Vai al contenuto principale della pagina
Titolo: | Intelligence and Security Informatics [[electronic resource] ] : Pacific Asia Workshop, PAISI 2010, Hyderabad, India, June 21, 2010 Proceedings / / edited by Hsinchun Chen, Michael Chau, Shu-Hsing Li, Shalini Urs, Srinath Srinivasa, G. Alan Wang |
Pubblicazione: | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2010 |
Edizione: | 1st ed. 2010. |
Descrizione fisica: | 1 online resource (183 p. 50 illus.) |
Disciplina: | 005.82 |
Soggetto topico: | Data encryption (Computer science) |
Computer communication systems | |
Application software | |
Database management | |
Information storage and retrieval | |
Data mining | |
Cryptology | |
Computer Communication Networks | |
Information Systems Applications (incl. Internet) | |
Database Management | |
Information Storage and Retrieval | |
Data Mining and Knowledge Discovery | |
Persona (resp. second.): | ChenHsinchun |
ChauMichael | |
LiShu-Hsing | |
UrsShalini | |
SrinivasaSrinath | |
WangG. Alan | |
Note generali: | Bibliographic Level Mode of Issuance: Monograph |
Nota di bibliografia: | Includes bibliographical references and index. |
Nota di contenuto: | Terrorism Informatics and Crime Analysis -- Combined Detection Model for Criminal Network Detection -- An Association Model for Implicit Crime Link Analysis -- Design and Deployment of a National Detecting Stolen Vehicles Network System -- Fighting Cybercrime: A KM Perspective -- Transportation Infrastructure Security -- Trajectory Similarity of Network Constrained Moving Objects and Applications to Traffic Security -- An Emergent Traffic Messaging Service Using Wireless Technology -- Information Access and Security -- A Model for Detecting “Global Footprint Anomalies” in a Grid Environment -- Secure Anonymous Routing for MANETs Using Distributed Dynamic Random Path Selection -- MAD-IDS: Novel Intrusion Detection System Using Mobile Agents and Data Mining Approaches -- Data Encryption -- Fuzzy Biometric Signcryption Scheme with Bilinear Pairings in the Standard Model -- Key Independent Decryption of Graphically Encrypted Images -- Towards Confidentiality of ID-Based Signcryption Schemes under without Random Oracle Model -- JPEG Steganalysis Using HBCL Statistics and FR Index -- Data and Text Mining -- Text Mining Technique for Chinese Written Judgment of Criminal Case -- Exploration of Document Relation Quality with Consideration of Term Representation Basis, Term Weighting and Association Measure -- Identifying Controversial Issues and Their Sub-topics in News Articles -- Efficient Privacy Preserving K-Means Clustering -- A Fuzzy Threshold Based Modified Clustering Algorithm for Natural Data Exploration. |
Titolo autorizzato: | Intelligence and Security Informatics |
ISBN: | 1-280-38713-0 |
9786613565051 | |
3-642-13601-X | |
Formato: | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione: | Inglese |
Record Nr.: | 996465609303316 |
Lo trovi qui: | Univ. di Salerno |
Opac: | Controlla la disponibilità qui |