000 05468nam a22006015i 4500
001 u374536
003 SIRSI
005 20160812084239.0
007 cr nn 008mamaa
008 100603s2010 gw | s |||| 0|eng d
020 _a9783642136016
_9978-3-642-13601-6
040 _cMX-MeUAM
050 4 _aQA76.9.A25
082 0 4 _a005.82
_223
100 1 _aChen, Hsinchun.
_eeditor.
245 1 0 _aIntelligence and Security Informatics
_h[recurso electrónico] :
_bPacific Asia Workshop, PAISI 2010, Hyderabad, India, June 21, 2010. Proceedings /
_cedited by Hsinchun Chen, Michael Chau, Shu-hsing Li, Shalini Urs, Srinath Srinivasa, G. Alan Wang.
264 1 _aBerlin, Heidelberg :
_bSpringer Berlin Heidelberg,
_c2010.
300 _a183p. 50 illus.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
490 1 _aLecture Notes in Computer Science,
_x0302-9743 ;
_v6122
505 0 _aTerrorism Informatics and Crime Analysis -- Combined Detection Model for Criminal Network Detection -- An Association Model for Implicit Crime Link Analysis -- Design and Deployment of a National Detecting Stolen Vehicles Network System -- Fighting Cybercrime: A KM Perspective -- Transportation Infrastructure Security -- Trajectory Similarity of Network Constrained Moving Objects and Applications to Traffic Security -- An Emergent Traffic Messaging Service Using Wireless Technology -- Information Access and Security -- A Model for Detecting “Global Footprint Anomalies” in a Grid Environment -- Secure Anonymous Routing for MANETs Using Distributed Dynamic Random Path Selection -- MAD-IDS: Novel Intrusion Detection System Using Mobile Agents and Data Mining Approaches -- Data Encryption -- Fuzzy Biometric Signcryption Scheme with Bilinear Pairings in the Standard Model -- Key Independent Decryption of Graphically Encrypted Images -- Towards Confidentiality of ID-Based Signcryption Schemes under without Random Oracle Model -- JPEG Steganalysis Using HBCL Statistics and FR Index -- Data and Text Mining -- Text Mining Technique for Chinese Written Judgment of Criminal Case -- Exploration of Document Relation Quality with Consideration of Term Representation Basis, Term Weighting and Association Measure -- Identifying Controversial Issues and Their Sub-topics in News Articles -- Efficient Privacy Preserving K-Means Clustering -- A Fuzzy Threshold Based Modified Clustering Algorithm for Natural Data Exploration.
520 _aIntelligence and security informatics (ISI) is concerned with the study of the devel- ment and use of advanced information technologies and systems for national, inter- tional, and societal security-related applications. The annual IEEE International Conference series on ISI (http://www. isiconference. org/) was started in 2003. In 2006, the Workshop on ISI (http://isi. se. cuhk. edu. hk/2006/) was held in Singapore in c- junction with the Pacific Asia Conference on Knowledge Discovery and Data Mining (PAKDD 2006), with over 100 contributors and participants from all over the world. This would become the start of a new series of ISI meetings in the Pacific Asia region. PAISI 2007 (http://isi. se. cuhk. edu. hk/2007/) was then held in Chengdu, China. PAISI 2008 (http://isi. se. cuhk. edu. hk/2008/) was held in Taipei, Taiwan, in conjunction with IEEE ISI 2008. PAISI 2009 (http://www. business. hku. hk/paisi/2009/) was held in Bangkok, Thailand, in conjunction with PAKDD 2009. These past ISI conferences and workshops brought together academic researchers, law enforcement and intel- gence experts, information technology consultants and practitioners to discuss their research and practice related to various ISI topics. These topics include ISI data m- agement, data and text mining for ISI applications, terrorism informatics, deception and intent detection, terrorist and criminal social network analysis, public health and bio-security, crime analysis, cyber-infrastructure protection, transportation infrastr- ture security, policy studies and evaluation, information assurance, enterprise risk management, information systems security, among others.
650 0 _aComputer science.
650 0 _aComputer Communication Networks.
650 0 _aData encryption (Computer science).
650 0 _aDatabase management.
650 0 _aData mining.
650 0 _aInformation storage and retrieval systems.
650 0 _aInformation systems.
650 1 4 _aComputer Science.
650 2 4 _aData Encryption.
650 2 4 _aInformation Systems Applications (incl.Internet).
650 2 4 _aDatabase Management.
650 2 4 _aInformation Storage and Retrieval.
650 2 4 _aData Mining and Knowledge Discovery.
650 2 4 _aComputer Communication Networks.
700 1 _aChau, Michael.
_eeditor.
700 1 _aLi, Shu-hsing.
_eeditor.
700 1 _aUrs, Shalini.
_eeditor.
700 1 _aSrinivasa, Srinath.
_eeditor.
700 1 _aWang, G. Alan.
_eeditor.
710 2 _aSpringerLink (Online service)
773 0 _tSpringer eBooks
776 0 8 _iPrinted edition:
_z9783642136009
830 0 _aLecture Notes in Computer Science,
_x0302-9743 ;
_v6122
856 4 0 _zLibro electrónico
_uhttp://148.231.10.114:2048/login?url=http://link.springer.com/book/10.1007/978-3-642-13601-6
596 _a19
942 _cLIBRO_ELEC
999 _c202416
_d202416