LEADER 05189nam 22008415 450 001 996465609303316 005 20200703022819.0 010 $a1-280-38713-0 010 $a9786613565051 010 $a3-642-13601-X 024 7 $a10.1007/978-3-642-13601-6 035 $a(CKB)2670000000028957 035 $a(SSID)ssj0000446558 035 $a(PQKBManifestationID)11281726 035 $a(PQKBTitleCode)TC0000446558 035 $a(PQKBWorkID)10496994 035 $a(PQKB)11595904 035 $a(DE-He213)978-3-642-13601-6 035 $a(MiAaPQ)EBC3065327 035 $a(PPN)149063857 035 $a(EXLCZ)992670000000028957 100 $a20100603d2010 u| 0 101 0 $aeng 135 $aurnn#008mamaa 181 $ctxt 182 $cc 183 $acr 200 10$aIntelligence and Security Informatics$b[electronic resource] $ePacific Asia Workshop, PAISI 2010, Hyderabad, India, June 21, 2010 Proceedings /$fedited by Hsinchun Chen, Michael Chau, Shu-Hsing Li, Shalini Urs, Srinath Srinivasa, G. Alan Wang 205 $a1st ed. 2010. 210 1$aBerlin, Heidelberg :$cSpringer Berlin Heidelberg :$cImprint: Springer,$d2010. 215 $a1 online resource (183 p. 50 illus.) 225 1 $aSecurity and Cryptology ;$v6122 300 $aBibliographic Level Mode of Issuance: Monograph 311 $a3-642-13600-1 320 $aIncludes bibliographical references and index. 327 $aTerrorism Informatics and Crime Analysis -- Combined Detection Model for Criminal Network Detection -- An Association Model for Implicit Crime Link Analysis -- Design and Deployment of a National Detecting Stolen Vehicles Network System -- Fighting Cybercrime: A KM Perspective -- Transportation Infrastructure Security -- Trajectory Similarity of Network Constrained Moving Objects and Applications to Traffic Security -- An Emergent Traffic Messaging Service Using Wireless Technology -- Information Access and Security -- A Model for Detecting ?Global Footprint Anomalies? in a Grid Environment -- Secure Anonymous Routing for MANETs Using Distributed Dynamic Random Path Selection -- MAD-IDS: Novel Intrusion Detection System Using Mobile Agents and Data Mining Approaches -- Data Encryption -- Fuzzy Biometric Signcryption Scheme with Bilinear Pairings in the Standard Model -- Key Independent Decryption of Graphically Encrypted Images -- Towards Confidentiality of ID-Based Signcryption Schemes under without Random Oracle Model -- JPEG Steganalysis Using HBCL Statistics and FR Index -- Data and Text Mining -- Text Mining Technique for Chinese Written Judgment of Criminal Case -- Exploration of Document Relation Quality with Consideration of Term Representation Basis, Term Weighting and Association Measure -- Identifying Controversial Issues and Their Sub-topics in News Articles -- Efficient Privacy Preserving K-Means Clustering -- A Fuzzy Threshold Based Modified Clustering Algorithm for Natural Data Exploration. 410 0$aSecurity and Cryptology ;$v6122 606 $aData encryption (Computer science) 606 $aComputer communication systems 606 $aApplication software 606 $aDatabase management 606 $aInformation storage and retrieval 606 $aData mining 606 $aCryptology$3https://scigraph.springernature.com/ontologies/product-market-codes/I28020 606 $aComputer Communication Networks$3https://scigraph.springernature.com/ontologies/product-market-codes/I13022 606 $aInformation Systems Applications (incl. Internet)$3https://scigraph.springernature.com/ontologies/product-market-codes/I18040 606 $aDatabase Management$3https://scigraph.springernature.com/ontologies/product-market-codes/I18024 606 $aInformation Storage and Retrieval$3https://scigraph.springernature.com/ontologies/product-market-codes/I18032 606 $aData Mining and Knowledge Discovery$3https://scigraph.springernature.com/ontologies/product-market-codes/I18030 615 0$aData encryption (Computer science). 615 0$aComputer communication systems. 615 0$aApplication software. 615 0$aDatabase management. 615 0$aInformation storage and retrieval. 615 0$aData mining. 615 14$aCryptology. 615 24$aComputer Communication Networks. 615 24$aInformation Systems Applications (incl. Internet). 615 24$aDatabase Management. 615 24$aInformation Storage and Retrieval. 615 24$aData Mining and Knowledge Discovery. 676 $a005.82 702 $aChen$b Hsinchun$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aChau$b Michael$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aLi$b Shu-Hsing$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aUrs$b Shalini$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aSrinivasa$b Srinath$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aWang$b G. Alan$4edt$4http://id.loc.gov/vocabulary/relators/edt 712 12$aPAISI 2010 906 $aBOOK 912 $a996465609303316 996 $aIntelligence and Security Informatics$9771944 997 $aUNISA