top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Intelligence and Security Informatics [[electronic resource] ] : 12th Pacific Asia Workshop, PAISI 2017, Jeju Island, South Korea, May 23, 2017, Proceedings / / edited by G. Alan Wang, Michael Chau, Hsinchun Chen
Intelligence and Security Informatics [[electronic resource] ] : 12th Pacific Asia Workshop, PAISI 2017, Jeju Island, South Korea, May 23, 2017, Proceedings / / edited by G. Alan Wang, Michael Chau, Hsinchun Chen
Edizione [1st ed. 2017.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017
Descrizione fisica 1 online resource (VII, 151 p. 55 illus.)
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Computer security
Computers and civilization
Computers
Law and legislation
Computer communication systems
Application software
Artificial intelligence
Systems and Data Security
Computers and Society
Legal Aspects of Computing
Computer Communication Networks
Information Systems Applications (incl. Internet)
Artificial Intelligence
ISBN 3-319-57463-9
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNISA-996466233503316
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Intelligence and Security Informatics : 12th Pacific Asia Workshop, PAISI 2017, Jeju Island, South Korea, May 23, 2017, Proceedings / / edited by G. Alan Wang, Michael Chau, Hsinchun Chen
Intelligence and Security Informatics : 12th Pacific Asia Workshop, PAISI 2017, Jeju Island, South Korea, May 23, 2017, Proceedings / / edited by G. Alan Wang, Michael Chau, Hsinchun Chen
Edizione [1st ed. 2017.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017
Descrizione fisica 1 online resource (VII, 151 p. 55 illus.)
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Computer security
Computers and civilization
Computers
Law and legislation
Computer communication systems
Application software
Artificial intelligence
Systems and Data Security
Computers and Society
Legal Aspects of Computing
Computer Communication Networks
Information Systems Applications (incl. Internet)
Artificial Intelligence
ISBN 3-319-57463-9
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910484297403321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Intelligence and Security Informatics [[electronic resource] ] : Pacific Asia Workshop, PAISI 2012, Kuala Lumpur, Malaysia, May 29, 2012, Proceedings / / edited by Michael Chau, Wei Thoo Yue, G. Alan Wang, Hsinchun Chen
Intelligence and Security Informatics [[electronic resource] ] : Pacific Asia Workshop, PAISI 2012, Kuala Lumpur, Malaysia, May 29, 2012, Proceedings / / edited by Michael Chau, Wei Thoo Yue, G. Alan Wang, Hsinchun Chen
Edizione [1st ed. 2012.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2012
Descrizione fisica 1 online resource (X, 207 p. 55 illus.)
Disciplina 005.7
Collana Security and Cryptology
Soggetto topico Application software
Data mining
Computer communication systems
Computers and civilization
Computers
Law and legislation
Management information systems
Computer science
Information Systems Applications (incl. Internet)
Data Mining and Knowledge Discovery
Computer Communication Networks
Computers and Society
Legal Aspects of Computing
Management of Computing and Information Systems
Soggetto genere / forma Conference proceedings.
ISBN 3-642-30428-1
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNISA-996465380303316
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2012
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Intelligence and Security Informatics [[electronic resource] ] : Pacific Asia Workshop, PAISI 2011, Beijing, China, July 9, 2011. Proceedings / / edited by Michael Chau, G. Alan Wang, Xiaolong Zheng, Hsinchun Chen, Daniel Zeng, Wenji Mao
Intelligence and Security Informatics [[electronic resource] ] : Pacific Asia Workshop, PAISI 2011, Beijing, China, July 9, 2011. Proceedings / / edited by Michael Chau, G. Alan Wang, Xiaolong Zheng, Hsinchun Chen, Daniel Zeng, Wenji Mao
Edizione [1st ed. 2011.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2011
Descrizione fisica 1 online resource (X, 133 p. 50 illus., 41 illus. in color.)
Disciplina 005.7
Collana Security and Cryptology
Soggetto topico Application software
Data mining
Computer communication systems
Computers and civilization
Computers
Law and legislation
Management information systems
Computer science
Information Systems Applications (incl. Internet)
Data Mining and Knowledge Discovery
Computer Communication Networks
Computers and Society
Legal Aspects of Computing
Management of Computing and Information Systems
ISBN 3-642-22039-8
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNISA-996465558603316
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2011
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Intelligence and Security Informatics [[electronic resource] ] : Pacific Asia Workshop, PAISI 2009, Bangkok, Thailand, April 27, 2009. Proceedings / / edited by Hsinchun Chen, Christopher C. Yang, Michael Chau, Shu-Hsing Li
Intelligence and Security Informatics [[electronic resource] ] : Pacific Asia Workshop, PAISI 2009, Bangkok, Thailand, April 27, 2009. Proceedings / / edited by Hsinchun Chen, Christopher C. Yang, Michael Chau, Shu-Hsing Li
Edizione [1st ed. 2009.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2009
Descrizione fisica 1 online resource (X, 169 p.)
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Computer security
Application software
Data mining
Computer communication systems
Computers and civilization
Computers
Law and legislation
Systems and Data Security
Information Systems Applications (incl. Internet)
Data Mining and Knowledge Discovery
Computer Communication Networks
Computers and Society
Legal Aspects of Computing
Soggetto genere / forma Bangkok (2009)
Kongress.
ISBN 3-642-01393-7
Classificazione DAT 055f
DAT 461f
DAT 465f
DAT 614f
SS 4800
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Keynote -- Building a Geosocial Semantic Web for Military Stabilization and Reconstruction Operations -- Terrorism Informatics and Crime Analysis -- Criminal Cross Correlation Mining and Visualization -- A Cybercrime Forensic Method for Chinese Web Information Authorship Analysis -- Prediction of Unsolved Terrorist Attacks Using Group Detection Algorithms -- Enterprise Risk Management -- Exploring Fraudulent Financial Reporting with GHSOM -- Identifying Firm-Specific Risk Statements in News Articles -- Predicting Future Earnings Change Using Numeric and Textual Information in Financial Reports -- Emergency Response and Surveillance -- When Generalized Voronoi Diagrams Meet GeoWeb for Emergency Management -- E3TP: A Novel Trajectory Prediction Algorithm in Moving Objects Databases -- Information Access and Security -- A User-Centered Framework for Adaptive Fingerprint Identification -- Design of a Passport Anti-forgery System Based on Digital Signature Schemes -- A Chronological Evaluation of Unknown Malcode Detection -- Data and Text Mining -- Relation Discovery from Thai News Articles Using Association Rule Mining -- Discovering Compatible Top-K Theme Patterns from Text Based on Users’ Preferences -- Juicer: Scalable Extraction for Thread Meta-information of Web Forum -- A Feature-Based Approach for Relation Extraction from Thai News Documents -- An Incremental-Learning Method for Supervised Anomaly Detection by Cascading Service Classifier and ITI Decision Tree Methods -- Quantifying News Reports to Proxy “Other Information” in ERC Models.
Record Nr. UNISA-996466022503316
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2009
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Intelligence and Security Informatics : Pacific Asia Workshop, PAISI 2009, Bangkok, Thailand, April 27, 2009. Proceedings / / edited by Hsinchun Chen, Christopher C. Yang, Michael Chau, Shu-Hsing Li
Intelligence and Security Informatics : Pacific Asia Workshop, PAISI 2009, Bangkok, Thailand, April 27, 2009. Proceedings / / edited by Hsinchun Chen, Christopher C. Yang, Michael Chau, Shu-Hsing Li
Edizione [1st ed. 2009.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2009
Descrizione fisica 1 online resource (X, 169 p.)
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Computer security
Application software
Data mining
Computer communication systems
Computers and civilization
Computers
Law and legislation
Systems and Data Security
Information Systems Applications (incl. Internet)
Data Mining and Knowledge Discovery
Computer Communication Networks
Computers and Society
Legal Aspects of Computing
Soggetto genere / forma Bangkok (2009)
Kongress.
ISBN 3-642-01393-7
Classificazione DAT 055f
DAT 461f
DAT 465f
DAT 614f
SS 4800
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Keynote -- Building a Geosocial Semantic Web for Military Stabilization and Reconstruction Operations -- Terrorism Informatics and Crime Analysis -- Criminal Cross Correlation Mining and Visualization -- A Cybercrime Forensic Method for Chinese Web Information Authorship Analysis -- Prediction of Unsolved Terrorist Attacks Using Group Detection Algorithms -- Enterprise Risk Management -- Exploring Fraudulent Financial Reporting with GHSOM -- Identifying Firm-Specific Risk Statements in News Articles -- Predicting Future Earnings Change Using Numeric and Textual Information in Financial Reports -- Emergency Response and Surveillance -- When Generalized Voronoi Diagrams Meet GeoWeb for Emergency Management -- E3TP: A Novel Trajectory Prediction Algorithm in Moving Objects Databases -- Information Access and Security -- A User-Centered Framework for Adaptive Fingerprint Identification -- Design of a Passport Anti-forgery System Based on Digital Signature Schemes -- A Chronological Evaluation of Unknown Malcode Detection -- Data and Text Mining -- Relation Discovery from Thai News Articles Using Association Rule Mining -- Discovering Compatible Top-K Theme Patterns from Text Based on Users’ Preferences -- Juicer: Scalable Extraction for Thread Meta-information of Web Forum -- A Feature-Based Approach for Relation Extraction from Thai News Documents -- An Incremental-Learning Method for Supervised Anomaly Detection by Cascading Service Classifier and ITI Decision Tree Methods -- Quantifying News Reports to Proxy “Other Information” in ERC Models.
Record Nr. UNINA-9910484062903321
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2009
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Intelligence and Security Informatics [[electronic resource] ] : International Workshop, WISI 2006, Singapore, April 9, 2006, Proceedings / / edited by Hsinchun Chen, Feiyue Wang, Christopher C. Yang, Daniel Zeng, Michael Chau, Kuiyu Chang
Intelligence and Security Informatics [[electronic resource] ] : International Workshop, WISI 2006, Singapore, April 9, 2006, Proceedings / / edited by Hsinchun Chen, Feiyue Wang, Christopher C. Yang, Daniel Zeng, Michael Chau, Kuiyu Chang
Edizione [1st ed. 2006.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2006
Descrizione fisica 1 online resource (XII, 188 p.)
Disciplina 005.7
Collana Information Systems and Applications, incl. Internet/Web, and HCI
Soggetto topico Application software
Information storage and retrieval
Computer communication systems
Computers and civilization
Computers
Law and legislation
Management information systems
Computer science
Information Systems Applications (incl. Internet)
Information Storage and Retrieval
Computer Communication Networks
Computers and Society
Legal Aspects of Computing
Management of Computing and Information Systems
ISBN 3-540-33362-2
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Keynote Speech -- Data Mining for Security Applications -- Web and Text Mining for Terrorism Informatics -- Unraveling International Terrorist Groups’ Exploitation of the Web: Technical Sophistication, Media Richness, and Web Interactivity -- Multi-lingual Detection of Terrorist Content on the Web -- INEXT: An Investigative Search Tool for Knowledge Extraction -- Cybercrime Analysis -- Cybercrime in Taiwan – An Analysis of Suspect Records -- Analysis of Computer Crime Characteristics in Taiwan -- A Cross Datasets Referring Outlier Detection Model Applied to Suspicious Financial Transaction Discrimination -- Network Security -- Detecting Novel Network Attacks with a Data Field -- Improving Authentication Accuracy of Unfamiliar Passwords with Pauses and Cues for Keystroke Dynamics-Based Authentication -- Illegal Intrusion Detection Based on Hidden Information Database -- Defender Personality Traits -- Crime Data Mining -- Mining Criminal Databases to Finding Investigation Clues—By Example of Stolen Automobiles Database -- Country Corruption Analysis with Self Organizing Maps and Support Vector Machines -- Temporal Representation in Spike Detection of Sparse Personal Identity Streams -- Mining Positive Associations of Urban Criminal Activities Using Hierarchical Crime Hot Spots -- VCCM Mining: Mining Virtual Community Core Members Based on Gene Expression Programming -- Posters -- Integration of a Cryptographic File System and Access Control -- Applications of Homomorphic Functions to Software Obfuscation -- Security Model for Informational Privacy -- A Viable System for Tracing Illegal Users of Video -- Privacy and Security Enhanced Offline Oblivious Transfer for Massive Data Distribution -- The Effectiveness of Artificial Rhythms and Cues in Keystroke Dynamics Based User Authentication -- Cascade Damage Estimation Model for Internet Attacks -- A New Secure Key Exchange Protocol Between STB and Smart Card in DTV Broadcasting -- A Fuzzy Anomaly Detection System -- Hidden Markov Model Based Intrusion Detection -- One-Class Strategies for Security Information Detection -- Design of an Emergency Prediction and Prevention Platform for Societal Security Decision Support Using Neural Networks -- A Novel Identity Authentication Technique Without Trustworthy Third-Party Based on Fingerprint Verification -- Cyberspace Community Analysis and Simulation Using Complex Dynamic Social Networks -- Analysis of Infectious Disease Data Based on Evolutionary Computation -- Rule+Exception Learning-Based Class Specification and Labeling in Intelligence and Security Analysis -- A Computational Framework for Decision Analysis and Support in ISI: Artificial Societies, Computational Experiments, and Parallel Systems.
Record Nr. UNISA-996466125803316
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2006
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Intelligence and Security Informatics [[electronic resource] ] : IEEE International Conference on Intelligence and Security Informatics, ISI 2006, San Diego, CA, USA, May 23-24, 2006. / / edited by Sharad Mehrotra, Daniel D. Zeng, Hsinchun Chen
Intelligence and Security Informatics [[electronic resource] ] : IEEE International Conference on Intelligence and Security Informatics, ISI 2006, San Diego, CA, USA, May 23-24, 2006. / / edited by Sharad Mehrotra, Daniel D. Zeng, Hsinchun Chen
Edizione [1st ed. 2006.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2006
Descrizione fisica 1 online resource (XXII, 778 p.)
Disciplina 005.74
Collana Information Systems and Applications, incl. Internet/Web, and HCI
Soggetto topico Data encryption (Computer science)
Application software
Information storage and retrieval
Computer communication systems
Computers and civilization
Computers
Law and legislation
Cryptology
Information Systems Applications (incl. Internet)
Information Storage and Retrieval
Computer Communication Networks
Computers and Society
Legal Aspects of Computing
ISBN 3-540-34479-9
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Long Papers -- Short Papers -- Extended Abstracts for Posters and Demos.
Record Nr. UNISA-996465916103316
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2006
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Intelligence and Security Informatics [[electronic resource] ] : International Workshop, WISI 2006, Singapore, April 9, 2006, Proceedings / / edited by Hsinchun Chen, Feiyue Wang, Christopher C. Yang, Daniel Zeng, Michael Chau, Kuiyu Chang
Intelligence and Security Informatics [[electronic resource] ] : International Workshop, WISI 2006, Singapore, April 9, 2006, Proceedings / / edited by Hsinchun Chen, Feiyue Wang, Christopher C. Yang, Daniel Zeng, Michael Chau, Kuiyu Chang
Edizione [1st ed. 2006.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2006
Descrizione fisica 1 online resource (XII, 188 p.)
Disciplina 005.7
Collana Information Systems and Applications, incl. Internet/Web, and HCI
Soggetto topico Application software
Information storage and retrieval
Computer communication systems
Computers and civilization
Computers
Law and legislation
Management information systems
Computer science
Information Systems Applications (incl. Internet)
Information Storage and Retrieval
Computer Communication Networks
Computers and Society
Legal Aspects of Computing
Management of Computing and Information Systems
ISBN 3-540-33362-2
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Keynote Speech -- Data Mining for Security Applications -- Web and Text Mining for Terrorism Informatics -- Unraveling International Terrorist Groups’ Exploitation of the Web: Technical Sophistication, Media Richness, and Web Interactivity -- Multi-lingual Detection of Terrorist Content on the Web -- INEXT: An Investigative Search Tool for Knowledge Extraction -- Cybercrime Analysis -- Cybercrime in Taiwan – An Analysis of Suspect Records -- Analysis of Computer Crime Characteristics in Taiwan -- A Cross Datasets Referring Outlier Detection Model Applied to Suspicious Financial Transaction Discrimination -- Network Security -- Detecting Novel Network Attacks with a Data Field -- Improving Authentication Accuracy of Unfamiliar Passwords with Pauses and Cues for Keystroke Dynamics-Based Authentication -- Illegal Intrusion Detection Based on Hidden Information Database -- Defender Personality Traits -- Crime Data Mining -- Mining Criminal Databases to Finding Investigation Clues—By Example of Stolen Automobiles Database -- Country Corruption Analysis with Self Organizing Maps and Support Vector Machines -- Temporal Representation in Spike Detection of Sparse Personal Identity Streams -- Mining Positive Associations of Urban Criminal Activities Using Hierarchical Crime Hot Spots -- VCCM Mining: Mining Virtual Community Core Members Based on Gene Expression Programming -- Posters -- Integration of a Cryptographic File System and Access Control -- Applications of Homomorphic Functions to Software Obfuscation -- Security Model for Informational Privacy -- A Viable System for Tracing Illegal Users of Video -- Privacy and Security Enhanced Offline Oblivious Transfer for Massive Data Distribution -- The Effectiveness of Artificial Rhythms and Cues in Keystroke Dynamics Based User Authentication -- Cascade Damage Estimation Model for Internet Attacks -- A New Secure Key Exchange Protocol Between STB and Smart Card in DTV Broadcasting -- A Fuzzy Anomaly Detection System -- Hidden Markov Model Based Intrusion Detection -- One-Class Strategies for Security Information Detection -- Design of an Emergency Prediction and Prevention Platform for Societal Security Decision Support Using Neural Networks -- A Novel Identity Authentication Technique Without Trustworthy Third-Party Based on Fingerprint Verification -- Cyberspace Community Analysis and Simulation Using Complex Dynamic Social Networks -- Analysis of Infectious Disease Data Based on Evolutionary Computation -- Rule+Exception Learning-Based Class Specification and Labeling in Intelligence and Security Analysis -- A Computational Framework for Decision Analysis and Support in ISI: Artificial Societies, Computational Experiments, and Parallel Systems.
Record Nr. UNINA-9910484531703321
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2006
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Intelligence and Security Informatics : IEEE International Conference on Intelligence and Security Informatics, ISI 2006, San Diego, CA, USA, May 23-24, 2006. / / edited by Sharad Mehrotra, Daniel D. Zeng, Hsinchun Chen
Intelligence and Security Informatics : IEEE International Conference on Intelligence and Security Informatics, ISI 2006, San Diego, CA, USA, May 23-24, 2006. / / edited by Sharad Mehrotra, Daniel D. Zeng, Hsinchun Chen
Edizione [1st ed. 2006.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2006
Descrizione fisica 1 online resource (XXII, 778 p.)
Disciplina 005.74
Collana Information Systems and Applications, incl. Internet/Web, and HCI
Soggetto topico Data encryption (Computer science)
Application software
Information storage and retrieval
Computer communication systems
Computers and civilization
Computers
Law and legislation
Cryptology
Information Systems Applications (incl. Internet)
Information Storage and Retrieval
Computer Communication Networks
Computers and Society
Legal Aspects of Computing
ISBN 3-540-34479-9
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Long Papers -- Short Papers -- Extended Abstracts for Posters and Demos.
Record Nr. UNINA-9910484721003321
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2006
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui