Attacks and defenses for the internet-of-things: 5th international workshop, ADIoT 2022, Copenhagen, Denmark, September 30, 2022, revised selected papers
Saved in:
Staff View
MARC
LEADER | 00000nam a2200000zcb4500 | ||
---|---|---|---|
001 | BV048637702 | ||
003 | DE-604 | ||
005 | 20230221 | ||
007 | cr|uuu---uuuuu | ||
008 | 230110s2022 xx a||| o|||| 10||| eng d | ||
020 | |a 9783031213113 |c Online |9 978-3-031-21311-3 | ||
024 | 7 | |a 10.1007/978-3-031-21311-3 |2 doi | |
035 | |a (ZDB-2-SCS)9783031213113 | ||
035 | |a (ZDB-2-LNC)9783031213113 | ||
035 | |a (OCoLC)1357529687 | ||
035 | |a (DE-599)BVBBV048637702 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-860 |a DE-91 |a DE-19 |a DE-Aug4 |a DE-898 |a DE-861 |a DE-188 |a DE-523 |a DE-859 |a DE-473 |a DE-29 |a DE-863 |a DE-1050 |a DE-20 |a DE-862 |a DE-92 |a DE-355 |a DE-824 |a DE-384 |a DE-M347 |a DE-573 |a DE-703 |a DE-706 |a DE-739 |a DE-634 | ||
082 | 0 | |a 004.678 |2 23 | |
084 | |a DAT 000 |2 stub | ||
111 | 2 | |a International Workshop on Attacks and Defenses for Internet-of-Things |n 5. |d 2022 |c Kopenhagen, Online |j Verfasser |0 (DE-588)1280161337 |4 aut | |
245 | 1 | 0 | |a Attacks and defenses for the internet-of-things |b 5th international workshop, ADIoT 2022, Copenhagen, Denmark, September 30, 2022, revised selected papers |c Wenjuan Li, Steven Furnell, Weizhi Meng (eds.) |
264 | 1 | |a Cham, Switzerland |b Springer |c [2022] | |
300 | |a 1 Online-Ressource (x, 177 Seiten) |b 65 Illustrationen, 46 in Farbe | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
490 | 1 | |a Lecture notes in computer science |v 13745 |x 1611-3349 | |
650 | 4 | |a Internet of Things | |
650 | 4 | |a Computer Communication Networks | |
650 | 4 | |a Computing Milieux | |
650 | 4 | |a Cryptology | |
650 | 4 | |a Mobile and Network Security | |
650 | 4 | |a Software Engineering | |
650 | 4 | |a Internet of things | |
650 | 4 | |a Computer networks | |
650 | 4 | |a Computers | |
650 | 4 | |a Cryptography | |
650 | 4 | |a Data encryption (Computer science) | |
650 | 4 | |a Computer networks—Security measures | |
650 | 4 | |a Software engineering | |
655 | 7 | |0 (DE-588)1071861417 |a Konferenzschrift |y 2022 |z Kopenhagen |2 gnd-content | |
700 | 1 | |a Li, Wenjuan |4 edt | |
700 | 1 | |a Furnell, Steven |4 edt | |
700 | 1 | |a Meng, Weizhi |4 edt | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 978-3-031-21310-6 |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 978-3-031-21312-0 |
830 | 0 | |a Lecture notes in computer science |v 13745 |w (DE-604)BV014880109 |9 13745 | |
856 | 4 | 0 | |u https://doi.org/10.1007/978-3-031-21311-3 |x Verlag |z URL des Erstveröffentlichers |3 Volltext |
912 | |a ZDB-2-SCS | ||
912 | |a ZDB-2-LNC | ||
940 | 1 | |q ZDB-2-SCS_2022 | |
940 | 1 | |q ZDB-2-LNC_2022 | |
943 | 1 | |a oai:aleph.bib-bvb.de:BVB01-034012667 | |
966 | e | |u https://doi.org/10.1007/978-3-031-21311-3 |l DE-634 |p ZDB-2-LNC |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-031-21311-3 |l DE-Aug4 |p ZDB-2-LNC |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-031-21311-3 |l DE-1050 |p ZDB-2-LNC |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-031-21311-3 |l DE-573 |p ZDB-2-LNC |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-031-21311-3 |l DE-M347 |p ZDB-2-LNC |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-031-21311-3 |l DE-92 |p ZDB-2-LNC |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-031-21311-3 |l DE-898 |p ZDB-2-LNC |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-031-21311-3 |l DE-859 |p ZDB-2-LNC |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-031-21311-3 |l DE-860 |p ZDB-2-LNC |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-031-21311-3 |l DE-861 |p ZDB-2-LNC |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-031-21311-3 |l DE-863 |p ZDB-2-LNC |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-031-21311-3 |l DE-862 |p ZDB-2-LNC |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-031-21311-3 |l DE-523 |p ZDB-2-LNC |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-031-21311-3 |l DE-91 |p ZDB-2-LNC |q ZDB-2-LNC_2022 |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-031-21311-3 |l DE-384 |p ZDB-2-LNC |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-031-21311-3 |l DE-473 |p ZDB-2-LNC |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-031-21311-3 |l DE-19 |p ZDB-2-LNC |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-031-21311-3 |l DE-355 |p ZDB-2-LNC |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-031-21311-3 |l DE-703 |p ZDB-2-LNC |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-031-21311-3 |l DE-20 |p ZDB-2-LNC |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-031-21311-3 |l DE-706 |p ZDB-2-LNC |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-031-21311-3 |l DE-824 |p ZDB-2-LNC |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-031-21311-3 |l DE-29 |p ZDB-2-LNC |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-031-21311-3 |l DE-739 |p ZDB-2-LNC |x Verlag |3 Volltext |
Record in the Search Index
DE-BY-TUM_katkey | 2708555 |
---|---|
_version_ | 1821935056325705728 |
adam_text | |
any_adam_object | |
author2 | Li, Wenjuan Furnell, Steven Meng, Weizhi |
author2_role | edt edt edt |
author2_variant | w l wl s f sf w m wm |
author_corporate | International Workshop on Attacks and Defenses for Internet-of-Things Kopenhagen, Online |
author_corporate_role | aut |
author_facet | Li, Wenjuan Furnell, Steven Meng, Weizhi International Workshop on Attacks and Defenses for Internet-of-Things Kopenhagen, Online |
author_sort | International Workshop on Attacks and Defenses for Internet-of-Things Kopenhagen, Online |
building | Verbundindex |
bvnumber | BV048637702 |
classification_rvk | SS 4800 |
classification_tum | DAT 000 |
collection | ZDB-2-SCS ZDB-2-LNC |
ctrlnum | (ZDB-2-SCS)9783031213113 (ZDB-2-LNC)9783031213113 (OCoLC)1357529687 (DE-599)BVBBV048637702 |
dewey-full | 004.678 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 004 - Computer science |
dewey-raw | 004.678 |
dewey-search | 004.678 |
dewey-sort | 14.678 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
doi_str_mv | 10.1007/978-3-031-21311-3 |
format | Electronic Conference Proceeding eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>00000nam a2200000zcb4500</leader><controlfield tag="001">BV048637702</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20230221</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">230110s2022 xx a||| o|||| 10||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783031213113</subfield><subfield code="c">Online</subfield><subfield code="9">978-3-031-21311-3</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1007/978-3-031-21311-3</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-2-SCS)9783031213113</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-2-LNC)9783031213113</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1357529687</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV048637702</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-860</subfield><subfield code="a">DE-91</subfield><subfield code="a">DE-19</subfield><subfield code="a">DE-Aug4</subfield><subfield code="a">DE-898</subfield><subfield code="a">DE-861</subfield><subfield code="a">DE-188</subfield><subfield code="a">DE-523</subfield><subfield code="a">DE-859</subfield><subfield code="a">DE-473</subfield><subfield code="a">DE-29</subfield><subfield code="a">DE-863</subfield><subfield code="a">DE-1050</subfield><subfield code="a">DE-20</subfield><subfield code="a">DE-862</subfield><subfield code="a">DE-92</subfield><subfield code="a">DE-355</subfield><subfield code="a">DE-824</subfield><subfield code="a">DE-384</subfield><subfield code="a">DE-M347</subfield><subfield code="a">DE-573</subfield><subfield code="a">DE-703</subfield><subfield code="a">DE-706</subfield><subfield code="a">DE-739</subfield><subfield code="a">DE-634</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">004.678</subfield><subfield code="2">23</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 000</subfield><subfield code="2">stub</subfield></datafield><datafield tag="111" ind1="2" ind2=" "><subfield code="a">International Workshop on Attacks and Defenses for Internet-of-Things</subfield><subfield code="n">5.</subfield><subfield code="d">2022</subfield><subfield code="c">Kopenhagen, Online</subfield><subfield code="j">Verfasser</subfield><subfield code="0">(DE-588)1280161337</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Attacks and defenses for the internet-of-things</subfield><subfield code="b">5th international workshop, ADIoT 2022, Copenhagen, Denmark, September 30, 2022, revised selected papers</subfield><subfield code="c">Wenjuan Li, Steven Furnell, Weizhi Meng (eds.)</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Cham, Switzerland</subfield><subfield code="b">Springer</subfield><subfield code="c">[2022]</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (x, 177 Seiten)</subfield><subfield code="b">65 Illustrationen, 46 in Farbe</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">Lecture notes in computer science</subfield><subfield code="v">13745</subfield><subfield code="x">1611-3349</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Internet of Things</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer Communication Networks</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computing Milieux</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cryptology</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Mobile and Network Security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Software Engineering</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Internet of things</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks </subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computers</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cryptography</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data encryption (Computer science)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks—Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Software engineering</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)1071861417</subfield><subfield code="a">Konferenzschrift</subfield><subfield code="y">2022</subfield><subfield code="z">Kopenhagen</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Li, Wenjuan</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Furnell, Steven</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Meng, Weizhi</subfield><subfield code="4">edt</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">978-3-031-21310-6</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">978-3-031-21312-0</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">Lecture notes in computer science</subfield><subfield code="v">13745</subfield><subfield code="w">(DE-604)BV014880109</subfield><subfield code="9">13745</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1007/978-3-031-21311-3</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Erstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-2-SCS</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-2-LNC</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">ZDB-2-SCS_2022</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">ZDB-2-LNC_2022</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-034012667</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-031-21311-3</subfield><subfield code="l">DE-634</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-031-21311-3</subfield><subfield code="l">DE-Aug4</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-031-21311-3</subfield><subfield code="l">DE-1050</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-031-21311-3</subfield><subfield code="l">DE-573</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-031-21311-3</subfield><subfield code="l">DE-M347</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-031-21311-3</subfield><subfield code="l">DE-92</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-031-21311-3</subfield><subfield code="l">DE-898</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-031-21311-3</subfield><subfield code="l">DE-859</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-031-21311-3</subfield><subfield code="l">DE-860</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-031-21311-3</subfield><subfield code="l">DE-861</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-031-21311-3</subfield><subfield code="l">DE-863</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-031-21311-3</subfield><subfield code="l">DE-862</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-031-21311-3</subfield><subfield code="l">DE-523</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-031-21311-3</subfield><subfield code="l">DE-91</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="q">ZDB-2-LNC_2022</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-031-21311-3</subfield><subfield code="l">DE-384</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-031-21311-3</subfield><subfield code="l">DE-473</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-031-21311-3</subfield><subfield code="l">DE-19</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-031-21311-3</subfield><subfield code="l">DE-355</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-031-21311-3</subfield><subfield code="l">DE-703</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-031-21311-3</subfield><subfield code="l">DE-20</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-031-21311-3</subfield><subfield code="l">DE-706</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-031-21311-3</subfield><subfield code="l">DE-824</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-031-21311-3</subfield><subfield code="l">DE-29</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-031-21311-3</subfield><subfield code="l">DE-739</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
genre | (DE-588)1071861417 Konferenzschrift 2022 Kopenhagen gnd-content |
genre_facet | Konferenzschrift 2022 Kopenhagen |
id | DE-604.BV048637702 |
illustrated | Illustrated |
indexdate | 2025-01-11T19:09:46Z |
institution | BVB |
institution_GND | (DE-588)1280161337 |
isbn | 9783031213113 |
issn | 1611-3349 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-034012667 |
oclc_num | 1357529687 |
open_access_boolean | |
owner | DE-860 DE-91 DE-BY-TUM DE-19 DE-BY-UBM DE-Aug4 DE-898 DE-BY-UBR DE-861 DE-188 DE-523 DE-859 DE-473 DE-BY-UBG DE-29 DE-863 DE-BY-FWS DE-1050 DE-20 DE-862 DE-BY-FWS DE-92 DE-355 DE-BY-UBR DE-824 DE-384 DE-M347 DE-573 DE-703 DE-706 DE-739 DE-634 |
owner_facet | DE-860 DE-91 DE-BY-TUM DE-19 DE-BY-UBM DE-Aug4 DE-898 DE-BY-UBR DE-861 DE-188 DE-523 DE-859 DE-473 DE-BY-UBG DE-29 DE-863 DE-BY-FWS DE-1050 DE-20 DE-862 DE-BY-FWS DE-92 DE-355 DE-BY-UBR DE-824 DE-384 DE-M347 DE-573 DE-703 DE-706 DE-739 DE-634 |
physical | 1 Online-Ressource (x, 177 Seiten) 65 Illustrationen, 46 in Farbe |
psigel | ZDB-2-SCS ZDB-2-LNC ZDB-2-SCS_2022 ZDB-2-LNC_2022 ZDB-2-LNC ZDB-2-LNC_2022 |
publishDate | 2022 |
publishDateSearch | 2022 |
publishDateSort | 2022 |
publisher | Springer |
record_format | marc |
series | Lecture notes in computer science |
series2 | Lecture notes in computer science |
spellingShingle | Attacks and defenses for the internet-of-things 5th international workshop, ADIoT 2022, Copenhagen, Denmark, September 30, 2022, revised selected papers Lecture notes in computer science Internet of Things Computer Communication Networks Computing Milieux Cryptology Mobile and Network Security Software Engineering Internet of things Computer networks Computers Cryptography Data encryption (Computer science) Computer networks—Security measures Software engineering |
subject_GND | (DE-588)1071861417 |
title | Attacks and defenses for the internet-of-things 5th international workshop, ADIoT 2022, Copenhagen, Denmark, September 30, 2022, revised selected papers |
title_auth | Attacks and defenses for the internet-of-things 5th international workshop, ADIoT 2022, Copenhagen, Denmark, September 30, 2022, revised selected papers |
title_exact_search | Attacks and defenses for the internet-of-things 5th international workshop, ADIoT 2022, Copenhagen, Denmark, September 30, 2022, revised selected papers |
title_full | Attacks and defenses for the internet-of-things 5th international workshop, ADIoT 2022, Copenhagen, Denmark, September 30, 2022, revised selected papers Wenjuan Li, Steven Furnell, Weizhi Meng (eds.) |
title_fullStr | Attacks and defenses for the internet-of-things 5th international workshop, ADIoT 2022, Copenhagen, Denmark, September 30, 2022, revised selected papers Wenjuan Li, Steven Furnell, Weizhi Meng (eds.) |
title_full_unstemmed | Attacks and defenses for the internet-of-things 5th international workshop, ADIoT 2022, Copenhagen, Denmark, September 30, 2022, revised selected papers Wenjuan Li, Steven Furnell, Weizhi Meng (eds.) |
title_short | Attacks and defenses for the internet-of-things |
title_sort | attacks and defenses for the internet of things 5th international workshop adiot 2022 copenhagen denmark september 30 2022 revised selected papers |
title_sub | 5th international workshop, ADIoT 2022, Copenhagen, Denmark, September 30, 2022, revised selected papers |
topic | Internet of Things Computer Communication Networks Computing Milieux Cryptology Mobile and Network Security Software Engineering Internet of things Computer networks Computers Cryptography Data encryption (Computer science) Computer networks—Security measures Software engineering |
topic_facet | Internet of Things Computer Communication Networks Computing Milieux Cryptology Mobile and Network Security Software Engineering Internet of things Computer networks Computers Cryptography Data encryption (Computer science) Computer networks—Security measures Software engineering Konferenzschrift 2022 Kopenhagen |
url | https://doi.org/10.1007/978-3-031-21311-3 |
volume_link | (DE-604)BV014880109 |
work_keys_str_mv | AT internationalworkshoponattacksanddefensesforinternetofthingskopenhagenonline attacksanddefensesfortheinternetofthings5thinternationalworkshopadiot2022copenhagendenmarkseptember302022revisedselectedpapers AT liwenjuan attacksanddefensesfortheinternetofthings5thinternationalworkshopadiot2022copenhagendenmarkseptember302022revisedselectedpapers AT furnellsteven attacksanddefensesfortheinternetofthings5thinternationalworkshopadiot2022copenhagendenmarkseptember302022revisedselectedpapers AT mengweizhi attacksanddefensesfortheinternetofthings5thinternationalworkshopadiot2022copenhagendenmarkseptember302022revisedselectedpapers |