top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Intelligence and Security Informatics [[electronic resource] ] : Pacific Asia Workshop, PAISI 2010, Hyderabad, India, June 21, 2010 Proceedings / / edited by Hsinchun Chen, Michael Chau, Shu-Hsing Li, Shalini Urs, Srinath Srinivasa, G. Alan Wang
Intelligence and Security Informatics [[electronic resource] ] : Pacific Asia Workshop, PAISI 2010, Hyderabad, India, June 21, 2010 Proceedings / / edited by Hsinchun Chen, Michael Chau, Shu-Hsing Li, Shalini Urs, Srinath Srinivasa, G. Alan Wang
Edizione [1st ed. 2010.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2010
Descrizione fisica 1 online resource (183 p. 50 illus.)
Disciplina 005.82
Collana Security and Cryptology
Soggetto topico Data encryption (Computer science)
Computer communication systems
Application software
Database management
Information storage and retrieval
Data mining
Cryptology
Computer Communication Networks
Information Systems Applications (incl. Internet)
Database Management
Information Storage and Retrieval
Data Mining and Knowledge Discovery
ISBN 1-280-38713-0
9786613565051
3-642-13601-X
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Terrorism Informatics and Crime Analysis -- Combined Detection Model for Criminal Network Detection -- An Association Model for Implicit Crime Link Analysis -- Design and Deployment of a National Detecting Stolen Vehicles Network System -- Fighting Cybercrime: A KM Perspective -- Transportation Infrastructure Security -- Trajectory Similarity of Network Constrained Moving Objects and Applications to Traffic Security -- An Emergent Traffic Messaging Service Using Wireless Technology -- Information Access and Security -- A Model for Detecting “Global Footprint Anomalies” in a Grid Environment -- Secure Anonymous Routing for MANETs Using Distributed Dynamic Random Path Selection -- MAD-IDS: Novel Intrusion Detection System Using Mobile Agents and Data Mining Approaches -- Data Encryption -- Fuzzy Biometric Signcryption Scheme with Bilinear Pairings in the Standard Model -- Key Independent Decryption of Graphically Encrypted Images -- Towards Confidentiality of ID-Based Signcryption Schemes under without Random Oracle Model -- JPEG Steganalysis Using HBCL Statistics and FR Index -- Data and Text Mining -- Text Mining Technique for Chinese Written Judgment of Criminal Case -- Exploration of Document Relation Quality with Consideration of Term Representation Basis, Term Weighting and Association Measure -- Identifying Controversial Issues and Their Sub-topics in News Articles -- Efficient Privacy Preserving K-Means Clustering -- A Fuzzy Threshold Based Modified Clustering Algorithm for Natural Data Exploration.
Record Nr. UNISA-996465609303316
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2010
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Intelligence and Security Informatics [[electronic resource] ] : Pacific Asia Workshop, PAISI 2010, Hyderabad, India, June 21, 2010 Proceedings / / edited by Hsinchun Chen, Michael Chau, Shu-Hsing Li, Shalini Urs, Srinath Srinivasa, G. Alan Wang
Intelligence and Security Informatics [[electronic resource] ] : Pacific Asia Workshop, PAISI 2010, Hyderabad, India, June 21, 2010 Proceedings / / edited by Hsinchun Chen, Michael Chau, Shu-Hsing Li, Shalini Urs, Srinath Srinivasa, G. Alan Wang
Edizione [1st ed. 2010.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2010
Descrizione fisica 1 online resource (183 p. 50 illus.)
Disciplina 005.82
Collana Security and Cryptology
Soggetto topico Data encryption (Computer science)
Computer communication systems
Application software
Database management
Information storage and retrieval
Data mining
Cryptology
Computer Communication Networks
Information Systems Applications (incl. Internet)
Database Management
Information Storage and Retrieval
Data Mining and Knowledge Discovery
ISBN 1-280-38713-0
9786613565051
3-642-13601-X
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Terrorism Informatics and Crime Analysis -- Combined Detection Model for Criminal Network Detection -- An Association Model for Implicit Crime Link Analysis -- Design and Deployment of a National Detecting Stolen Vehicles Network System -- Fighting Cybercrime: A KM Perspective -- Transportation Infrastructure Security -- Trajectory Similarity of Network Constrained Moving Objects and Applications to Traffic Security -- An Emergent Traffic Messaging Service Using Wireless Technology -- Information Access and Security -- A Model for Detecting “Global Footprint Anomalies” in a Grid Environment -- Secure Anonymous Routing for MANETs Using Distributed Dynamic Random Path Selection -- MAD-IDS: Novel Intrusion Detection System Using Mobile Agents and Data Mining Approaches -- Data Encryption -- Fuzzy Biometric Signcryption Scheme with Bilinear Pairings in the Standard Model -- Key Independent Decryption of Graphically Encrypted Images -- Towards Confidentiality of ID-Based Signcryption Schemes under without Random Oracle Model -- JPEG Steganalysis Using HBCL Statistics and FR Index -- Data and Text Mining -- Text Mining Technique for Chinese Written Judgment of Criminal Case -- Exploration of Document Relation Quality with Consideration of Term Representation Basis, Term Weighting and Association Measure -- Identifying Controversial Issues and Their Sub-topics in News Articles -- Efficient Privacy Preserving K-Means Clustering -- A Fuzzy Threshold Based Modified Clustering Algorithm for Natural Data Exploration.
Record Nr. UNINA-9910483250103321
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2010
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Intelligence and Security Informatics [[electronic resource] ] : Pacific Asia Workshop, PAISI 2009, Bangkok, Thailand, April 27, 2009. Proceedings / / edited by Hsinchun Chen, Christopher C. Yang, Michael Chau, Shu-Hsing Li
Intelligence and Security Informatics [[electronic resource] ] : Pacific Asia Workshop, PAISI 2009, Bangkok, Thailand, April 27, 2009. Proceedings / / edited by Hsinchun Chen, Christopher C. Yang, Michael Chau, Shu-Hsing Li
Edizione [1st ed. 2009.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2009
Descrizione fisica 1 online resource (X, 169 p.)
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Computer security
Application software
Data mining
Computer communication systems
Computers and civilization
Computers
Law and legislation
Systems and Data Security
Information Systems Applications (incl. Internet)
Data Mining and Knowledge Discovery
Computer Communication Networks
Computers and Society
Legal Aspects of Computing
Soggetto genere / forma Bangkok (2009)
Kongress.
ISBN 3-642-01393-7
Classificazione DAT 055f
DAT 461f
DAT 465f
DAT 614f
SS 4800
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Keynote -- Building a Geosocial Semantic Web for Military Stabilization and Reconstruction Operations -- Terrorism Informatics and Crime Analysis -- Criminal Cross Correlation Mining and Visualization -- A Cybercrime Forensic Method for Chinese Web Information Authorship Analysis -- Prediction of Unsolved Terrorist Attacks Using Group Detection Algorithms -- Enterprise Risk Management -- Exploring Fraudulent Financial Reporting with GHSOM -- Identifying Firm-Specific Risk Statements in News Articles -- Predicting Future Earnings Change Using Numeric and Textual Information in Financial Reports -- Emergency Response and Surveillance -- When Generalized Voronoi Diagrams Meet GeoWeb for Emergency Management -- E3TP: A Novel Trajectory Prediction Algorithm in Moving Objects Databases -- Information Access and Security -- A User-Centered Framework for Adaptive Fingerprint Identification -- Design of a Passport Anti-forgery System Based on Digital Signature Schemes -- A Chronological Evaluation of Unknown Malcode Detection -- Data and Text Mining -- Relation Discovery from Thai News Articles Using Association Rule Mining -- Discovering Compatible Top-K Theme Patterns from Text Based on Users’ Preferences -- Juicer: Scalable Extraction for Thread Meta-information of Web Forum -- A Feature-Based Approach for Relation Extraction from Thai News Documents -- An Incremental-Learning Method for Supervised Anomaly Detection by Cascading Service Classifier and ITI Decision Tree Methods -- Quantifying News Reports to Proxy “Other Information” in ERC Models.
Record Nr. UNISA-996466022503316
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2009
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Intelligence and Security Informatics [[electronic resource] ] : Pacific Asia Workshop, PAISI 2009, Bangkok, Thailand, April 27, 2009. Proceedings / / edited by Hsinchun Chen, Christopher C. Yang, Michael Chau, Shu-Hsing Li
Intelligence and Security Informatics [[electronic resource] ] : Pacific Asia Workshop, PAISI 2009, Bangkok, Thailand, April 27, 2009. Proceedings / / edited by Hsinchun Chen, Christopher C. Yang, Michael Chau, Shu-Hsing Li
Edizione [1st ed. 2009.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2009
Descrizione fisica 1 online resource (X, 169 p.)
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Computer security
Application software
Data mining
Computer communication systems
Computers and civilization
Computers
Law and legislation
Systems and Data Security
Information Systems Applications (incl. Internet)
Data Mining and Knowledge Discovery
Computer Communication Networks
Computers and Society
Legal Aspects of Computing
Soggetto genere / forma Bangkok (2009)
Kongress.
ISBN 3-642-01393-7
Classificazione DAT 055f
DAT 461f
DAT 465f
DAT 614f
SS 4800
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Keynote -- Building a Geosocial Semantic Web for Military Stabilization and Reconstruction Operations -- Terrorism Informatics and Crime Analysis -- Criminal Cross Correlation Mining and Visualization -- A Cybercrime Forensic Method for Chinese Web Information Authorship Analysis -- Prediction of Unsolved Terrorist Attacks Using Group Detection Algorithms -- Enterprise Risk Management -- Exploring Fraudulent Financial Reporting with GHSOM -- Identifying Firm-Specific Risk Statements in News Articles -- Predicting Future Earnings Change Using Numeric and Textual Information in Financial Reports -- Emergency Response and Surveillance -- When Generalized Voronoi Diagrams Meet GeoWeb for Emergency Management -- E3TP: A Novel Trajectory Prediction Algorithm in Moving Objects Databases -- Information Access and Security -- A User-Centered Framework for Adaptive Fingerprint Identification -- Design of a Passport Anti-forgery System Based on Digital Signature Schemes -- A Chronological Evaluation of Unknown Malcode Detection -- Data and Text Mining -- Relation Discovery from Thai News Articles Using Association Rule Mining -- Discovering Compatible Top-K Theme Patterns from Text Based on Users’ Preferences -- Juicer: Scalable Extraction for Thread Meta-information of Web Forum -- A Feature-Based Approach for Relation Extraction from Thai News Documents -- An Incremental-Learning Method for Supervised Anomaly Detection by Cascading Service Classifier and ITI Decision Tree Methods -- Quantifying News Reports to Proxy “Other Information” in ERC Models.
Record Nr. UNINA-9910484062903321
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2009
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui