Cyber Security : 17th China Annual Conference, CNCERT 2020, Beijing, China, August 12, 2020, Revised Selected Papers / / edited by Wei Lu, Qiaoyan Wen, Yuqing Zhang, Bo Lang, Weiping Wen, Hanbing Yan, Chao Li, Li Ding, Ruiguang Li, Yu Zhou.
This open access book constitutes the refereed proceedings of the 16th International Annual Conference on Cyber Security, CNCERT 2020, held in Beijing, China, in August 2020. The 17 papers presented were carefully reviewed and selected from 58 submissions. The papers are organized according to the f...
Saved in:
Superior document: | Communications in Computer and Information Science, 1299 |
---|---|
HerausgeberIn: | |
Place / Publishing House: | Singapore : : Springer Singapore :, Imprint: Springer,, 2020. |
Year of Publication: | 2020 |
Edition: | 1st ed. 2020. |
Language: | English |
Series: | Communications in Computer and Information Science,
1299 |
Physical Description: | 1 online resource (X, 235 p. 108 illus., 70 illus. in color.) |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
id |
993544236104498 |
---|---|
ctrlnum |
(CKB)4100000011728434 (DE-He213)978-981-33-4922-3 (MiAaPQ)EBC6458353 (Au-PeEL)EBL6458353 (OCoLC)1232278670 (oapen)https://directory.doabooks.org/handle/20.500.12854/63624 (PPN)253253640 (EXLCZ)994100000011728434 |
collection |
bib_alma |
record_format |
marc |
spelling |
Lu, Wei edt Cyber Security [electronic resource] : 17th China Annual Conference, CNCERT 2020, Beijing, China, August 12, 2020, Revised Selected Papers / edited by Wei Lu, Qiaoyan Wen, Yuqing Zhang, Bo Lang, Weiping Wen, Hanbing Yan, Chao Li, Li Ding, Ruiguang Li, Yu Zhou. 1st ed. 2020. Springer Nature 2020 Singapore : Springer Singapore : Imprint: Springer, 2020. 1 online resource (X, 235 p. 108 illus., 70 illus. in color.) text txt rdacontent computer c rdamedia online resource cr rdacarrier Communications in Computer and Information Science, 1865-0929 ; 1299 Access Control -- Cryptography -- Denial-of-Service Attacks -- Hardware Security Implementation -- Intrusion/Anomaly Detection and Malware Mitigation -- Social Network Security and Privacy.-Systems Security. This open access book constitutes the refereed proceedings of the 16th International Annual Conference on Cyber Security, CNCERT 2020, held in Beijing, China, in August 2020. The 17 papers presented were carefully reviewed and selected from 58 submissions. The papers are organized according to the following topical sections: access control; cryptography; denial-of-service attacks; hardware security implementation; intrusion/anomaly detection and malware mitigation; social network security and privacy; systems security. Description based on publisher supplied metadata and other sources. English Computer security. Computer communication systems. Application software. Architecture, Computer. Data encryption (Computer science). Computer networks Security measures. Systems and Data Security. https://scigraph.springernature.com/ontologies/product-market-codes/I28060 Computer Communication Networks. https://scigraph.springernature.com/ontologies/product-market-codes/I13022 Information Systems Applications (incl. Internet). https://scigraph.springernature.com/ontologies/product-market-codes/I18040 Computer System Implementation. https://scigraph.springernature.com/ontologies/product-market-codes/I13057 Cryptology. https://scigraph.springernature.com/ontologies/product-market-codes/I28020 Mobile and Network Security. https://scigraph.springernature.com/ontologies/product-market-codes/I28050 Systems and Data Security Computer Communication Networks Information Systems Applications (incl. Internet) Computer System Implementation Cryptology Mobile and Network Security Data and Information Security Computer and Information Systems Applications communication channels (information theory) communication systems computer crime computer hardware computer networks computer security computer systems cryptography data communication systems data security databases network protocols network security sensors signal processing telecommunication networks telecommunication systems telecommunication traffic wireless telecommunication systems Network hardware Information retrieval Internet searching Systems analysis & design Coding theory & cryptology Data encryption 981-334-921-2 Lu, Wei. editor. edt http://id.loc.gov/vocabulary/relators/edt Wen, Qiaoyan. editor. edt http://id.loc.gov/vocabulary/relators/edt Zhang, Yuqing. editor. edt http://id.loc.gov/vocabulary/relators/edt Lang, Bo. editor. edt http://id.loc.gov/vocabulary/relators/edt Wen, Weiping. editor. edt http://id.loc.gov/vocabulary/relators/edt Yan, Hanbing. editor. edt http://id.loc.gov/vocabulary/relators/edt Li, Chao. editor. edt http://id.loc.gov/vocabulary/relators/edt Ding, Li. editor. edt http://id.loc.gov/vocabulary/relators/edt Li, Ruiguang. editor. edt http://id.loc.gov/vocabulary/relators/edt Zhou, Yu. editor. edt http://id.loc.gov/vocabulary/relators/edt |
language |
English |
format |
Electronic eBook |
author2 |
Lu, Wei. Lu, Wei. Wen, Qiaoyan. Wen, Qiaoyan. Zhang, Yuqing. Zhang, Yuqing. Lang, Bo. Lang, Bo. Wen, Weiping. Wen, Weiping. Yan, Hanbing. Yan, Hanbing. Li, Chao. Li, Chao. Ding, Li. Ding, Li. Li, Ruiguang. Li, Ruiguang. Zhou, Yu. Zhou, Yu. |
author_facet |
Lu, Wei. Lu, Wei. Wen, Qiaoyan. Wen, Qiaoyan. Zhang, Yuqing. Zhang, Yuqing. Lang, Bo. Lang, Bo. Wen, Weiping. Wen, Weiping. Yan, Hanbing. Yan, Hanbing. Li, Chao. Li, Chao. Ding, Li. Ding, Li. Li, Ruiguang. Li, Ruiguang. Zhou, Yu. Zhou, Yu. |
author2_variant |
w l wl w l wl w l wl q w qw q w qw y z yz y z yz b l bl b l bl w w ww w w ww h y hy h y hy c l cl c l cl l d ld l d ld r l rl r l rl y z yz y z yz |
author2_role |
HerausgeberIn HerausgeberIn HerausgeberIn HerausgeberIn HerausgeberIn HerausgeberIn HerausgeberIn HerausgeberIn HerausgeberIn HerausgeberIn HerausgeberIn HerausgeberIn HerausgeberIn HerausgeberIn HerausgeberIn HerausgeberIn HerausgeberIn HerausgeberIn HerausgeberIn HerausgeberIn |
author_sort |
Lu, Wei. |
title |
Cyber Security 17th China Annual Conference, CNCERT 2020, Beijing, China, August 12, 2020, Revised Selected Papers / |
spellingShingle |
Cyber Security 17th China Annual Conference, CNCERT 2020, Beijing, China, August 12, 2020, Revised Selected Papers / Communications in Computer and Information Science, Access Control -- Cryptography -- Denial-of-Service Attacks -- Hardware Security Implementation -- Intrusion/Anomaly Detection and Malware Mitigation -- Social Network Security and Privacy.-Systems Security. |
title_sub |
17th China Annual Conference, CNCERT 2020, Beijing, China, August 12, 2020, Revised Selected Papers / |
title_full |
Cyber Security [electronic resource] : 17th China Annual Conference, CNCERT 2020, Beijing, China, August 12, 2020, Revised Selected Papers / edited by Wei Lu, Qiaoyan Wen, Yuqing Zhang, Bo Lang, Weiping Wen, Hanbing Yan, Chao Li, Li Ding, Ruiguang Li, Yu Zhou. |
title_fullStr |
Cyber Security [electronic resource] : 17th China Annual Conference, CNCERT 2020, Beijing, China, August 12, 2020, Revised Selected Papers / edited by Wei Lu, Qiaoyan Wen, Yuqing Zhang, Bo Lang, Weiping Wen, Hanbing Yan, Chao Li, Li Ding, Ruiguang Li, Yu Zhou. |
title_full_unstemmed |
Cyber Security [electronic resource] : 17th China Annual Conference, CNCERT 2020, Beijing, China, August 12, 2020, Revised Selected Papers / edited by Wei Lu, Qiaoyan Wen, Yuqing Zhang, Bo Lang, Weiping Wen, Hanbing Yan, Chao Li, Li Ding, Ruiguang Li, Yu Zhou. |
title_auth |
Cyber Security 17th China Annual Conference, CNCERT 2020, Beijing, China, August 12, 2020, Revised Selected Papers / |
title_new |
Cyber Security |
title_sort |
cyber security 17th china annual conference, cncert 2020, beijing, china, august 12, 2020, revised selected papers / |
series |
Communications in Computer and Information Science, |
series2 |
Communications in Computer and Information Science, |
publisher |
Springer Nature Springer Singapore : Imprint: Springer, |
publishDate |
2020 |
physical |
1 online resource (X, 235 p. 108 illus., 70 illus. in color.) |
edition |
1st ed. 2020. |
contents |
Access Control -- Cryptography -- Denial-of-Service Attacks -- Hardware Security Implementation -- Intrusion/Anomaly Detection and Malware Mitigation -- Social Network Security and Privacy.-Systems Security. |
isbn |
981-334-922-0 981-334-921-2 |
issn |
1865-0929 ; |
callnumber-first |
Q - Science |
callnumber-subject |
QA - Mathematics |
callnumber-label |
QA76 |
callnumber-sort |
QA 276.9 A25 |
illustrated |
Not Illustrated |
dewey-hundreds |
000 - Computer science, information & general works |
dewey-tens |
000 - Computer science, knowledge & systems |
dewey-ones |
005 - Computer programming, programs & data |
dewey-full |
005.8 |
dewey-sort |
15.8 |
dewey-raw |
005.8 |
dewey-search |
005.8 |
oclc_num |
1232278670 |
work_keys_str_mv |
AT luwei cybersecurity17thchinaannualconferencecncert2020beijingchinaaugust122020revisedselectedpapers AT wenqiaoyan cybersecurity17thchinaannualconferencecncert2020beijingchinaaugust122020revisedselectedpapers AT zhangyuqing cybersecurity17thchinaannualconferencecncert2020beijingchinaaugust122020revisedselectedpapers AT langbo cybersecurity17thchinaannualconferencecncert2020beijingchinaaugust122020revisedselectedpapers AT wenweiping cybersecurity17thchinaannualconferencecncert2020beijingchinaaugust122020revisedselectedpapers AT yanhanbing cybersecurity17thchinaannualconferencecncert2020beijingchinaaugust122020revisedselectedpapers AT lichao cybersecurity17thchinaannualconferencecncert2020beijingchinaaugust122020revisedselectedpapers AT dingli cybersecurity17thchinaannualconferencecncert2020beijingchinaaugust122020revisedselectedpapers AT liruiguang cybersecurity17thchinaannualconferencecncert2020beijingchinaaugust122020revisedselectedpapers AT zhouyu cybersecurity17thchinaannualconferencecncert2020beijingchinaaugust122020revisedselectedpapers |
status_str |
n |
ids_txt_mv |
(CKB)4100000011728434 (DE-He213)978-981-33-4922-3 (MiAaPQ)EBC6458353 (Au-PeEL)EBL6458353 (OCoLC)1232278670 (oapen)https://directory.doabooks.org/handle/20.500.12854/63624 (PPN)253253640 (EXLCZ)994100000011728434 |
carrierType_str_mv |
cr |
hierarchy_parent_title |
Communications in Computer and Information Science, 1299 |
hierarchy_sequence |
1299 |
is_hierarchy_title |
Cyber Security 17th China Annual Conference, CNCERT 2020, Beijing, China, August 12, 2020, Revised Selected Papers / |
container_title |
Communications in Computer and Information Science, 1299 |
author2_original_writing_str_mv |
noLinkedField noLinkedField noLinkedField noLinkedField noLinkedField noLinkedField noLinkedField noLinkedField noLinkedField noLinkedField noLinkedField noLinkedField noLinkedField noLinkedField noLinkedField noLinkedField noLinkedField noLinkedField noLinkedField noLinkedField |
_version_ |
1787548760969052161 |
fullrecord |
<?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>04230nam a22006975i 4500</leader><controlfield tag="001">993544236104498</controlfield><controlfield tag="005">20230125232920.0</controlfield><controlfield tag="006">m o d | </controlfield><controlfield tag="007">cr nn 008mamaa</controlfield><controlfield tag="008">210118s2020 si | o |||| 0|eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">981-334-922-0</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1007/978-981-33-4922-3</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(CKB)4100000011728434</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-He213)978-981-33-4922-3</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(MiAaPQ)EBC6458353</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(Au-PeEL)EBL6458353</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1232278670</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(oapen)https://directory.doabooks.org/handle/20.500.12854/63624</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(PPN)253253640</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(EXLCZ)994100000011728434</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">MiAaPQ</subfield><subfield code="b">eng</subfield><subfield code="e">rda</subfield><subfield code="e">pn</subfield><subfield code="c">MiAaPQ</subfield><subfield code="d">MiAaPQ</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">QA76.9.A25</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">UR</subfield><subfield code="2">bicssc</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM053000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">UR</subfield><subfield code="2">thema</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">UTN</subfield><subfield code="2">thema</subfield></datafield><datafield tag="082" ind1="0" ind2="4"><subfield code="a">005.8</subfield><subfield code="2">23</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Lu, Wei</subfield><subfield code="4">edt</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Cyber Security</subfield><subfield code="h">[electronic resource] :</subfield><subfield code="b">17th China Annual Conference, CNCERT 2020, Beijing, China, August 12, 2020, Revised Selected Papers /</subfield><subfield code="c">edited by Wei Lu, Qiaoyan Wen, Yuqing Zhang, Bo Lang, Weiping Wen, Hanbing Yan, Chao Li, Li Ding, Ruiguang Li, Yu Zhou.</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">1st ed. 2020.</subfield></datafield><datafield tag="260" ind1=" " ind2=" "><subfield code="b">Springer Nature</subfield><subfield code="c">2020</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Singapore :</subfield><subfield code="b">Springer Singapore :</subfield><subfield code="b">Imprint: Springer,</subfield><subfield code="c">2020.</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (X, 235 p. 108 illus., 70 illus. in color.) </subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">Communications in Computer and Information Science,</subfield><subfield code="x">1865-0929 ;</subfield><subfield code="v">1299</subfield></datafield><datafield tag="505" ind1="0" ind2=" "><subfield code="a">Access Control -- Cryptography -- Denial-of-Service Attacks -- Hardware Security Implementation -- Intrusion/Anomaly Detection and Malware Mitigation -- Social Network Security and Privacy.-Systems Security.</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">This open access book constitutes the refereed proceedings of the 16th International Annual Conference on Cyber Security, CNCERT 2020, held in Beijing, China, in August 2020. The 17 papers presented were carefully reviewed and selected from 58 submissions. The papers are organized according to the following topical sections: access control; cryptography; denial-of-service attacks; hardware security implementation; intrusion/anomaly detection and malware mitigation; social network security and privacy; systems security.</subfield></datafield><datafield tag="588" ind1=" " ind2=" "><subfield code="a">Description based on publisher supplied metadata and other sources.</subfield></datafield><datafield tag="546" ind1=" " ind2=" "><subfield code="a">English</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer security.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer communication systems.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Application software.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Architecture, Computer.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Data encryption (Computer science).</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures.</subfield></datafield><datafield tag="650" ind1="1" ind2="4"><subfield code="a">Systems and Data Security.</subfield><subfield code="0">https://scigraph.springernature.com/ontologies/product-market-codes/I28060</subfield></datafield><datafield tag="650" ind1="2" ind2="4"><subfield code="a">Computer Communication Networks.</subfield><subfield code="0">https://scigraph.springernature.com/ontologies/product-market-codes/I13022</subfield></datafield><datafield tag="650" ind1="2" ind2="4"><subfield code="a">Information Systems Applications (incl. Internet).</subfield><subfield code="0">https://scigraph.springernature.com/ontologies/product-market-codes/I18040</subfield></datafield><datafield tag="650" ind1="2" ind2="4"><subfield code="a">Computer System Implementation.</subfield><subfield code="0">https://scigraph.springernature.com/ontologies/product-market-codes/I13057</subfield></datafield><datafield tag="650" ind1="2" ind2="4"><subfield code="a">Cryptology.</subfield><subfield code="0">https://scigraph.springernature.com/ontologies/product-market-codes/I28020</subfield></datafield><datafield tag="650" ind1="2" ind2="4"><subfield code="a">Mobile and Network Security.</subfield><subfield code="0">https://scigraph.springernature.com/ontologies/product-market-codes/I28050</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Systems and Data Security</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Computer Communication Networks</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Information Systems Applications (incl. Internet)</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Computer System Implementation</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Cryptology</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Mobile and Network Security</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Data and Information Security</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Computer and Information Systems Applications</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">communication channels (information theory)</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">communication systems</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">computer crime</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">computer hardware</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">computer networks</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">computer security</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">computer systems</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">cryptography</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">data communication systems</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">data security</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">databases</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">network protocols</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">network security</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">sensors</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">signal processing</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">telecommunication networks</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">telecommunication systems</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">telecommunication traffic</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">wireless telecommunication systems</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Network hardware</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Information retrieval</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Internet searching</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Systems analysis & design</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Coding theory & cryptology</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Data encryption</subfield></datafield><datafield tag="776" ind1=" " ind2=" "><subfield code="z">981-334-921-2</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Lu, Wei.</subfield><subfield code="e">editor.</subfield><subfield code="4">edt</subfield><subfield code="4">http://id.loc.gov/vocabulary/relators/edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Wen, Qiaoyan.</subfield><subfield code="e">editor.</subfield><subfield code="4">edt</subfield><subfield code="4">http://id.loc.gov/vocabulary/relators/edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Zhang, Yuqing.</subfield><subfield code="e">editor.</subfield><subfield code="4">edt</subfield><subfield code="4">http://id.loc.gov/vocabulary/relators/edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Lang, Bo.</subfield><subfield code="e">editor.</subfield><subfield code="4">edt</subfield><subfield code="4">http://id.loc.gov/vocabulary/relators/edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Wen, Weiping.</subfield><subfield code="e">editor.</subfield><subfield code="4">edt</subfield><subfield code="4">http://id.loc.gov/vocabulary/relators/edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Yan, Hanbing.</subfield><subfield code="e">editor.</subfield><subfield code="4">edt</subfield><subfield code="4">http://id.loc.gov/vocabulary/relators/edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Li, Chao.</subfield><subfield code="e">editor.</subfield><subfield code="4">edt</subfield><subfield code="4">http://id.loc.gov/vocabulary/relators/edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Ding, Li.</subfield><subfield code="e">editor.</subfield><subfield code="4">edt</subfield><subfield code="4">http://id.loc.gov/vocabulary/relators/edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Li, Ruiguang.</subfield><subfield code="e">editor.</subfield><subfield code="4">edt</subfield><subfield code="4">http://id.loc.gov/vocabulary/relators/edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Zhou, Yu.</subfield><subfield code="e">editor.</subfield><subfield code="4">edt</subfield><subfield code="4">http://id.loc.gov/vocabulary/relators/edt</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">Communications in Computer and Information Science,</subfield><subfield code="x">1865-0929 ;</subfield><subfield code="v">1299</subfield></datafield><datafield tag="906" ind1=" " ind2=" "><subfield code="a">BOOK</subfield></datafield><datafield tag="ADM" ind1=" " ind2=" "><subfield code="b">2023-05-20 15:42:12 Europe/Vienna</subfield><subfield code="f">system</subfield><subfield code="c">marc21</subfield><subfield code="a">2021-01-30 22:19:47 Europe/Vienna</subfield><subfield code="g">false</subfield></datafield><datafield tag="AVE" ind1=" " ind2=" "><subfield code="i">DOAB Directory of Open Access Books</subfield><subfield code="P">DOAB Directory of Open Access Books</subfield><subfield code="x">https://eu02.alma.exlibrisgroup.com/view/uresolver/43ACC_OEAW/openurl?u.ignore_date_coverage=true&portfolio_pid=5337603360004498&Force_direct=true</subfield><subfield code="Z">5337603360004498</subfield><subfield code="b">Available</subfield><subfield code="8">5337603360004498</subfield></datafield></record></collection> |