Intelligence and Security Informatics [[electronic resource] ] : Pacific Asia Workshop, PAISI 2009, Bangkok, Thailand, April 27, 2009. Proceedings / / edited by Hsinchun Chen, Christopher C. Yang, Michael Chau, Shu-Hsing Li |
Edizione | [1st ed. 2009.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2009 |
Descrizione fisica | 1 online resource (X, 169 p.) |
Disciplina | 005.8 |
Collana | Security and Cryptology |
Soggetto topico |
Computer security
Application software Data mining Computer communication systems Computers and civilization Computers Law and legislation Systems and Data Security Information Systems Applications (incl. Internet) Data Mining and Knowledge Discovery Computer Communication Networks Computers and Society Legal Aspects of Computing |
Soggetto genere / forma |
Bangkok (2009)
Kongress. |
ISBN | 3-642-01393-7 |
Classificazione |
DAT 055f
DAT 461f DAT 465f DAT 614f SS 4800 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Keynote -- Building a Geosocial Semantic Web for Military Stabilization and Reconstruction Operations -- Terrorism Informatics and Crime Analysis -- Criminal Cross Correlation Mining and Visualization -- A Cybercrime Forensic Method for Chinese Web Information Authorship Analysis -- Prediction of Unsolved Terrorist Attacks Using Group Detection Algorithms -- Enterprise Risk Management -- Exploring Fraudulent Financial Reporting with GHSOM -- Identifying Firm-Specific Risk Statements in News Articles -- Predicting Future Earnings Change Using Numeric and Textual Information in Financial Reports -- Emergency Response and Surveillance -- When Generalized Voronoi Diagrams Meet GeoWeb for Emergency Management -- E3TP: A Novel Trajectory Prediction Algorithm in Moving Objects Databases -- Information Access and Security -- A User-Centered Framework for Adaptive Fingerprint Identification -- Design of a Passport Anti-forgery System Based on Digital Signature Schemes -- A Chronological Evaluation of Unknown Malcode Detection -- Data and Text Mining -- Relation Discovery from Thai News Articles Using Association Rule Mining -- Discovering Compatible Top-K Theme Patterns from Text Based on Users’ Preferences -- Juicer: Scalable Extraction for Thread Meta-information of Web Forum -- A Feature-Based Approach for Relation Extraction from Thai News Documents -- An Incremental-Learning Method for Supervised Anomaly Detection by Cascading Service Classifier and ITI Decision Tree Methods -- Quantifying News Reports to Proxy “Other Information” in ERC Models. |
Record Nr. | UNISA-996466022503316 |
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2009 | ||
![]() | ||
Lo trovi qui: Univ. di Salerno | ||
|
Intelligence and Security Informatics [[electronic resource] ] : IEEE ISI 2008 International Workshops: PAISI, PACCF and SOCO 2008, Taipei, Taiwan, June 17, 2008, Proceedings / / edited by Christopher C. Yang, Hsinchun Chen, Michael Chau, Kuiyu Chang, Sheau-Dong Lang, Patrick Chen, Raymond Hsieh, Daniel Zeng, Fei-Yue Wang, Kathleen M. Carley, Wenji Mao, Justin Zhan |
Edizione | [1st ed. 2008.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2008 |
Descrizione fisica | 1 online resource (XXII, 524 p. 186 illus.) |
Disciplina | 005.82 |
Collana | Information Systems and Applications, incl. Internet/Web, and HCI |
Soggetto topico |
Data encryption (Computer science)
Applied mathematics Engineering mathematics Application software Data mining Computer communication systems Computers and civilization Cryptology Applications of Mathematics Information Systems Applications (incl. Internet) Data Mining and Knowledge Discovery Computer Communication Networks Computers and Society |
ISBN | 3-540-69304-1 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Pacific Asia Workshop on Intelligence and Security Informatics (PAISI 2008) -- Chinese Word Segmentation for Terrorism-Related Contents -- A Term Association Inference Model for Single Documents: A Stepping Stone for Investigation through Information Extraction -- Method for Evaluating the Security Risk of a Website Against Phishing Attacks -- CyberIR – A Technological Approach to Fight Cybercrime -- The Banknote Anti-forgery System Based on Digital Signature Algorithms -- Sequence Matching for Suspicious Activity Detection in Anti-Money Laundering -- Data Protection in Memory Using Byte Reordering -- Highly Efficient Password-Based Three-Party Key Exchange in Random Oracle Model -- A Pairwise Key Pre-distribution Scheme for Wireless Sensor Network -- Attacks on SVD-Based Watermarking Schemes -- Trigger Based Security Alarming Scheme for Moving Objects on Road Networks -- Reducing False Alarm of Video-Based Smoke Detection by Support Vector Machine -- Privacy-Preserving Collaborative Social Networks -- Efficient Secret Authenticatable Anonymous Signcryption Scheme with Identity Privacy -- How to Publicly Verifiably Expand a Member without Changing Old Shares in a Secret Sharing Scheme -- Comparing Two Models for Terrorist Group Detection: GDM or OGDM? -- Applying Case-Based Reasoning and Expert Systems to Coastal Patrol Crime Investigation in Taiwan -- Integrating Data Sources and Network Analysis Tools to Support the Fight Against Organized Crime -- Visual Analytics for Supporting Entity Relationship Discovery on Text Data -- Feature Weighting and Selection for a Real-Time Network Intrusion Detection System Based on GA with KNN -- Locality-Based Server Profiling for Intrusion Detection -- Pacific Asia Workshop on Cybercrime and Computer Forensics (PACCF 2008) -- A Simple WordNet-Ontology Based Email Retrieval System for Digital Forensics -- Preservation of Evidence in Case of Online Gaming Crime -- Dataset Analysis of Proxy Logs Detecting to Curb Propagations in Network Attacks -- Identifying Chinese E-Mail Documents’ Authorship for the Purpose of Computer Forensic -- A Collaborative Forensics Framework for VoIP Services in Multi-network Environments -- Wireless Forensic: A New Radio Frequency Based Locating System -- Applying Public-Key Watermarking Techniques in Forensic Imaging to Preserve the Authenticity of the Evidence -- Computer Forensics and Culture -- E-Commerce Security: The Categorical Role of Computers in Forensic Online Crime -- Forensic Artifacts of Microsoft Windows Vista System -- Workshop on Social Computing (SOCO 2008) -- How Useful Are Tags? — An Empirical Analysis of Collaborative Tagging for Web Page Recommendation -- A Generative Model for Statistical Determination of Information Content from Conversation Threads -- Using “Cited by” Information to Find the Context of Research Papers -- Online Communities: A Social Computing Perspective -- User-Centered Interface Design of Social Websites -- Discovering Trends in Collaborative Tagging Systems -- Socio-contextual Filters for Discovering Similar Knowledge-Gathering Tasks in Generic Information Systems -- Exploring Social Dynamics in Online Bookmarking Systems -- Dispositional Factors in the Use of Social Networking Sites: Findings and Implications for Social Computing Research -- Agent-Based Social Simulation and Modeling in Social Computing -- Transforming Raw-Email Data into Social-Network Information -- Using Social Networks to Organize Researcher Community -- Online Gaming Perpetrators Model -- Proposal for a Multiagent Architecture for Self-Organizing Systems (MA-SOS) -- Applying Text Mining to Assist People Who Inquire HIV/AIDS Information from Internet -- Polarity Classification of Public Health Opinions in Chinese -- Parallel Crawling and Capturing for On-Line Auction -- A New Credit Card Payment Scheme Using Mobile Phones Based on Visual Cryptography -- Detecting Hidden Hierarchy in Terrorist Networks: Some Case Studies -- Keyphrase Extraction from Chinese News Web Pages Based on Semantic Relations -- Automatic Recognition of News Web Pages -- Understanding Users’ Attitudes Towards Using a VoIP Survey -- Privacy-Preserving Collaborative E-Voting -- Privacy-Aware Access Control through Negotiation in Daily Life Service. |
Record Nr. | UNISA-996465305603316 |
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2008 | ||
![]() | ||
Lo trovi qui: Univ. di Salerno | ||
|
Intelligence and security informatics : IEEE ISI 2008 international workshops : PAISI, PACCF, and SOCO 2008, Taipei, Taiwan, June 17, 2008 : proceedings / / Christopher C. Yang ... [et al.] (eds.) |
Edizione | [1st ed. 2008.] |
Pubbl/distr/stampa | Berlin ; ; New York, : Springer, 2008 |
Descrizione fisica | 1 online resource (XXII, 524 p. 186 illus.) |
Disciplina | 005.82 |
Altri autori (Persone) | YangChristopher C |
Collana |
Lecture notes in computer science
LNCS sublibrary. SL 3, Information systems and application, incl. Internet/Web, and HCI |
Soggetto topico |
Expert systems (Computer science) - United States
Computer security - United States National security - United States Computer crimes - Investigation |
ISBN | 3-540-69304-1 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Pacific Asia Workshop on Intelligence and Security Informatics (PAISI 2008) -- Chinese Word Segmentation for Terrorism-Related Contents -- A Term Association Inference Model for Single Documents: A Stepping Stone for Investigation through Information Extraction -- Method for Evaluating the Security Risk of a Website Against Phishing Attacks -- CyberIR – A Technological Approach to Fight Cybercrime -- The Banknote Anti-forgery System Based on Digital Signature Algorithms -- Sequence Matching for Suspicious Activity Detection in Anti-Money Laundering -- Data Protection in Memory Using Byte Reordering -- Highly Efficient Password-Based Three-Party Key Exchange in Random Oracle Model -- A Pairwise Key Pre-distribution Scheme for Wireless Sensor Network -- Attacks on SVD-Based Watermarking Schemes -- Trigger Based Security Alarming Scheme for Moving Objects on Road Networks -- Reducing False Alarm of Video-Based Smoke Detection by Support Vector Machine -- Privacy-Preserving Collaborative Social Networks -- Efficient Secret Authenticatable Anonymous Signcryption Scheme with Identity Privacy -- How to Publicly Verifiably Expand a Member without Changing Old Shares in a Secret Sharing Scheme -- Comparing Two Models for Terrorist Group Detection: GDM or OGDM? -- Applying Case-Based Reasoning and Expert Systems to Coastal Patrol Crime Investigation in Taiwan -- Integrating Data Sources and Network Analysis Tools to Support the Fight Against Organized Crime -- Visual Analytics for Supporting Entity Relationship Discovery on Text Data -- Feature Weighting and Selection for a Real-Time Network Intrusion Detection System Based on GA with KNN -- Locality-Based Server Profiling for Intrusion Detection -- Pacific Asia Workshop on Cybercrime and Computer Forensics (PACCF 2008) -- A Simple WordNet-Ontology Based Email Retrieval System for Digital Forensics -- Preservation of Evidence in Case of Online Gaming Crime -- Dataset Analysis of Proxy Logs Detecting to Curb Propagations in Network Attacks -- Identifying Chinese E-Mail Documents’ Authorship for the Purpose of Computer Forensic -- A Collaborative Forensics Framework for VoIP Services in Multi-network Environments -- Wireless Forensic: A New Radio Frequency Based Locating System -- Applying Public-Key Watermarking Techniques in Forensic Imaging to Preserve the Authenticity of the Evidence -- Computer Forensics and Culture -- E-Commerce Security: The Categorical Role of Computers in Forensic Online Crime -- Forensic Artifacts of Microsoft Windows Vista System -- Workshop on Social Computing (SOCO 2008) -- How Useful Are Tags? — An Empirical Analysis of Collaborative Tagging for Web Page Recommendation -- A Generative Model for Statistical Determination of Information Content from Conversation Threads -- Using “Cited by” Information to Find the Context of Research Papers -- Online Communities: A Social Computing Perspective -- User-Centered Interface Design of Social Websites -- Discovering Trends in Collaborative Tagging Systems -- Socio-contextual Filters for Discovering Similar Knowledge-Gathering Tasks in Generic Information Systems -- Exploring Social Dynamics in Online Bookmarking Systems -- Dispositional Factors in the Use of Social Networking Sites: Findings and Implications for Social Computing Research -- Agent-Based Social Simulation and Modeling in Social Computing -- Transforming Raw-Email Data into Social-Network Information -- Using Social Networks to Organize Researcher Community -- Online Gaming Perpetrators Model -- Proposal for a Multiagent Architecture for Self-Organizing Systems (MA-SOS) -- Applying Text Mining to Assist People Who Inquire HIV/AIDS Information from Internet -- Polarity Classification of Public Health Opinions in Chinese -- Parallel Crawling and Capturing for On-Line Auction -- A New Credit Card Payment Scheme Using Mobile Phones Based on Visual Cryptography -- Detecting Hidden Hierarchy in Terrorist Networks: Some Case Studies -- Keyphrase Extraction from Chinese News Web Pages Based on Semantic Relations -- Automatic Recognition of News Web Pages -- Understanding Users’ Attitudes Towards Using a VoIP Survey -- Privacy-Preserving Collaborative E-Voting -- Privacy-Aware Access Control through Negotiation in Daily Life Service. |
Record Nr. | UNINA-9910483013603321 |
Berlin ; ; New York, : Springer, 2008 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Intelligence and Security Informatics [[electronic resource] ] : International Workshop, WISI 2006, Singapore, April 9, 2006, Proceedings / / edited by Hsinchun Chen, Feiyue Wang, Christopher C. Yang, Daniel Zeng, Michael Chau, Kuiyu Chang |
Edizione | [1st ed. 2006.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2006 |
Descrizione fisica | 1 online resource (XII, 188 p.) |
Disciplina | 005.7 |
Collana | Information Systems and Applications, incl. Internet/Web, and HCI |
Soggetto topico |
Application software
Information storage and retrieval Computer communication systems Computers and civilization Computers Law and legislation Management information systems Computer science Information Systems Applications (incl. Internet) Information Storage and Retrieval Computer Communication Networks Computers and Society Legal Aspects of Computing Management of Computing and Information Systems |
ISBN | 3-540-33362-2 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Keynote Speech -- Data Mining for Security Applications -- Web and Text Mining for Terrorism Informatics -- Unraveling International Terrorist Groups’ Exploitation of the Web: Technical Sophistication, Media Richness, and Web Interactivity -- Multi-lingual Detection of Terrorist Content on the Web -- INEXT: An Investigative Search Tool for Knowledge Extraction -- Cybercrime Analysis -- Cybercrime in Taiwan – An Analysis of Suspect Records -- Analysis of Computer Crime Characteristics in Taiwan -- A Cross Datasets Referring Outlier Detection Model Applied to Suspicious Financial Transaction Discrimination -- Network Security -- Detecting Novel Network Attacks with a Data Field -- Improving Authentication Accuracy of Unfamiliar Passwords with Pauses and Cues for Keystroke Dynamics-Based Authentication -- Illegal Intrusion Detection Based on Hidden Information Database -- Defender Personality Traits -- Crime Data Mining -- Mining Criminal Databases to Finding Investigation Clues—By Example of Stolen Automobiles Database -- Country Corruption Analysis with Self Organizing Maps and Support Vector Machines -- Temporal Representation in Spike Detection of Sparse Personal Identity Streams -- Mining Positive Associations of Urban Criminal Activities Using Hierarchical Crime Hot Spots -- VCCM Mining: Mining Virtual Community Core Members Based on Gene Expression Programming -- Posters -- Integration of a Cryptographic File System and Access Control -- Applications of Homomorphic Functions to Software Obfuscation -- Security Model for Informational Privacy -- A Viable System for Tracing Illegal Users of Video -- Privacy and Security Enhanced Offline Oblivious Transfer for Massive Data Distribution -- The Effectiveness of Artificial Rhythms and Cues in Keystroke Dynamics Based User Authentication -- Cascade Damage Estimation Model for Internet Attacks -- A New Secure Key Exchange Protocol Between STB and Smart Card in DTV Broadcasting -- A Fuzzy Anomaly Detection System -- Hidden Markov Model Based Intrusion Detection -- One-Class Strategies for Security Information Detection -- Design of an Emergency Prediction and Prevention Platform for Societal Security Decision Support Using Neural Networks -- A Novel Identity Authentication Technique Without Trustworthy Third-Party Based on Fingerprint Verification -- Cyberspace Community Analysis and Simulation Using Complex Dynamic Social Networks -- Analysis of Infectious Disease Data Based on Evolutionary Computation -- Rule+Exception Learning-Based Class Specification and Labeling in Intelligence and Security Analysis -- A Computational Framework for Decision Analysis and Support in ISI: Artificial Societies, Computational Experiments, and Parallel Systems. |
Record Nr. | UNISA-996466125803316 |
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2006 | ||
![]() | ||
Lo trovi qui: Univ. di Salerno | ||
|
Proceedings of the ACM SIGKDD Workshop on Intelligence and Security Informatics 2010 : ISI-KDD 2010 : Washington, DC, USA |
Autore | Chen Hsinchun |
Pubbl/distr/stampa | [Place of publication not identified], : ACM, 2006 |
Descrizione fisica | 1 online resource (83 pages) |
Collana | ACM Conferences |
Soggetto topico |
Engineering & Applied Sciences
Technology - General Computer Science |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Altri titoli varianti |
Proceedings of the Association for Computing Machinery Special Interest Group on Knowledge Discovery in Data Workshop on Intelligence and Security Informatics 2010 : ISI-KDD 2010 : Washington, District of Columbia, United States of America
ACM SIGKDD Workshop on Intelligence and Security Informatics |
Record Nr. | UNINA-9910376014003321 |
Chen Hsinchun
![]() |
||
[Place of publication not identified], : ACM, 2006 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Proceedings of the ACM SIGKDD Workshop on Intelligence and Security Informatics 2012 : Beijing, China : ISI-KDD 2012 |
Autore | Yang Christopher C |
Pubbl/distr/stampa | [Place of publication not identified], : ACM, 2012 |
Descrizione fisica | 1 online resource (65 pages) |
Collana | ACM International Conference Proceedings Series |
Soggetto topico |
Engineering & Applied Sciences
Computer Science |
ISBN | 1-4503-1550-X |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Altri titoli varianti |
Proceedings of the Association for Computing Machinery Special Interest Group on Knowledge Discovery in Data Workshop on Intelligence and Security Informatics 2012 : Beijing, China : ISI-KDD 2012
Proceedings of the ACM SIGKDD Workshop on Intelligence and Security Informatics |
Record Nr. | UNINA-9910376322703321 |
Yang Christopher C
![]() |
||
[Place of publication not identified], : ACM, 2012 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Smart Health [[electronic resource] ] : International Conference, ICSH 2013, Beijing, China, August 3-4, 2013. Proceedings / / edited by Daniel Zeng, Christopher C. Yang, Vincent S. Tseng, Chunxiao Xing, Hsinchun Chen, Fei-Yue Wang, Xiaolong Zheng |
Edizione | [1st ed. 2013.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2013 |
Descrizione fisica | 1 online resource (XII, 151 p. 47 illus.) |
Disciplina | 502.85 |
Collana | Information Systems and Applications, incl. Internet/Web, and HCI |
Soggetto topico |
Health informatics
Computers Database management Data mining Information storage and retrieval Application software Health Informatics Information Systems and Communication Service Database Management Data Mining and Knowledge Discovery Information Storage and Retrieval Information Systems Applications (incl. Internet) |
Soggetto non controllato |
Smart health
ICSH |
ISBN | 3-642-39844-8 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Information Sharing, Integrating and Extraction -- Mining Clinical and Medical Data -- Smart Health Applications. |
Record Nr. | UNISA-996466037503316 |
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2013 | ||
![]() | ||
Lo trovi qui: Univ. di Salerno | ||
|
Smart Health : International Conference, ICSH 2013, Beijing, China, August 3-4, 2013. Proceedings / / edited by Daniel Zeng, Christopher C. Yang, Vincent S. Tseng, Chunxiao Xing, Hsinchun Chen, Fei-Yue Wang, Xiaolong Zheng |
Edizione | [1st ed. 2013.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2013 |
Descrizione fisica | 1 online resource (XII, 151 p. 47 illus.) |
Disciplina | 502.85 |
Collana | Information Systems and Applications, incl. Internet/Web, and HCI |
Soggetto topico |
Health informatics
Computers Database management Data mining Information storage and retrieval Application software Health Informatics Information Systems and Communication Service Database Management Data Mining and Knowledge Discovery Information Storage and Retrieval Information Systems Applications (incl. Internet) |
Soggetto non controllato |
Smart health
ICSH |
ISBN | 3-642-39844-8 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Information Sharing, Integrating and Extraction -- Mining Clinical and Medical Data -- Smart Health Applications. |
Record Nr. | UNINA-9910483820703321 |
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2013 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|