Cyber Security : 17th China Annual Conference, CNCERT 2020, Beijing, China, August 12, 2020, Revised Selected Papers / / edited by Wei Lu, Qiaoyan Wen, Yuqing Zhang, Bo Lang, Weiping Wen, Hanbing Yan, Chao Li, Li Ding, Ruiguang Li, Yu Zhou.

This open access book constitutes the refereed proceedings of the 16th International Annual Conference on Cyber Security, CNCERT 2020, held in Beijing, China, in August 2020. The 17 papers presented were carefully reviewed and selected from 58 submissions. The papers are organized according to the f...

Full description

Saved in:
Bibliographic Details
Superior document:Communications in Computer and Information Science, 1299
HerausgeberIn:
Place / Publishing House:Singapore : : Springer Singapore :, Imprint: Springer,, 2020.
Year of Publication:2020
Edition:1st ed. 2020.
Language:English
Series:Communications in Computer and Information Science, 1299
Physical Description:1 online resource (X, 235 p. 108 illus., 70 illus. in color.)
Tags: Add Tag
No Tags, Be the first to tag this record!
id 993544236104498
ctrlnum (CKB)4100000011728434
(DE-He213)978-981-33-4922-3
(MiAaPQ)EBC6458353
(Au-PeEL)EBL6458353
(OCoLC)1232278670
(oapen)https://directory.doabooks.org/handle/20.500.12854/63624
(PPN)253253640
(EXLCZ)994100000011728434
collection bib_alma
record_format marc
spelling Lu, Wei edt
Cyber Security [electronic resource] : 17th China Annual Conference, CNCERT 2020, Beijing, China, August 12, 2020, Revised Selected Papers / edited by Wei Lu, Qiaoyan Wen, Yuqing Zhang, Bo Lang, Weiping Wen, Hanbing Yan, Chao Li, Li Ding, Ruiguang Li, Yu Zhou.
1st ed. 2020.
Springer Nature 2020
Singapore : Springer Singapore : Imprint: Springer, 2020.
1 online resource (X, 235 p. 108 illus., 70 illus. in color.)
text txt rdacontent
computer c rdamedia
online resource cr rdacarrier
Communications in Computer and Information Science, 1865-0929 ; 1299
Access Control -- Cryptography -- Denial-of-Service Attacks -- Hardware Security Implementation -- Intrusion/Anomaly Detection and Malware Mitigation -- Social Network Security and Privacy.-Systems Security.
This open access book constitutes the refereed proceedings of the 16th International Annual Conference on Cyber Security, CNCERT 2020, held in Beijing, China, in August 2020. The 17 papers presented were carefully reviewed and selected from 58 submissions. The papers are organized according to the following topical sections: access control; cryptography; denial-of-service attacks; hardware security implementation; intrusion/anomaly detection and malware mitigation; social network security and privacy; systems security.
Description based on publisher supplied metadata and other sources.
English
Computer security.
Computer communication systems.
Application software.
Architecture, Computer.
Data encryption (Computer science).
Computer networks Security measures.
Systems and Data Security. https://scigraph.springernature.com/ontologies/product-market-codes/I28060
Computer Communication Networks. https://scigraph.springernature.com/ontologies/product-market-codes/I13022
Information Systems Applications (incl. Internet). https://scigraph.springernature.com/ontologies/product-market-codes/I18040
Computer System Implementation. https://scigraph.springernature.com/ontologies/product-market-codes/I13057
Cryptology. https://scigraph.springernature.com/ontologies/product-market-codes/I28020
Mobile and Network Security. https://scigraph.springernature.com/ontologies/product-market-codes/I28050
Systems and Data Security
Computer Communication Networks
Information Systems Applications (incl. Internet)
Computer System Implementation
Cryptology
Mobile and Network Security
Data and Information Security
Computer and Information Systems Applications
communication channels (information theory)
communication systems
computer crime
computer hardware
computer networks
computer security
computer systems
cryptography
data communication systems
data security
databases
network protocols
network security
sensors
signal processing
telecommunication networks
telecommunication systems
telecommunication traffic
wireless telecommunication systems
Network hardware
Information retrieval
Internet searching
Systems analysis & design
Coding theory & cryptology
Data encryption
981-334-921-2
Lu, Wei. editor. edt http://id.loc.gov/vocabulary/relators/edt
Wen, Qiaoyan. editor. edt http://id.loc.gov/vocabulary/relators/edt
Zhang, Yuqing. editor. edt http://id.loc.gov/vocabulary/relators/edt
Lang, Bo. editor. edt http://id.loc.gov/vocabulary/relators/edt
Wen, Weiping. editor. edt http://id.loc.gov/vocabulary/relators/edt
Yan, Hanbing. editor. edt http://id.loc.gov/vocabulary/relators/edt
Li, Chao. editor. edt http://id.loc.gov/vocabulary/relators/edt
Ding, Li. editor. edt http://id.loc.gov/vocabulary/relators/edt
Li, Ruiguang. editor. edt http://id.loc.gov/vocabulary/relators/edt
Zhou, Yu. editor. edt http://id.loc.gov/vocabulary/relators/edt
language English
format Electronic
eBook
author2 Lu, Wei.
Lu, Wei.
Wen, Qiaoyan.
Wen, Qiaoyan.
Zhang, Yuqing.
Zhang, Yuqing.
Lang, Bo.
Lang, Bo.
Wen, Weiping.
Wen, Weiping.
Yan, Hanbing.
Yan, Hanbing.
Li, Chao.
Li, Chao.
Ding, Li.
Ding, Li.
Li, Ruiguang.
Li, Ruiguang.
Zhou, Yu.
Zhou, Yu.
author_facet Lu, Wei.
Lu, Wei.
Wen, Qiaoyan.
Wen, Qiaoyan.
Zhang, Yuqing.
Zhang, Yuqing.
Lang, Bo.
Lang, Bo.
Wen, Weiping.
Wen, Weiping.
Yan, Hanbing.
Yan, Hanbing.
Li, Chao.
Li, Chao.
Ding, Li.
Ding, Li.
Li, Ruiguang.
Li, Ruiguang.
Zhou, Yu.
Zhou, Yu.
author2_variant w l wl
w l wl
w l wl
q w qw
q w qw
y z yz
y z yz
b l bl
b l bl
w w ww
w w ww
h y hy
h y hy
c l cl
c l cl
l d ld
l d ld
r l rl
r l rl
y z yz
y z yz
author2_role HerausgeberIn
HerausgeberIn
HerausgeberIn
HerausgeberIn
HerausgeberIn
HerausgeberIn
HerausgeberIn
HerausgeberIn
HerausgeberIn
HerausgeberIn
HerausgeberIn
HerausgeberIn
HerausgeberIn
HerausgeberIn
HerausgeberIn
HerausgeberIn
HerausgeberIn
HerausgeberIn
HerausgeberIn
HerausgeberIn
author_sort Lu, Wei.
title Cyber Security 17th China Annual Conference, CNCERT 2020, Beijing, China, August 12, 2020, Revised Selected Papers /
spellingShingle Cyber Security 17th China Annual Conference, CNCERT 2020, Beijing, China, August 12, 2020, Revised Selected Papers /
Communications in Computer and Information Science,
Access Control -- Cryptography -- Denial-of-Service Attacks -- Hardware Security Implementation -- Intrusion/Anomaly Detection and Malware Mitigation -- Social Network Security and Privacy.-Systems Security.
title_sub 17th China Annual Conference, CNCERT 2020, Beijing, China, August 12, 2020, Revised Selected Papers /
title_full Cyber Security [electronic resource] : 17th China Annual Conference, CNCERT 2020, Beijing, China, August 12, 2020, Revised Selected Papers / edited by Wei Lu, Qiaoyan Wen, Yuqing Zhang, Bo Lang, Weiping Wen, Hanbing Yan, Chao Li, Li Ding, Ruiguang Li, Yu Zhou.
title_fullStr Cyber Security [electronic resource] : 17th China Annual Conference, CNCERT 2020, Beijing, China, August 12, 2020, Revised Selected Papers / edited by Wei Lu, Qiaoyan Wen, Yuqing Zhang, Bo Lang, Weiping Wen, Hanbing Yan, Chao Li, Li Ding, Ruiguang Li, Yu Zhou.
title_full_unstemmed Cyber Security [electronic resource] : 17th China Annual Conference, CNCERT 2020, Beijing, China, August 12, 2020, Revised Selected Papers / edited by Wei Lu, Qiaoyan Wen, Yuqing Zhang, Bo Lang, Weiping Wen, Hanbing Yan, Chao Li, Li Ding, Ruiguang Li, Yu Zhou.
title_auth Cyber Security 17th China Annual Conference, CNCERT 2020, Beijing, China, August 12, 2020, Revised Selected Papers /
title_new Cyber Security
title_sort cyber security 17th china annual conference, cncert 2020, beijing, china, august 12, 2020, revised selected papers /
series Communications in Computer and Information Science,
series2 Communications in Computer and Information Science,
publisher Springer Nature
Springer Singapore : Imprint: Springer,
publishDate 2020
physical 1 online resource (X, 235 p. 108 illus., 70 illus. in color.)
edition 1st ed. 2020.
contents Access Control -- Cryptography -- Denial-of-Service Attacks -- Hardware Security Implementation -- Intrusion/Anomaly Detection and Malware Mitigation -- Social Network Security and Privacy.-Systems Security.
isbn 981-334-922-0
981-334-921-2
issn 1865-0929 ;
callnumber-first Q - Science
callnumber-subject QA - Mathematics
callnumber-label QA76
callnumber-sort QA 276.9 A25
illustrated Not Illustrated
dewey-hundreds 000 - Computer science, information & general works
dewey-tens 000 - Computer science, knowledge & systems
dewey-ones 005 - Computer programming, programs & data
dewey-full 005.8
dewey-sort 15.8
dewey-raw 005.8
dewey-search 005.8
oclc_num 1232278670
work_keys_str_mv AT luwei cybersecurity17thchinaannualconferencecncert2020beijingchinaaugust122020revisedselectedpapers
AT wenqiaoyan cybersecurity17thchinaannualconferencecncert2020beijingchinaaugust122020revisedselectedpapers
AT zhangyuqing cybersecurity17thchinaannualconferencecncert2020beijingchinaaugust122020revisedselectedpapers
AT langbo cybersecurity17thchinaannualconferencecncert2020beijingchinaaugust122020revisedselectedpapers
AT wenweiping cybersecurity17thchinaannualconferencecncert2020beijingchinaaugust122020revisedselectedpapers
AT yanhanbing cybersecurity17thchinaannualconferencecncert2020beijingchinaaugust122020revisedselectedpapers
AT lichao cybersecurity17thchinaannualconferencecncert2020beijingchinaaugust122020revisedselectedpapers
AT dingli cybersecurity17thchinaannualconferencecncert2020beijingchinaaugust122020revisedselectedpapers
AT liruiguang cybersecurity17thchinaannualconferencecncert2020beijingchinaaugust122020revisedselectedpapers
AT zhouyu cybersecurity17thchinaannualconferencecncert2020beijingchinaaugust122020revisedselectedpapers
status_str n
ids_txt_mv (CKB)4100000011728434
(DE-He213)978-981-33-4922-3
(MiAaPQ)EBC6458353
(Au-PeEL)EBL6458353
(OCoLC)1232278670
(oapen)https://directory.doabooks.org/handle/20.500.12854/63624
(PPN)253253640
(EXLCZ)994100000011728434
carrierType_str_mv cr
hierarchy_parent_title Communications in Computer and Information Science, 1299
hierarchy_sequence 1299
is_hierarchy_title Cyber Security 17th China Annual Conference, CNCERT 2020, Beijing, China, August 12, 2020, Revised Selected Papers /
container_title Communications in Computer and Information Science, 1299
author2_original_writing_str_mv noLinkedField
noLinkedField
noLinkedField
noLinkedField
noLinkedField
noLinkedField
noLinkedField
noLinkedField
noLinkedField
noLinkedField
noLinkedField
noLinkedField
noLinkedField
noLinkedField
noLinkedField
noLinkedField
noLinkedField
noLinkedField
noLinkedField
noLinkedField
_version_ 1787548760969052161
fullrecord <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>04230nam a22006975i 4500</leader><controlfield tag="001">993544236104498</controlfield><controlfield tag="005">20230125232920.0</controlfield><controlfield tag="006">m o d | </controlfield><controlfield tag="007">cr nn 008mamaa</controlfield><controlfield tag="008">210118s2020 si | o |||| 0|eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">981-334-922-0</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1007/978-981-33-4922-3</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(CKB)4100000011728434</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-He213)978-981-33-4922-3</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(MiAaPQ)EBC6458353</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(Au-PeEL)EBL6458353</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1232278670</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(oapen)https://directory.doabooks.org/handle/20.500.12854/63624</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(PPN)253253640</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(EXLCZ)994100000011728434</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">MiAaPQ</subfield><subfield code="b">eng</subfield><subfield code="e">rda</subfield><subfield code="e">pn</subfield><subfield code="c">MiAaPQ</subfield><subfield code="d">MiAaPQ</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">QA76.9.A25</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">UR</subfield><subfield code="2">bicssc</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM053000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">UR</subfield><subfield code="2">thema</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">UTN</subfield><subfield code="2">thema</subfield></datafield><datafield tag="082" ind1="0" ind2="4"><subfield code="a">005.8</subfield><subfield code="2">23</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Lu, Wei</subfield><subfield code="4">edt</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Cyber Security</subfield><subfield code="h">[electronic resource] :</subfield><subfield code="b">17th China Annual Conference, CNCERT 2020, Beijing, China, August 12, 2020, Revised Selected Papers /</subfield><subfield code="c">edited by Wei Lu, Qiaoyan Wen, Yuqing Zhang, Bo Lang, Weiping Wen, Hanbing Yan, Chao Li, Li Ding, Ruiguang Li, Yu Zhou.</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">1st ed. 2020.</subfield></datafield><datafield tag="260" ind1=" " ind2=" "><subfield code="b">Springer Nature</subfield><subfield code="c">2020</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Singapore :</subfield><subfield code="b">Springer Singapore :</subfield><subfield code="b">Imprint: Springer,</subfield><subfield code="c">2020.</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (X, 235 p. 108 illus., 70 illus. in color.) </subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">Communications in Computer and Information Science,</subfield><subfield code="x">1865-0929 ;</subfield><subfield code="v">1299</subfield></datafield><datafield tag="505" ind1="0" ind2=" "><subfield code="a">Access Control -- Cryptography -- Denial-of-Service Attacks -- Hardware Security Implementation -- Intrusion/Anomaly Detection and Malware Mitigation -- Social Network Security and Privacy.-Systems Security.</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">This open access book constitutes the refereed proceedings of the 16th International Annual Conference on Cyber Security, CNCERT 2020, held in Beijing, China, in August 2020. The 17 papers presented were carefully reviewed and selected from 58 submissions. The papers are organized according to the following topical sections: access control; cryptography; denial-of-service attacks; hardware security implementation; intrusion/anomaly detection and malware mitigation; social network security and privacy; systems security.</subfield></datafield><datafield tag="588" ind1=" " ind2=" "><subfield code="a">Description based on publisher supplied metadata and other sources.</subfield></datafield><datafield tag="546" ind1=" " ind2=" "><subfield code="a">English</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer security.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer communication systems.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Application software.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Architecture, Computer.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Data encryption (Computer science).</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures.</subfield></datafield><datafield tag="650" ind1="1" ind2="4"><subfield code="a">Systems and Data Security.</subfield><subfield code="0">https://scigraph.springernature.com/ontologies/product-market-codes/I28060</subfield></datafield><datafield tag="650" ind1="2" ind2="4"><subfield code="a">Computer Communication Networks.</subfield><subfield code="0">https://scigraph.springernature.com/ontologies/product-market-codes/I13022</subfield></datafield><datafield tag="650" ind1="2" ind2="4"><subfield code="a">Information Systems Applications (incl. Internet).</subfield><subfield code="0">https://scigraph.springernature.com/ontologies/product-market-codes/I18040</subfield></datafield><datafield tag="650" ind1="2" ind2="4"><subfield code="a">Computer System Implementation.</subfield><subfield code="0">https://scigraph.springernature.com/ontologies/product-market-codes/I13057</subfield></datafield><datafield tag="650" ind1="2" ind2="4"><subfield code="a">Cryptology.</subfield><subfield code="0">https://scigraph.springernature.com/ontologies/product-market-codes/I28020</subfield></datafield><datafield tag="650" ind1="2" ind2="4"><subfield code="a">Mobile and Network Security.</subfield><subfield code="0">https://scigraph.springernature.com/ontologies/product-market-codes/I28050</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Systems and Data Security</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Computer Communication Networks</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Information Systems Applications (incl. Internet)</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Computer System Implementation</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Cryptology</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Mobile and Network Security</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Data and Information Security</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Computer and Information Systems Applications</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">communication channels (information theory)</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">communication systems</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">computer crime</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">computer hardware</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">computer networks</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">computer security</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">computer systems</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">cryptography</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">data communication systems</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">data security</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">databases</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">network protocols</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">network security</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">sensors</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">signal processing</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">telecommunication networks</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">telecommunication systems</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">telecommunication traffic</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">wireless telecommunication systems</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Network hardware</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Information retrieval</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Internet searching</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Systems analysis &amp; design</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Coding theory &amp; cryptology</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Data encryption</subfield></datafield><datafield tag="776" ind1=" " ind2=" "><subfield code="z">981-334-921-2</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Lu, Wei.</subfield><subfield code="e">editor.</subfield><subfield code="4">edt</subfield><subfield code="4">http://id.loc.gov/vocabulary/relators/edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Wen, Qiaoyan.</subfield><subfield code="e">editor.</subfield><subfield code="4">edt</subfield><subfield code="4">http://id.loc.gov/vocabulary/relators/edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Zhang, Yuqing.</subfield><subfield code="e">editor.</subfield><subfield code="4">edt</subfield><subfield code="4">http://id.loc.gov/vocabulary/relators/edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Lang, Bo.</subfield><subfield code="e">editor.</subfield><subfield code="4">edt</subfield><subfield code="4">http://id.loc.gov/vocabulary/relators/edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Wen, Weiping.</subfield><subfield code="e">editor.</subfield><subfield code="4">edt</subfield><subfield code="4">http://id.loc.gov/vocabulary/relators/edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Yan, Hanbing.</subfield><subfield code="e">editor.</subfield><subfield code="4">edt</subfield><subfield code="4">http://id.loc.gov/vocabulary/relators/edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Li, Chao.</subfield><subfield code="e">editor.</subfield><subfield code="4">edt</subfield><subfield code="4">http://id.loc.gov/vocabulary/relators/edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Ding, Li.</subfield><subfield code="e">editor.</subfield><subfield code="4">edt</subfield><subfield code="4">http://id.loc.gov/vocabulary/relators/edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Li, Ruiguang.</subfield><subfield code="e">editor.</subfield><subfield code="4">edt</subfield><subfield code="4">http://id.loc.gov/vocabulary/relators/edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Zhou, Yu.</subfield><subfield code="e">editor.</subfield><subfield code="4">edt</subfield><subfield code="4">http://id.loc.gov/vocabulary/relators/edt</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">Communications in Computer and Information Science,</subfield><subfield code="x">1865-0929 ;</subfield><subfield code="v">1299</subfield></datafield><datafield tag="906" ind1=" " ind2=" "><subfield code="a">BOOK</subfield></datafield><datafield tag="ADM" ind1=" " ind2=" "><subfield code="b">2023-05-20 15:42:12 Europe/Vienna</subfield><subfield code="f">system</subfield><subfield code="c">marc21</subfield><subfield code="a">2021-01-30 22:19:47 Europe/Vienna</subfield><subfield code="g">false</subfield></datafield><datafield tag="AVE" ind1=" " ind2=" "><subfield code="i">DOAB Directory of Open Access Books</subfield><subfield code="P">DOAB Directory of Open Access Books</subfield><subfield code="x">https://eu02.alma.exlibrisgroup.com/view/uresolver/43ACC_OEAW/openurl?u.ignore_date_coverage=true&amp;portfolio_pid=5337603360004498&amp;Force_direct=true</subfield><subfield code="Z">5337603360004498</subfield><subfield code="b">Available</subfield><subfield code="8">5337603360004498</subfield></datafield></record></collection>