LEADER 04888nam 22008535 450 001 9910483403003321 005 20200705050857.0 010 $a3-319-18455-5 024 7 $a10.1007/978-3-319-18455-5 035 $a(CKB)3710000000416828 035 $a(SSID)ssj0001501539 035 $a(PQKBManifestationID)11918708 035 $a(PQKBTitleCode)TC0001501539 035 $a(PQKBWorkID)11446799 035 $a(PQKB)11743362 035 $a(DE-He213)978-3-319-18455-5 035 $a(MiAaPQ)EBC6296995 035 $a(MiAaPQ)EBC5587467 035 $a(Au-PeEL)EBL5587467 035 $a(OCoLC)909023729 035 $a(PPN)186029608 035 $a(EXLCZ)993710000000416828 100 $a20150508d2015 u| 0 101 0 $aeng 135 $aurnn#008mamaa 181 $ctxt 182 $cc 183 $acr 200 10$aIntelligence and Security Informatics $ePacific Asia Workshop, PAISI 2015, Ho Chi Minh City, Vietnam, May 19, 2015. Proceedings /$fedited by Michael Chau, G. Alan Wang, Hsinchun Chen 205 $a1st ed. 2015. 210 1$aCham :$cSpringer International Publishing :$cImprint: Springer,$d2015. 215 $a1 online resource (VIII, 113 p. 36 illus.) 225 1 $aSecurity and Cryptology ;$v9074 300 $aBibliographic Level Mode of Issuance: Monograph 311 $a3-319-18454-7 320 $aIncludes bibliographical references and index. 327 $aMedia Revealr: A Social Multimedia Monitoring and Intelligence System for Web Multimedia Verification -- Geotagging Social Media Content with a Refined Language Modelling Approach -- Predicting Vehicle Recalls with User-Generated Contents: A Text Mining Approach -- GCM: A Greedy-based Cross-Matching Algorithm for Identifying Users across Multiple Online Social Networks -- P2P Lending Fraud Detection: A Big Data Approach -- Drug Anti-forgery and Tracing System Based on Lightweight Asymmetric Identities -- Chinese Word POS Tagging with Markov Logic -- In Search of Plagiarism Behaviors: An Empirical Study of Online Reviews. 330 $aThis book constitutes the refereed proceedings of the Pacific Asia Workshop on Intelligence and Security Informatics, PAISI 2015, held in Ho Chi Minh City, Vietnam, in May 2015 in conjunction with PAKDD 2015, the 19th Pacific-Asia Conference on Knowledge Discovery and Data Mining. The 8 revised full papers presented were carefully reviewed and selected from numerous submissions. Topics of the workshop are information sharing and big data analytics, infrastructure protection and emergency responses, cybercrime and terrorism informatics and analytics, as well as enterprise risk management, IS security, and social media analytics. The papers present a significant view on regional data sets and case studies, including online social media and multimedia, fraud deception, and text mining. 410 0$aSecurity and Cryptology ;$v9074 606 $aComputer security 606 $aInformation storage and retrieval 606 $aComputer communication systems 606 $aData mining 606 $aComputers and civilization 606 $aApplication software 606 $aSystems and Data Security$3https://scigraph.springernature.com/ontologies/product-market-codes/I28060 606 $aInformation Storage and Retrieval$3https://scigraph.springernature.com/ontologies/product-market-codes/I18032 606 $aComputer Communication Networks$3https://scigraph.springernature.com/ontologies/product-market-codes/I13022 606 $aData Mining and Knowledge Discovery$3https://scigraph.springernature.com/ontologies/product-market-codes/I18030 606 $aComputers and Society$3https://scigraph.springernature.com/ontologies/product-market-codes/I24040 606 $aInformation Systems Applications (incl. Internet)$3https://scigraph.springernature.com/ontologies/product-market-codes/I18040 615 0$aComputer security. 615 0$aInformation storage and retrieval. 615 0$aComputer communication systems. 615 0$aData mining. 615 0$aComputers and civilization. 615 0$aApplication software. 615 14$aSystems and Data Security. 615 24$aInformation Storage and Retrieval. 615 24$aComputer Communication Networks. 615 24$aData Mining and Knowledge Discovery. 615 24$aComputers and Society. 615 24$aInformation Systems Applications (incl. Internet). 676 $a005.8 702 $aChau$b Michael$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aWang$b G. Alan$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aChen$b Hsinchun$4edt$4http://id.loc.gov/vocabulary/relators/edt 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910483403003321 996 $aIntelligence and Security Informatics$9771944 997 $aUNINA