National Open University Library

Image from Google Jackets

Cyber security : 19th China Annual Conference, CNCERT 2022, Beijing, China, August 16-17, 2022 : revised selected papers / Wei Lu, Yuqing Zhang, Weiping Wen, Hanbing Yan, Chao Li (eds.)

Contributor(s): Lu, Wei | Zhang, Yuqing | Wen, Weiping | Yan, Hanbing | Li, ChaoMaterial type: TextTextSeries: Publisher: Singapore : Springer, [2022]Copyright date: ©2022Description: 1 online resource (x, 239 pages) : illustrations (some color)ISBN: 9789811982859; 9811982856Subject(s): Internet | Computer networksDDC classification: 005.8 Online resources: Click here to access online | Click here to access online | Click here to access online
Contents:
Data Security -- Anomaly Detection -- Cryptocurrency -- Information Security -- Vulnerabilities -- Mobile Internet -- Threat Intelligence -- Text Recognition
Summary: This open access book constitutes the refereed proceedings of the 18th China Annual Conference on Cyber Security, CNCERT 2022, held in Beijing, China, in August 2022. The 17 papers presented were carefully reviewed and selected from 64 submissions. The papers are organized according to the following topical sections: data security; anomaly detection; cryptocurrency; information security; vulnerabilities; mobile internet; threat intelligence; text recognition
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)

Conference proceedings

Includes author index

Data Security -- Anomaly Detection -- Cryptocurrency -- Information Security -- Vulnerabilities -- Mobile Internet -- Threat Intelligence -- Text Recognition

This open access book constitutes the refereed proceedings of the 18th China Annual Conference on Cyber Security, CNCERT 2022, held in Beijing, China, in August 2022. The 17 papers presented were carefully reviewed and selected from 64 submissions. The papers are organized according to the following topical sections: data security; anomaly detection; cryptocurrency; information security; vulnerabilities; mobile internet; threat intelligence; text recognition

There are no comments on this title.

to post a comment.

Powered by Koha

//