LEADER 06120nam 22008655 450 001 9910483250103321 005 20251226202504.0 010 $a1-280-38713-0 010 $a9786613565051 010 $a3-642-13601-X 024 7 $a10.1007/978-3-642-13601-6 035 $a(CKB)2670000000028957 035 $a(SSID)ssj0000446558 035 $a(PQKBManifestationID)11281726 035 $a(PQKBTitleCode)TC0000446558 035 $a(PQKBWorkID)10496994 035 $a(PQKB)11595904 035 $a(DE-He213)978-3-642-13601-6 035 $a(MiAaPQ)EBC3065327 035 $a(PPN)149063857 035 $a(BIP)30904707 035 $a(EXLCZ)992670000000028957 100 $a20100603d2010 u| 0 101 0 $aeng 135 $aurnn#008mamaa 181 $ctxt 182 $cc 183 $acr 200 10$aIntelligence and Security Informatics $ePacific Asia Workshop, PAISI 2010, Hyderabad, India, June 21, 2010 Proceedings /$fedited by Hsinchun Chen, Michael Chau, Shu-Hsing Li, Shalini Urs, Srinath Srinivasa, G. Alan Wang 205 $a1st ed. 2010. 210 1$aBerlin, Heidelberg :$cSpringer Berlin Heidelberg :$cImprint: Springer,$d2010. 215 $a1 online resource (183 p. 50 illus.) 225 1 $aSecurity and Cryptology,$x2946-1863 ;$v6122 300 $aBibliographic Level Mode of Issuance: Monograph 311 08$a3-642-13600-1 320 $aIncludes bibliographical references and index. 327 $aTerrorism Informatics and Crime Analysis -- Combined Detection Model for Criminal Network Detection -- An Association Model for Implicit Crime Link Analysis -- Design and Deployment of a National Detecting Stolen Vehicles Network System -- Fighting Cybercrime: A KM Perspective -- Transportation Infrastructure Security -- Trajectory Similarity of Network Constrained Moving Objects and Applications to Traffic Security -- An Emergent Traffic Messaging Service Using Wireless Technology -- Information Access and Security -- A Model for Detecting ?Global Footprint Anomalies? in a Grid Environment -- Secure Anonymous Routing for MANETs Using Distributed Dynamic Random Path Selection -- MAD-IDS: Novel Intrusion Detection System Using Mobile Agents and Data Mining Approaches -- Data Encryption -- Fuzzy Biometric Signcryption Scheme with Bilinear Pairings in the Standard Model -- Key Independent Decryption of Graphically Encrypted Images -- Towards Confidentiality of ID-Based Signcryption Schemes under without Random Oracle Model -- JPEG Steganalysis Using HBCL Statistics and FR Index -- Data and Text Mining -- Text Mining Technique for Chinese Written Judgment of Criminal Case -- Exploration of Document Relation Quality with Consideration of Term Representation Basis, Term Weighting and Association Measure -- Identifying Controversial Issues and Their Sub-topics in News Articles -- Efficient Privacy Preserving K-Means Clustering -- A Fuzzy Threshold Based Modified Clustering Algorithm for Natural Data Exploration. 330 $aIntelligence and security informatics (ISI) is concerned with the study of the devel- ment and use of advanced information technologies and systems for national, inter- tional, and societal security-related applications. The annual IEEE International Conference series on ISI (http://www. isiconference. org/) was started in 2003. In 2006, the Workshop on ISI (http://isi. se. cuhk. edu. hk/2006/) was held in Singapore in c- junction with the Pacific Asia Conference on Knowledge Discovery and Data Mining (PAKDD 2006), with over 100 contributors and participants from all over the world. This would become the start of a new series of ISI meetings in the Pacific Asia region. PAISI 2007 (http://isi. se. cuhk. edu. hk/2007/) was then held in Chengdu, China. PAISI 2008 (http://isi. se. cuhk. edu. hk/2008/) was held in Taipei, Taiwan, in conjunction with IEEE ISI 2008. PAISI 2009 (http://www. business. hku. hk/paisi/2009/) was held in Bangkok, Thailand, in conjunction with PAKDD 2009. These past ISI conferences and workshops brought together academic researchers, law enforcement and intel- gence experts, information technology consultants and practitioners to discuss their research and practice related to various ISI topics. These topics include ISI data m- agement, data and text mining for ISI applications, terrorism informatics, deception and intent detection, terrorist and criminal social network analysis, public health and bio-security, crime analysis, cyber-infrastructure protection, transportation infrastr- ture security, policy studies and evaluation, information assurance, enterprise risk management, information systems security, among others. 410 0$aSecurity and Cryptology,$x2946-1863 ;$v6122 606 $aCryptography 606 $aData encryption (Computer science) 606 $aComputer networks 606 $aApplication software 606 $aDatabase management 606 $aInformation storage and retrieval systems 606 $aData mining 606 $aCryptology 606 $aComputer Communication Networks 606 $aComputer and Information Systems Applications 606 $aDatabase Management 606 $aInformation Storage and Retrieval 606 $aData Mining and Knowledge Discovery 615 0$aCryptography. 615 0$aData encryption (Computer science). 615 0$aComputer networks. 615 0$aApplication software. 615 0$aDatabase management. 615 0$aInformation storage and retrieval systems. 615 0$aData mining. 615 14$aCryptology. 615 24$aComputer Communication Networks. 615 24$aComputer and Information Systems Applications. 615 24$aDatabase Management. 615 24$aInformation Storage and Retrieval. 615 24$aData Mining and Knowledge Discovery. 676 $a005.82 701 $aChen$b Hsinchun$0875685 712 12$aPAISI 2010 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910483250103321 996 $aIntelligence and security informatics$94184517 997 $aUNINA