05189nam 22008415 450 99646560930331620200703022819.01-280-38713-097866135650513-642-13601-X10.1007/978-3-642-13601-6(CKB)2670000000028957(SSID)ssj0000446558(PQKBManifestationID)11281726(PQKBTitleCode)TC0000446558(PQKBWorkID)10496994(PQKB)11595904(DE-He213)978-3-642-13601-6(MiAaPQ)EBC3065327(PPN)149063857(EXLCZ)99267000000002895720100603d2010 u| 0engurnn#008mamaatxtccrIntelligence and Security Informatics[electronic resource] Pacific Asia Workshop, PAISI 2010, Hyderabad, India, June 21, 2010 Proceedings /edited by Hsinchun Chen, Michael Chau, Shu-Hsing Li, Shalini Urs, Srinath Srinivasa, G. Alan Wang1st ed. 2010.Berlin, Heidelberg :Springer Berlin Heidelberg :Imprint: Springer,2010.1 online resource (183 p. 50 illus.)Security and Cryptology ;6122Bibliographic Level Mode of Issuance: Monograph3-642-13600-1 Includes bibliographical references and index.Terrorism Informatics and Crime Analysis -- Combined Detection Model for Criminal Network Detection -- An Association Model for Implicit Crime Link Analysis -- Design and Deployment of a National Detecting Stolen Vehicles Network System -- Fighting Cybercrime: A KM Perspective -- Transportation Infrastructure Security -- Trajectory Similarity of Network Constrained Moving Objects and Applications to Traffic Security -- An Emergent Traffic Messaging Service Using Wireless Technology -- Information Access and Security -- A Model for Detecting “Global Footprint Anomalies” in a Grid Environment -- Secure Anonymous Routing for MANETs Using Distributed Dynamic Random Path Selection -- MAD-IDS: Novel Intrusion Detection System Using Mobile Agents and Data Mining Approaches -- Data Encryption -- Fuzzy Biometric Signcryption Scheme with Bilinear Pairings in the Standard Model -- Key Independent Decryption of Graphically Encrypted Images -- Towards Confidentiality of ID-Based Signcryption Schemes under without Random Oracle Model -- JPEG Steganalysis Using HBCL Statistics and FR Index -- Data and Text Mining -- Text Mining Technique for Chinese Written Judgment of Criminal Case -- Exploration of Document Relation Quality with Consideration of Term Representation Basis, Term Weighting and Association Measure -- Identifying Controversial Issues and Their Sub-topics in News Articles -- Efficient Privacy Preserving K-Means Clustering -- A Fuzzy Threshold Based Modified Clustering Algorithm for Natural Data Exploration.Security and Cryptology ;6122Data encryption (Computer science)Computer communication systemsApplication softwareDatabase managementInformation storage and retrievalData miningCryptologyhttps://scigraph.springernature.com/ontologies/product-market-codes/I28020Computer Communication Networkshttps://scigraph.springernature.com/ontologies/product-market-codes/I13022Information Systems Applications (incl. Internet)https://scigraph.springernature.com/ontologies/product-market-codes/I18040Database Managementhttps://scigraph.springernature.com/ontologies/product-market-codes/I18024Information Storage and Retrievalhttps://scigraph.springernature.com/ontologies/product-market-codes/I18032Data Mining and Knowledge Discoveryhttps://scigraph.springernature.com/ontologies/product-market-codes/I18030Data encryption (Computer science).Computer communication systems.Application software.Database management.Information storage and retrieval.Data mining.Cryptology.Computer Communication Networks.Information Systems Applications (incl. Internet).Database Management.Information Storage and Retrieval.Data Mining and Knowledge Discovery.005.82Chen Hsinchunedthttp://id.loc.gov/vocabulary/relators/edtChau Michaeledthttp://id.loc.gov/vocabulary/relators/edtLi Shu-Hsingedthttp://id.loc.gov/vocabulary/relators/edtUrs Shaliniedthttp://id.loc.gov/vocabulary/relators/edtSrinivasa Srinathedthttp://id.loc.gov/vocabulary/relators/edtWang G. Alanedthttp://id.loc.gov/vocabulary/relators/edtPAISI 2010BOOK996465609303316Intelligence and Security Informatics771944UNISA