000 | 04934cam a2200757Ia 4500 | ||
---|---|---|---|
001 | u380431 | ||
003 | SIRSI | ||
005 | 20160812084648.0 | ||
006 | m o d | ||
007 | cr cnu---unuuu | ||
008 | 130218s2013 enk o 001 0 eng d | ||
040 |
_aOPELS _cOPELS _dE7B _dCDX _dNT _dIDEBK _dB24X7 _dCOO _dYDXCP _dUMC _dOCLCF _dUMI _dUPM _dDEBBG _dGGVRL _dDEBSZ _dUIU _dOCLCO |
||
019 |
_a828247149 _a868597681 |
||
020 | _a9780124059023 (electronic bk.) | ||
020 | _a0124059023 (electronic bk.) | ||
020 | _z9780124047020 | ||
020 | _z0124047025 | ||
029 | 1 |
_aAU@ _b000050661738 |
|
029 | 1 |
_aNZ1 _b15026445 |
|
029 | 1 |
_aNZ1 _b15190931 |
|
029 | 1 |
_aNLGGC _b357333551 |
|
029 | 1 |
_aDEBSZ _b404329152 |
|
029 | 1 |
_aDEBSZ _b405346948 |
|
029 | 1 |
_aCHVBK _b303131578 |
|
029 | 1 |
_aH9G _b000605193 |
|
029 | 1 |
_aCHVBK _b302881158 |
|
029 | 1 |
_aCHBIS _b009942846 |
|
050 | 4 |
_aQA76.9.A25 _bI58 2013 |
|
082 | 0 | 4 |
_a005.8 _223 |
049 | _aTEFA | ||
245 | 0 | 0 |
_aIntelligent systems for security informatics _h[recurso electrónico] / _cChristopher C. Yang ... [et al.]. |
260 |
_aOxford ; _aWaltham, MA : _bAcademic Press, _cc2013. |
||
300 | _a1 online resource. | ||
490 | 1 | _aIntelligent systems series | |
520 | _aThe Intelligent Systems Series comprises titles that present state-of-the-art knowledge and the latest advances in intelligent systems. Its scope includes theoretical studies, design methods, and real-world implementations and applications. The most prevalent topics in Intelligence and Security Informatics (ISI) include data management, data and text mining for ISI applications, terrorism informatics, deception and intent detection, terrorist and criminal social network analysis, public health and bio-security, crime analysis, cyber-infrastructure protection, transportation infrastructure security, policy studies and evaluation, and information assurance, among others. This book covers the most active research work in recent years. Pulls together key information on ensuring national security around the worldThe latest research on this subject is concisely presented within the book, with several figures to support the text.Will be of interest to attendees of The Intelligence and Security Informatics conference series, which include IEEE International Conference on Intelligence and Security Informatics (IEEE ISI). | ||
500 | _aIncludes index. | ||
588 | _aDescription based on title from PDF title page; (ScienceDirect; viewed on Feb. 18, 2013). | ||
504 | _aIncludes bibliographical references and index. | ||
505 | 0 | _aChapter 1. Revealing the hidden world of the dark web : social media forums and videos -- chapter 2. Proactive cyber defense -- chapter 3. Privacy-preserving social network integration, analysis, and mining -- chapter 4. A digraph model for risk identification and management in SCADA systems -- chapter 5. High-level architecture and design of a decision engine for marine safety and security -- chapter 6. Criminal identity resolution using personal and social identity attributes : a collective resolution approach -- chapter 7. Al Qaeda terrorist financing -- chapter 8. Study on covert networks of terrorists based on interactive relationship hypothesis -- chapter 9. Incorporating data and methodologies for knowledge discovery for crime. | |
650 | 0 | _aComputer security. | |
650 | 0 |
_aComputer networks _xSecurity measures. |
|
650 | 0 |
_aInformation technology _xSecurity measures. |
|
650 | 7 |
_aCOMPUTERS / Internet / Security _2bisacsh |
|
650 | 7 |
_aCOMPUTERS / Networking / Security _2bisacsh |
|
650 | 7 |
_aCOMPUTERS / Security / General _2bisacsh |
|
650 | 4 |
_aArtificial intelligence _xCongresses. |
|
650 | 4 |
_aComputer networks _xCongresses. |
|
650 | 4 |
_aData mining _xCongresses. |
|
650 | 7 |
_aComputer networks _xSecurity measures. _2fast _0(OCoLC)fst00872341 |
|
650 | 7 |
_aComputer security. _2fast _0(OCoLC)fst00872484 |
|
650 | 7 |
_aInformation technology _xSecurity measures. _2fast _0(OCoLC)fst00973129 |
|
650 | 7 |
_aComputer security. _2local |
|
650 | 7 |
_aArtificial intelligence. _2local |
|
650 | 7 |
_aComputer networks / Security measures. _2local |
|
650 | 7 |
_aInformation technology / Security measures. _2local |
|
655 | 4 | _aElectronic books. | |
655 | 7 |
_aElectronic books. _2local |
|
700 | 1 | _aYang, Christopher C. | |
776 | 0 | 8 |
_iPrint version: _tIntelligent systems for security informatics. _b1st ed. _dAmsterdam ; Boston : Elsevier/Academic Press ; [Hangzhou, China] : Zhejiang University Press, 2013 _z9780124047020 _w(DLC) 2012277621 _w(OCoLC)802322418 |
830 | 0 | _aIntelligent systems series. | |
856 | 4 | 0 |
_zLibro electrónico _3ScienceDirect _uhttp://148.231.10.114:2048/login?url=http://www.sciencedirect.com/science/book/9780124047020 |
596 | _a19 | ||
942 | _cLIBRO_ELEC | ||
999 |
_c207352 _d207352 |