TY - BOOK ID - 33241243 TI - Applications and Techniques in Information Security : 9th International Conference, ATIS 2018, Nanning, China, November 9–11, 2018, Proceedings AU - Chen, Qingfeng. AU - Wu, Jia. AU - Zhang, Shichao. AU - Yuan, Changan. AU - Batten, Lynn. AU - Li, Gang. PY - 2018 SN - 9811329079 9811329060 PB - Singapore : Springer Singapore : Imprint: Springer, DB - UniCat KW - Computer security. KW - Data mining. KW - Artificial intelligence. KW - Data encryption (Computer science). KW - Systems and Data Security. KW - Data Mining and Knowledge Discovery. KW - Artificial Intelligence. KW - Cryptology. KW - Data encoding (Computer science) KW - Encryption of data (Computer science) KW - Computer security KW - Cryptography KW - AI (Artificial intelligence) KW - Artificial thinking KW - Electronic brains KW - Intellectronics KW - Intelligence, Artificial KW - Intelligent machines KW - Machine intelligence KW - Thinking, Artificial KW - Bionics KW - Cognitive science KW - Digital computer simulation KW - Electronic data processing KW - Logic machines KW - Machine theory KW - Self-organizing systems KW - Simulation methods KW - Fifth generation computers KW - Neural computers KW - Algorithmic knowledge discovery KW - Factual data analysis KW - KDD (Information retrieval) KW - Knowledge discovery in data KW - Knowledge discovery in databases KW - Mining, Data KW - Database searching KW - Computer privacy KW - Computer system security KW - Computer systems KW - Computers KW - Cyber security KW - Cybersecurity KW - Electronic digital computers KW - Protection of computer systems KW - Security of computer systems KW - Data protection KW - Security systems KW - Hacking KW - Protection KW - Security measures UR - https://www.unicat.be/uniCat?func=search&query=sysid:33241243 AB - This book constitutes the refereed proceedings of the 9th International Conference on Applications and Techniques in Information Security, ATIS 2018, held in Nanning, China, in November 2018. The 19 full papers were carefully reviewed and selected from 59 submissions. The papers are organized in the following topical sections: information security, information abuse prevention, security implementations, knowledge discovery, and applications. ER -