Malicious attack propagation and source identification:
Gespeichert in:
Beteiligte Personen: | , , , , , |
---|---|
Format: | Buch |
Sprache: | Englisch |
Veröffentlicht: |
Cham
Springer
[2019]
|
Schriftenreihe: | Advances in information security
volume 73 |
Schlagwörter: | |
Umfang: | xii, 192 Seiten Illustrationen, Diagramme (teilweise farbig) |
ISBN: | 9783030021788 |
Internformat
MARC
LEADER | 00000nam a2200000 cb4500 | ||
---|---|---|---|
001 | BV046345991 | ||
003 | DE-604 | ||
005 | 20200219 | ||
007 | t| | ||
008 | 200121s2019 xx a||| |||| 00||| eng d | ||
020 | |a 9783030021788 |9 978-3-030-02178-8 | ||
035 | |a (OCoLC)1142785640 | ||
035 | |a (DE-599)BVBBV046345991 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-11 | ||
082 | 0 | |a 005.8 |2 23 | |
084 | |a ST 277 |0 (DE-625)143643: |2 rvk | ||
100 | 1 | |a Jiang, Jiaojiao |e Verfasser |4 aut | |
245 | 1 | 0 | |a Malicious attack propagation and source identification |c Jiaojiao Jiang, Sheng Wen, Bo Liu, Shui Yu, Yang Xiang, Wanlei Zhou |
264 | 1 | |a Cham |b Springer |c [2019] | |
264 | 4 | |c © 2019 | |
300 | |a xii, 192 Seiten |b Illustrationen, Diagramme (teilweise farbig) | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
490 | 1 | |a Advances in information security |v volume 73 | |
650 | 4 | |a Security | |
650 | 4 | |a Computer Communication Networks | |
650 | 4 | |a Communications Engineering, Networks | |
650 | 4 | |a Data protection | |
650 | 4 | |a Computer Communication Networks | |
650 | 4 | |a Telecommunication | |
700 | 1 | |a Wen, Sheng |e Verfasser |4 aut | |
700 | 1 | |a Liu, Bo |e Verfasser |4 aut | |
700 | 1 | |a Yu, Shui |e Verfasser |0 (DE-588)1037147804 |4 aut | |
700 | 1 | |a Xiang, Yang |e Verfasser |4 aut | |
700 | 1 | |a Zhou, Wanlei |e Verfasser |4 aut | |
776 | 0 | 8 | |i Erscheint auch als |n Online-Ausgabe |z 978-3-030-02179-5 |
830 | 0 | |a Advances in information security |v volume 73 |w (DE-604)BV014168308 |9 73 | |
943 | 1 | |a oai:aleph.bib-bvb.de:BVB01-031722575 |
Datensatz im Suchindex
_version_ | 1818986387927465984 |
---|---|
any_adam_object | |
author | Jiang, Jiaojiao Wen, Sheng Liu, Bo Yu, Shui Xiang, Yang Zhou, Wanlei |
author_GND | (DE-588)1037147804 |
author_facet | Jiang, Jiaojiao Wen, Sheng Liu, Bo Yu, Shui Xiang, Yang Zhou, Wanlei |
author_role | aut aut aut aut aut aut |
author_sort | Jiang, Jiaojiao |
author_variant | j j jj s w sw b l bl s y sy y x yx w z wz |
building | Verbundindex |
bvnumber | BV046345991 |
classification_rvk | ST 277 |
ctrlnum | (OCoLC)1142785640 (DE-599)BVBBV046345991 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01596nam a2200457 cb4500</leader><controlfield tag="001">BV046345991</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20200219 </controlfield><controlfield tag="007">t|</controlfield><controlfield tag="008">200121s2019 xx a||| |||| 00||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783030021788</subfield><subfield code="9">978-3-030-02178-8</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1142785640</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV046345991</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-11</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 277</subfield><subfield code="0">(DE-625)143643:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Jiang, Jiaojiao</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Malicious attack propagation and source identification</subfield><subfield code="c">Jiaojiao Jiang, Sheng Wen, Bo Liu, Shui Yu, Yang Xiang, Wanlei Zhou</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Cham</subfield><subfield code="b">Springer</subfield><subfield code="c">[2019]</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">© 2019</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">xii, 192 Seiten</subfield><subfield code="b">Illustrationen, Diagramme (teilweise farbig)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">Advances in information security</subfield><subfield code="v">volume 73</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer Communication Networks</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Communications Engineering, Networks</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data protection</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer Communication Networks</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Telecommunication</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Wen, Sheng</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Liu, Bo</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Yu, Shui</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)1037147804</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Xiang, Yang</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Zhou, Wanlei</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Online-Ausgabe</subfield><subfield code="z">978-3-030-02179-5</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">Advances in information security</subfield><subfield code="v">volume 73</subfield><subfield code="w">(DE-604)BV014168308</subfield><subfield code="9">73</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-031722575</subfield></datafield></record></collection> |
id | DE-604.BV046345991 |
illustrated | Illustrated |
indexdate | 2024-12-20T18:50:00Z |
institution | BVB |
isbn | 9783030021788 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-031722575 |
oclc_num | 1142785640 |
open_access_boolean | |
owner | DE-11 |
owner_facet | DE-11 |
physical | xii, 192 Seiten Illustrationen, Diagramme (teilweise farbig) |
publishDate | 2019 |
publishDateSearch | 2019 |
publishDateSort | 2019 |
publisher | Springer |
record_format | marc |
series | Advances in information security |
series2 | Advances in information security |
spelling | Jiang, Jiaojiao Verfasser aut Malicious attack propagation and source identification Jiaojiao Jiang, Sheng Wen, Bo Liu, Shui Yu, Yang Xiang, Wanlei Zhou Cham Springer [2019] © 2019 xii, 192 Seiten Illustrationen, Diagramme (teilweise farbig) txt rdacontent n rdamedia nc rdacarrier Advances in information security volume 73 Security Computer Communication Networks Communications Engineering, Networks Data protection Telecommunication Wen, Sheng Verfasser aut Liu, Bo Verfasser aut Yu, Shui Verfasser (DE-588)1037147804 aut Xiang, Yang Verfasser aut Zhou, Wanlei Verfasser aut Erscheint auch als Online-Ausgabe 978-3-030-02179-5 Advances in information security volume 73 (DE-604)BV014168308 73 |
spellingShingle | Jiang, Jiaojiao Wen, Sheng Liu, Bo Yu, Shui Xiang, Yang Zhou, Wanlei Malicious attack propagation and source identification Advances in information security Security Computer Communication Networks Communications Engineering, Networks Data protection Telecommunication |
title | Malicious attack propagation and source identification |
title_auth | Malicious attack propagation and source identification |
title_exact_search | Malicious attack propagation and source identification |
title_full | Malicious attack propagation and source identification Jiaojiao Jiang, Sheng Wen, Bo Liu, Shui Yu, Yang Xiang, Wanlei Zhou |
title_fullStr | Malicious attack propagation and source identification Jiaojiao Jiang, Sheng Wen, Bo Liu, Shui Yu, Yang Xiang, Wanlei Zhou |
title_full_unstemmed | Malicious attack propagation and source identification Jiaojiao Jiang, Sheng Wen, Bo Liu, Shui Yu, Yang Xiang, Wanlei Zhou |
title_short | Malicious attack propagation and source identification |
title_sort | malicious attack propagation and source identification |
topic | Security Computer Communication Networks Communications Engineering, Networks Data protection Telecommunication |
topic_facet | Security Computer Communication Networks Communications Engineering, Networks Data protection Telecommunication |
volume_link | (DE-604)BV014168308 |
work_keys_str_mv | AT jiangjiaojiao maliciousattackpropagationandsourceidentification AT wensheng maliciousattackpropagationandsourceidentification AT liubo maliciousattackpropagationandsourceidentification AT yushui maliciousattackpropagationandsourceidentification AT xiangyang maliciousattackpropagationandsourceidentification AT zhouwanlei maliciousattackpropagationandsourceidentification |