LEADER 04525nam 22007695 450 001 9910739480003321 005 20200630090435.0 010 $a3-319-04283-1 024 7 $a10.1007/978-3-319-04283-1 035 $a(CKB)3710000000078816 035 $a(DE-He213)978-3-319-04283-1 035 $a(SSID)ssj0001088594 035 $a(PQKBManifestationID)11589072 035 $a(PQKBTitleCode)TC0001088594 035 $a(PQKBWorkID)11109436 035 $a(PQKB)10738114 035 $a(MiAaPQ)EBC3101244 035 $a(PPN)176109277 035 $a(EXLCZ)993710000000078816 100 $a20131217d2013 u| 0 101 0 $aeng 135 $aurnn#008mamaa 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aSecurity and Privacy in Communication Networks $e9th International ICST Conference, SecureComm 2013, Revised Selected Papers /$fedited by Tanveer Zia, Albert Zomaya, Vijay Varadharajan, Morley Mao 205 $a1st ed. 2013. 210 1$aCham :$cSpringer International Publishing :$cImprint: Springer,$d2013. 215 $a1 online resource (XII, 420 p. 142 illus.) 225 1 $aLecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering,$x1867-8211 ;$v127 300 $aBibliographic Level Mode of Issuance: Monograph 311 $a3-319-04282-3 327 $aSecurity & amp; Privacy in Mobile, Sensor and Ad Hoc Networks -- Malware, Botnets and Distributed Denial of Service -- Security for Emerging Technologies: VoIP, Peer-to-peer and Cloud Computing -- Encryption and Key Management -- Security in Software and Machine Learning -- Network and System Security Model -- Security and Privacy in Pervasive and Ubiquitous Computing ATIS 2013: 4th International Workshop on Applications and Techniques in Information Security. 330 $aThis book constitutes the thoroughly refereed post-conference proceedings of the 9th International ICST Conference on Security and Privacy in Communication Networks, held in Sydney, Australia, in September 2013. The 26 revised full papers presented were carefully reviewed and selected from 70 submissions. The papers are grouped in topical sections on: security and privacy in mobile, sensor, and ad hoc networks; malware, botnets, and distributed denial of service; security for emerging technologies: VoIP, peer-to-peer, and cloud computing; encryption and key management; security in software and machine learning; network and system security model; security and privacy in pervasive and ubiquitous computing. 410 0$aLecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering,$x1867-8211 ;$v127 606 $aComputer security 606 $aComputer communication systems 606 $aData encryption (Computer science) 606 $aComputers and civilization 606 $aApplication software 606 $aSystems and Data Security$3https://scigraph.springernature.com/ontologies/product-market-codes/I28060 606 $aComputer Communication Networks$3https://scigraph.springernature.com/ontologies/product-market-codes/I13022 606 $aCryptology$3https://scigraph.springernature.com/ontologies/product-market-codes/I28020 606 $aComputers and Society$3https://scigraph.springernature.com/ontologies/product-market-codes/I24040 606 $aInformation Systems Applications (incl. Internet)$3https://scigraph.springernature.com/ontologies/product-market-codes/I18040 615 0$aComputer security. 615 0$aComputer communication systems. 615 0$aData encryption (Computer science). 615 0$aComputers and civilization. 615 0$aApplication software. 615 14$aSystems and Data Security. 615 24$aComputer Communication Networks. 615 24$aCryptology. 615 24$aComputers and Society. 615 24$aInformation Systems Applications (incl. Internet). 676 $a005.8 702 $aZia$b Tanveer$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aZomaya$b Albert$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aVaradharajan$b Vijay$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aMao$b Morley$4edt$4http://id.loc.gov/vocabulary/relators/edt 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910739480003321 996 $aSecurity and Privacy in Communication Networks$93012314 997 $aUNINA