000 01616nom a2200433 u 4500
001 10092079
003 upatras
005 20210117202914.0
008 110802s2010 eng
020 _a9781441913258
040 _aGR-PaULI
_cGR-PaULI
041 0 _aeng
100 1 _aYang, Christopher C
_997216
245 1 0 _aSecurity Informatics
_h[electronic resource]
_cedited by Christopher C. Yang, Michael Chau, Jau-Hwang Wang, Hsinchun Chen
260 _aBoston, MA
_bSpringer-Verlag US
_c2010
300 _bv.: digital
490 0 _aAnnals of Information Systems
_v9
_x1934-3221
650 4 _aComputer science
_913995
650 4 _aComputer network architectures
_964265
650 4 _aData protection
_921658
650 4 _aData mining
_920947
650 4 _aManagement information systems
_912198
650 4 _aComputer Science
_964565
650 4 _aSystems and Data Security
_993988
650 4 _aBusiness Information Systems
_964263
650 4 _aData Mining and Knowledge Discovery
_965360
650 4 _aOperations Research/Decision Theory
_964252
650 4 _aComputer Systems Organization and Communication Networks
_964266
650 4 _aArtificial Intelligence (incl. Robotics)
_964267
650 4 _984642
_aΤεχνητή νοημοσύνη
700 1 _aChau, Michael
_997217
700 1 _aWang, Jau-Hwang
_997218
700 1 _aChen, Hsinchun
_969004
710 2 _aSpringerLink (Online service)
_968735
760 1 _aAnnals of Information Systems
_g9
_x1934-3221
856 4 0 _uhttp://dx.doi.org/10.1007/978-1-4419-1325-8
942 _2ddc
999 _c67779
_d67779