Show simple item record

dc.contributor.editorLu, Wei
dc.contributor.editorWen, Qiaoyan
dc.contributor.editorZhang, Yuqing
dc.contributor.editorLang, Bo
dc.contributor.editorWen, Weiping
dc.contributor.editorYan, Hanbing
dc.contributor.editorLi, Chao
dc.contributor.editorDing, Li
dc.contributor.editorLi, Ruiguang
dc.contributor.editorZhou, Yu
dc.date.accessioned2021-02-15T10:19:49Z
dc.date.available2021-02-15T10:19:49Z
dc.date.issued2020
dc.identifierONIX_20210215_9789813349223_4
dc.identifier.urihttps://library.oapen.org/handle/20.500.12657/46787
dc.description.abstractThis open access book constitutes the refereed proceedings of the 16th International Annual Conference on Cyber Security, CNCERT 2020, held in Beijing, China, in August 2020. The 17 papers presented were carefully reviewed and selected from 58 submissions. The papers are organized according to the following topical sections: access control; cryptography; denial-of-service attacks; hardware security implementation; intrusion/anomaly detection and malware mitigation; social network security and privacy; systems security.
dc.languageEnglish
dc.relation.ispartofseriesCommunications in Computer and Information Science
dc.subject.classificationthema EDItEUR::U Computing and Information Technology::UR Computer securityen_US
dc.subject.classificationthema EDItEUR::U Computing and Information Technology::UK Computer hardware::UKN Network hardwareen_US
dc.subject.classificationthema EDItEUR::U Computing and Information Technology::UN Databases::UNH Information retrievalen_US
dc.subject.classificationthema EDItEUR::U Computing and Information Technology::UY Computer science::UYD Systems analysis and designen_US
dc.subject.classificationthema EDItEUR::G Reference, Information and Interdisciplinary subjects::GP Research and information: general::GPJ Coding theory and cryptologyen_US
dc.subject.classificationthema EDItEUR::U Computing and Information Technology::UT Computer networking and communications::UTN Network securityen_US
dc.subject.otherSystems and Data Security
dc.subject.otherComputer Communication Networks
dc.subject.otherInformation Systems Applications (incl. Internet)
dc.subject.otherComputer System Implementation
dc.subject.otherCryptology
dc.subject.otherMobile and Network Security
dc.subject.otherData and Information Security
dc.subject.otherComputer and Information Systems Applications
dc.subject.othercommunication channels (information theory)
dc.subject.othercommunication systems
dc.subject.othercomputer crime
dc.subject.othercomputer hardware
dc.subject.othercomputer networks
dc.subject.othercomputer security
dc.subject.othercomputer systems
dc.subject.othercryptography
dc.subject.otherdata communication systems
dc.subject.otherdata security
dc.subject.otherdatabases
dc.subject.othernetwork protocols
dc.subject.othernetwork security
dc.subject.othersensors
dc.subject.othersignal processing
dc.subject.othertelecommunication networks
dc.subject.othertelecommunication systems
dc.subject.othertelecommunication traffic
dc.subject.otherwireless telecommunication systems
dc.subject.otherNetwork hardware
dc.subject.otherInformation retrieval
dc.subject.otherInternet searching
dc.subject.otherSystems analysis & design
dc.subject.otherCoding theory & cryptology
dc.subject.otherData encryption
dc.titleCyber Security
dc.title.alternative17th China Annual Conference, CNCERT 2020, Beijing, China, August 12, 2020, Revised Selected Papers
dc.typebook
oapen.identifier.doi10.1007/978-981-33-4922-3
oapen.relation.isPublishedBy6c6992af-b843-4f46-859c-f6e9998e40d5
oapen.imprintSpringer Singapore
oapen.series.number1299
oapen.pages235


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record