LEADER 05217nam 22008415 450 001 996466048503316 005 20200702005235.0 010 $a3-319-31863-2 024 7 $a10.1007/978-3-319-31863-9 035 $a(CKB)3710000000627372 035 $a(SSID)ssj0001658853 035 $a(PQKBManifestationID)16441664 035 $a(PQKBTitleCode)TC0001658853 035 $a(PQKBWorkID)14988016 035 $a(PQKB)11368931 035 $a(DE-He213)978-3-319-31863-9 035 $a(MiAaPQ)EBC6300618 035 $a(MiAaPQ)EBC5586403 035 $a(Au-PeEL)EBL5586403 035 $a(OCoLC)945921224 035 $a(PPN)192772066 035 $a(EXLCZ)993710000000627372 100 $a20160328d2016 u| 0 101 0 $aeng 135 $aurnn#008mamaa 181 $ctxt 182 $cc 183 $acr 200 10$aIntelligence and Security Informatics$b[electronic resource] $e11th Pacific Asia Workshop. PAISI 2016, Auckland, New Zealand, April 19, 2016, Proceedings /$fedited by Michael Chau, G. Alan Wang, Hsinchun Chen 205 $a1st ed. 2016. 210 1$aCham :$cSpringer International Publishing :$cImprint: Springer,$d2016. 215 $a1 online resource (XII, 203 p. 52 illus.) 225 1 $aSecurity and Cryptology ;$v9650 300 $aBibliographic Level Mode of Issuance: Monograph 311 $a3-319-31862-4 327 $aThe Use of Reference Graphs in the Entity Resolution of Criminal Networks -- Heterogeneous Information Networks Bi-clustering with Similarity Regularization -- A Profile-Based Authorship Attribution Approach to Forensic Identification in Chinese Online Messages -- Multilevel Syntactic Parsing Based on Recursive Restricted Boltzmann Machines and Learning to Rank -- Stratified Over-sampling Bagging Method for Random Forests on Imbalanced Data -- Revisiting Attribute Independence Assumption in Probabilistic Unsupervised Anomaly Detection -- Incremental Privacy-Preserving Association Rule Mining Using Negative Border -- Differentially Private Multi-task Learning -- Intelligent Recognition of Spontaneous Expression Using Motion Magnification of Spatio-Temporal Data -- Cyber security and Infrastructure Protection k-NN Classification of Malware in HTTPS Traffic Using the Metric Space Approach -- A Syntactic Approach for Detecting Viral Polymorphic Malware Variants -- Small State Acquisition of Offensive Cyber warfare Capabilities: Towards Building an Analytical Framework -- Data-Driven Stealthy Injection Attacks on Smart Grid with Incomplete Measurements -- Information Security in Software Engineering, Analysis of Developers Communications about Security in Social Q&A Website. 330 $aThis book constitutes the refereed proceedings of the 11th Pacific Asia Workshop on Intelligence and Security Informatics, PAISI 2016, held in Auckland, New Zealand, in April 2016 in conjunction with PAKDD 2016, the 20th Pacific-Asia Conference on Knowledge Discovery and Data Mining. The 7 revised full papers presented together with 7 short papers were carefully reviewed and selected from 23 submissions. The papers cover network-based data analytics, data and text mining, and cyber security and infrastructure protection. 410 0$aSecurity and Cryptology ;$v9650 606 $aComputer security 606 $aInformation storage and retrieval 606 $aData mining 606 $aComputers and civilization 606 $aApplication software 606 $aArtificial intelligence 606 $aSystems and Data Security$3https://scigraph.springernature.com/ontologies/product-market-codes/I28060 606 $aInformation Storage and Retrieval$3https://scigraph.springernature.com/ontologies/product-market-codes/I18032 606 $aData Mining and Knowledge Discovery$3https://scigraph.springernature.com/ontologies/product-market-codes/I18030 606 $aComputers and Society$3https://scigraph.springernature.com/ontologies/product-market-codes/I24040 606 $aInformation Systems Applications (incl. Internet)$3https://scigraph.springernature.com/ontologies/product-market-codes/I18040 606 $aArtificial Intelligence$3https://scigraph.springernature.com/ontologies/product-market-codes/I21000 615 0$aComputer security. 615 0$aInformation storage and retrieval. 615 0$aData mining. 615 0$aComputers and civilization. 615 0$aApplication software. 615 0$aArtificial intelligence. 615 14$aSystems and Data Security. 615 24$aInformation Storage and Retrieval. 615 24$aData Mining and Knowledge Discovery. 615 24$aComputers and Society. 615 24$aInformation Systems Applications (incl. Internet). 615 24$aArtificial Intelligence. 676 $a005.8 702 $aChau$b Michael$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aWang$b G. Alan$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aChen$b Hsinchun$4edt$4http://id.loc.gov/vocabulary/relators/edt 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a996466048503316 996 $aIntelligence and Security Informatics$9771944 997 $aUNISA