability Analysis, Artificial Intelligence for Detection, and Network Security and Forensics. 410 0$aLecture Notes in Computer Science,$x1611-3349 ;$v13407 606 $aData structures (Computer science) 606 $aInformation theory 606 $aDatabase management 606 $aData mining 606 $aApplication software 606 $aImage processing$xDigital techniques 606 $aComputer vision 606 $aCryptography 606 $aData encryption (Computer science) 606 $aData Structures and Information Theory 606 $aDatabase Management 606 $aData Mining and Knowledge Discovery 606 $aComputer and Information Systems Applications 606 $aComputer Imaging, Vision, Pattern Recognition and Graphics 606 $aCryptology 606 $aSeguretat informātica$2thub 606 $aXifratge (Informātica)$2thub 606 $aTelecomunicaciķ$2thub 608 $aCongressos$2thub 608 $aLlibres electrōnics$2thub 615 0$aData structures (Computer science). 615 0$aInformation theory. 615 0$aDatabase management. 615 0$aData mining. 615 0$aApplication software. 615 0$aImage processing$xDigital techniques. 615 0$aComputer vision. 615 0$aCryptography. 615 0$aData encryption (Computer science). 615 14$aData Structures and Information Theory. 615 24$aDatabase Management. 615 24$aData Mining and Knowledge Discovery. 615 24$aComputer and Information Systems Applications. 615 24$aComputer Imaging, Vision, Pattern Recognition and Graphics. 615 24$aCryptology. 615 7$aSeguretat informātica 615 7$aXifratge (Informātica) 615 7$aTelecomunicaciķ 676 $a005.8 702 $aAlcaraz$b Cristina 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910590068903321 996 $aInformation and Communications Security$9771899 997 $aUNINA