LEADER 01422cam a22003495u 4500 001 9787624 005 20110613130518.0 006 m d 007 cr nn 008mamaa 008 110530s2011 xx s | eng d 020 $a9783642213236 035 $a(Springer)978-3-642-21322-9 035 $a9787624 100 1 $aHerrero, Alvaro.$1http://share-vde.org/sharevde/rdfBibframe/Agent/804189$1http://isni.org/isni/0000000081600702 245 10$aComputational Intelligence in Security for Information Systems$h[electronic resource] :$b4th International Conference, CISIS 2011, Held at IWANN 2011, Torremolinos-Ma?laga, Spain, June 8-10, 2011. Proceedings /$cedited by A?lvaro Herrero, Emilio Corchado. 260 $aBerlin, Heidelberg :$bSpringer Berlin Heidelberg,$c2011.$9http://share-vde.org/sharevde/rdfBibframe/Publisher/5 300 $a1 online resource. 490 1 $aLecture Notes in Computer Science,$x0302-9743 ;$v6694 506 $aAccess restricted by licensing agreement. 590 $aAccess is available to the Yale community. 650 0$aComputer science.$0http://id.loc.gov/authorities/subjects/sh89003285 650 0$aComputer Communication Networks. 650 0$aData protection.$0http://id.loc.gov/authorities/subjects/sh85035859 650 0$aComputer software.$0http://id.loc.gov/authorities/subjects/sh85029534 650 0$aInformation storage and retrieval systems.$0http://id.loc.gov/authorities/subjects/sh85066163 650 0$aInformation systems. 700 1 $aCorchado, Emilio.$1http://isni.org/isni/0000000121206364 710 2 $aSpringerLink (Online service)$1http://viaf.org/viaf/148105729 730 0 $aSpringer ebooks. 830 0$aLecture notes in computer science ;$v6694.$1http://share-vde.org/sharevde/rdfBibframe/Work/199003-1$1http://viaf.org/viaf/185480520 856 40$yOnline book$uhttp://dx.doi.org/10.1007/978-3-642-21323-6 946 $aDO NOT EDIT. DO NOT EXPORT. 996 10$aComputational Intelligence in Security for Information Systems$9http://share-vde.org/sharevde/rdfBibframe/Work/12858258-1 997 10$aYALE