LEADER 04245nam 22008535 450 001 996465380303316 005 20230124124312.0 010 $a3-642-30428-1 024 7 $a10.1007/978-3-642-30428-6 035 $a(CKB)3400000000085287 035 $a(SSID)ssj0000697525 035 $a(PQKBManifestationID)11426857 035 $a(PQKBTitleCode)TC0000697525 035 $a(PQKBWorkID)10707664 035 $a(PQKB)10632152 035 $a(DE-He213)978-3-642-30428-6 035 $a(MiAaPQ)EBC3070067 035 $a(PPN)168316730 035 $a(EXLCZ)993400000000085287 100 $a20120523d2012 u| 0 101 0 $aeng 135 $aurnn#008mamaa 181 $ctxt 182 $cc 183 $acr 200 10$aIntelligence and Security Informatics$b[electronic resource] $ePacific Asia Workshop, PAISI 2012, Kuala Lumpur, Malaysia, May 29, 2012, Proceedings /$fedited by Michael Chau, Wei Thoo Yue, G. Alan Wang, Hsinchun Chen 205 $a1st ed. 2012. 210 1$aBerlin, Heidelberg :$cSpringer Berlin Heidelberg :$cImprint: Springer,$d2012. 215 $a1 online resource (X, 207 p. 55 illus.) 225 1 $aSecurity and Cryptology ;$v7299 300 $aInternational conference proceedings. 311 $a3-642-30427-3 320 $aIncludes bibliographical references and author index. 330 $aThis book constitutes the refereed proceedings of the Pacific Asia Workshop on Intelligence and Security Informatics, PAISI 2012, held in Kuala Lumpur, Malaysia, in May 2012 - held in conjunction with the Pacific Asia Conference on Knowledge Discovery and Data Mining (PAKDD 2012). The 8 revised full papers and the 8 revised short papers presented together with 1 keynote lecture were carefully reviewed and selected from numerous submissions. The papers are organized in topical sections on terrorism informatics and crime analysis, social media, intrusion detection, data and text mining, as well as information access and security. 410 0$aSecurity and Cryptology ;$v7299 606 $aApplication software 606 $aData mining 606 $aComputer communication systems 606 $aComputers and civilization 606 $aComputers 606 $aLaw and legislation 606 $aManagement information systems 606 $aComputer science 606 $aInformation Systems Applications (incl. Internet)$3https://scigraph.springernature.com/ontologies/product-market-codes/I18040 606 $aData Mining and Knowledge Discovery$3https://scigraph.springernature.com/ontologies/product-market-codes/I18030 606 $aComputer Communication Networks$3https://scigraph.springernature.com/ontologies/product-market-codes/I13022 606 $aComputers and Society$3https://scigraph.springernature.com/ontologies/product-market-codes/I24040 606 $aLegal Aspects of Computing$3https://scigraph.springernature.com/ontologies/product-market-codes/I24059 606 $aManagement of Computing and Information Systems$3https://scigraph.springernature.com/ontologies/product-market-codes/I24067 608 $aConference proceedings. 615 0$aApplication software. 615 0$aData mining. 615 0$aComputer communication systems. 615 0$aComputers and civilization. 615 0$aComputers. 615 0$aLaw and legislation. 615 0$aManagement information systems. 615 0$aComputer science. 615 14$aInformation Systems Applications (incl. Internet). 615 24$aData Mining and Knowledge Discovery. 615 24$aComputer Communication Networks. 615 24$aComputers and Society. 615 24$aLegal Aspects of Computing. 615 24$aManagement of Computing and Information Systems. 676 $a005.7 702 $aChau$b Michael$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aYue$b Wei Thoo$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aWang$b G. Alan$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aChen$b Hsinchun$4edt$4http://id.loc.gov/vocabulary/relators/edt 712 12$aPAISI (Workshop) 906 $aBOOK 912 $a996465380303316 996 $aIntelligence and Security Informatics$9771944 997 $aUNISA