top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Intelligence and Security Informatics [[electronic resource] ] : Pacific Asia Workshop, PAISI 2009, Bangkok, Thailand, April 27, 2009. Proceedings / / edited by Hsinchun Chen, Christopher C. Yang, Michael Chau, Shu-Hsing Li
Intelligence and Security Informatics [[electronic resource] ] : Pacific Asia Workshop, PAISI 2009, Bangkok, Thailand, April 27, 2009. Proceedings / / edited by Hsinchun Chen, Christopher C. Yang, Michael Chau, Shu-Hsing Li
Edizione [1st ed. 2009.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2009
Descrizione fisica 1 online resource (X, 169 p.)
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Computer security
Application software
Data mining
Computer communication systems
Computers and civilization
Computers
Law and legislation
Systems and Data Security
Information Systems Applications (incl. Internet)
Data Mining and Knowledge Discovery
Computer Communication Networks
Computers and Society
Legal Aspects of Computing
Soggetto genere / forma Bangkok (2009)
Kongress.
ISBN 3-642-01393-7
Classificazione DAT 055f
DAT 461f
DAT 465f
DAT 614f
SS 4800
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Keynote -- Building a Geosocial Semantic Web for Military Stabilization and Reconstruction Operations -- Terrorism Informatics and Crime Analysis -- Criminal Cross Correlation Mining and Visualization -- A Cybercrime Forensic Method for Chinese Web Information Authorship Analysis -- Prediction of Unsolved Terrorist Attacks Using Group Detection Algorithms -- Enterprise Risk Management -- Exploring Fraudulent Financial Reporting with GHSOM -- Identifying Firm-Specific Risk Statements in News Articles -- Predicting Future Earnings Change Using Numeric and Textual Information in Financial Reports -- Emergency Response and Surveillance -- When Generalized Voronoi Diagrams Meet GeoWeb for Emergency Management -- E3TP: A Novel Trajectory Prediction Algorithm in Moving Objects Databases -- Information Access and Security -- A User-Centered Framework for Adaptive Fingerprint Identification -- Design of a Passport Anti-forgery System Based on Digital Signature Schemes -- A Chronological Evaluation of Unknown Malcode Detection -- Data and Text Mining -- Relation Discovery from Thai News Articles Using Association Rule Mining -- Discovering Compatible Top-K Theme Patterns from Text Based on Users’ Preferences -- Juicer: Scalable Extraction for Thread Meta-information of Web Forum -- A Feature-Based Approach for Relation Extraction from Thai News Documents -- An Incremental-Learning Method for Supervised Anomaly Detection by Cascading Service Classifier and ITI Decision Tree Methods -- Quantifying News Reports to Proxy “Other Information” in ERC Models.
Record Nr. UNISA-996466022503316
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2009
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Intelligence and Security Informatics [[electronic resource] ] : Pacific Asia Workshop, PAISI 2009, Bangkok, Thailand, April 27, 2009. Proceedings / / edited by Hsinchun Chen, Christopher C. Yang, Michael Chau, Shu-Hsing Li
Intelligence and Security Informatics [[electronic resource] ] : Pacific Asia Workshop, PAISI 2009, Bangkok, Thailand, April 27, 2009. Proceedings / / edited by Hsinchun Chen, Christopher C. Yang, Michael Chau, Shu-Hsing Li
Edizione [1st ed. 2009.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2009
Descrizione fisica 1 online resource (X, 169 p.)
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Computer security
Application software
Data mining
Computer communication systems
Computers and civilization
Computers
Law and legislation
Systems and Data Security
Information Systems Applications (incl. Internet)
Data Mining and Knowledge Discovery
Computer Communication Networks
Computers and Society
Legal Aspects of Computing
Soggetto genere / forma Bangkok (2009)
Kongress.
ISBN 3-642-01393-7
Classificazione DAT 055f
DAT 461f
DAT 465f
DAT 614f
SS 4800
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Keynote -- Building a Geosocial Semantic Web for Military Stabilization and Reconstruction Operations -- Terrorism Informatics and Crime Analysis -- Criminal Cross Correlation Mining and Visualization -- A Cybercrime Forensic Method for Chinese Web Information Authorship Analysis -- Prediction of Unsolved Terrorist Attacks Using Group Detection Algorithms -- Enterprise Risk Management -- Exploring Fraudulent Financial Reporting with GHSOM -- Identifying Firm-Specific Risk Statements in News Articles -- Predicting Future Earnings Change Using Numeric and Textual Information in Financial Reports -- Emergency Response and Surveillance -- When Generalized Voronoi Diagrams Meet GeoWeb for Emergency Management -- E3TP: A Novel Trajectory Prediction Algorithm in Moving Objects Databases -- Information Access and Security -- A User-Centered Framework for Adaptive Fingerprint Identification -- Design of a Passport Anti-forgery System Based on Digital Signature Schemes -- A Chronological Evaluation of Unknown Malcode Detection -- Data and Text Mining -- Relation Discovery from Thai News Articles Using Association Rule Mining -- Discovering Compatible Top-K Theme Patterns from Text Based on Users’ Preferences -- Juicer: Scalable Extraction for Thread Meta-information of Web Forum -- A Feature-Based Approach for Relation Extraction from Thai News Documents -- An Incremental-Learning Method for Supervised Anomaly Detection by Cascading Service Classifier and ITI Decision Tree Methods -- Quantifying News Reports to Proxy “Other Information” in ERC Models.
Record Nr. UNINA-9910484062903321
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2009
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Intelligence and Security Informatics [[electronic resource] ] : IEEE ISI 2008 International Workshops: PAISI, PACCF and SOCO 2008, Taipei, Taiwan, June 17, 2008, Proceedings / / edited by Christopher C. Yang, Hsinchun Chen, Michael Chau, Kuiyu Chang, Sheau-Dong Lang, Patrick Chen, Raymond Hsieh, Daniel Zeng, Fei-Yue Wang, Kathleen M. Carley, Wenji Mao, Justin Zhan
Intelligence and Security Informatics [[electronic resource] ] : IEEE ISI 2008 International Workshops: PAISI, PACCF and SOCO 2008, Taipei, Taiwan, June 17, 2008, Proceedings / / edited by Christopher C. Yang, Hsinchun Chen, Michael Chau, Kuiyu Chang, Sheau-Dong Lang, Patrick Chen, Raymond Hsieh, Daniel Zeng, Fei-Yue Wang, Kathleen M. Carley, Wenji Mao, Justin Zhan
Edizione [1st ed. 2008.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2008
Descrizione fisica 1 online resource (XXII, 524 p. 186 illus.)
Disciplina 005.82
Collana Information Systems and Applications, incl. Internet/Web, and HCI
Soggetto topico Data encryption (Computer science)
Applied mathematics
Engineering mathematics
Application software
Data mining
Computer communication systems
Computers and civilization
Cryptology
Applications of Mathematics
Information Systems Applications (incl. Internet)
Data Mining and Knowledge Discovery
Computer Communication Networks
Computers and Society
ISBN 3-540-69304-1
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Pacific Asia Workshop on Intelligence and Security Informatics (PAISI 2008) -- Chinese Word Segmentation for Terrorism-Related Contents -- A Term Association Inference Model for Single Documents: A Stepping Stone for Investigation through Information Extraction -- Method for Evaluating the Security Risk of a Website Against Phishing Attacks -- CyberIR – A Technological Approach to Fight Cybercrime -- The Banknote Anti-forgery System Based on Digital Signature Algorithms -- Sequence Matching for Suspicious Activity Detection in Anti-Money Laundering -- Data Protection in Memory Using Byte Reordering -- Highly Efficient Password-Based Three-Party Key Exchange in Random Oracle Model -- A Pairwise Key Pre-distribution Scheme for Wireless Sensor Network -- Attacks on SVD-Based Watermarking Schemes -- Trigger Based Security Alarming Scheme for Moving Objects on Road Networks -- Reducing False Alarm of Video-Based Smoke Detection by Support Vector Machine -- Privacy-Preserving Collaborative Social Networks -- Efficient Secret Authenticatable Anonymous Signcryption Scheme with Identity Privacy -- How to Publicly Verifiably Expand a Member without Changing Old Shares in a Secret Sharing Scheme -- Comparing Two Models for Terrorist Group Detection: GDM or OGDM? -- Applying Case-Based Reasoning and Expert Systems to Coastal Patrol Crime Investigation in Taiwan -- Integrating Data Sources and Network Analysis Tools to Support the Fight Against Organized Crime -- Visual Analytics for Supporting Entity Relationship Discovery on Text Data -- Feature Weighting and Selection for a Real-Time Network Intrusion Detection System Based on GA with KNN -- Locality-Based Server Profiling for Intrusion Detection -- Pacific Asia Workshop on Cybercrime and Computer Forensics (PACCF 2008) -- A Simple WordNet-Ontology Based Email Retrieval System for Digital Forensics -- Preservation of Evidence in Case of Online Gaming Crime -- Dataset Analysis of Proxy Logs Detecting to Curb Propagations in Network Attacks -- Identifying Chinese E-Mail Documents’ Authorship for the Purpose of Computer Forensic -- A Collaborative Forensics Framework for VoIP Services in Multi-network Environments -- Wireless Forensic: A New Radio Frequency Based Locating System -- Applying Public-Key Watermarking Techniques in Forensic Imaging to Preserve the Authenticity of the Evidence -- Computer Forensics and Culture -- E-Commerce Security: The Categorical Role of Computers in Forensic Online Crime -- Forensic Artifacts of Microsoft Windows Vista System -- Workshop on Social Computing (SOCO 2008) -- How Useful Are Tags? — An Empirical Analysis of Collaborative Tagging for Web Page Recommendation -- A Generative Model for Statistical Determination of Information Content from Conversation Threads -- Using “Cited by” Information to Find the Context of Research Papers -- Online Communities: A Social Computing Perspective -- User-Centered Interface Design of Social Websites -- Discovering Trends in Collaborative Tagging Systems -- Socio-contextual Filters for Discovering Similar Knowledge-Gathering Tasks in Generic Information Systems -- Exploring Social Dynamics in Online Bookmarking Systems -- Dispositional Factors in the Use of Social Networking Sites: Findings and Implications for Social Computing Research -- Agent-Based Social Simulation and Modeling in Social Computing -- Transforming Raw-Email Data into Social-Network Information -- Using Social Networks to Organize Researcher Community -- Online Gaming Perpetrators Model -- Proposal for a Multiagent Architecture for Self-Organizing Systems (MA-SOS) -- Applying Text Mining to Assist People Who Inquire HIV/AIDS Information from Internet -- Polarity Classification of Public Health Opinions in Chinese -- Parallel Crawling and Capturing for On-Line Auction -- A New Credit Card Payment Scheme Using Mobile Phones Based on Visual Cryptography -- Detecting Hidden Hierarchy in Terrorist Networks: Some Case Studies -- Keyphrase Extraction from Chinese News Web Pages Based on Semantic Relations -- Automatic Recognition of News Web Pages -- Understanding Users’ Attitudes Towards Using a VoIP Survey -- Privacy-Preserving Collaborative E-Voting -- Privacy-Aware Access Control through Negotiation in Daily Life Service.
Record Nr. UNISA-996465305603316
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2008
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Intelligence and Security Informatics [[electronic resource] ] : IEEE ISI 2008 International Workshops: PAISI, PACCF and SOCO 2008, Taipei, Taiwan, June 17, 2008, Proceedings / / edited by Christopher C. Yang, Hsinchun Chen, Michael Chau, Kuiyu Chang, Sheau-Dong Lang, Patrick Chen, Raymond Hsieh, Daniel Zeng, Fei-Yue Wang, Kathleen M. Carley, Wenji Mao, Justin Zhan
Intelligence and Security Informatics [[electronic resource] ] : IEEE ISI 2008 International Workshops: PAISI, PACCF and SOCO 2008, Taipei, Taiwan, June 17, 2008, Proceedings / / edited by Christopher C. Yang, Hsinchun Chen, Michael Chau, Kuiyu Chang, Sheau-Dong Lang, Patrick Chen, Raymond Hsieh, Daniel Zeng, Fei-Yue Wang, Kathleen M. Carley, Wenji Mao, Justin Zhan
Edizione [1st ed. 2008.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2008
Descrizione fisica 1 online resource (XXII, 524 p. 186 illus.)
Disciplina 005.82
Collana Information Systems and Applications, incl. Internet/Web, and HCI
Soggetto topico Data encryption (Computer science)
Applied mathematics
Engineering mathematics
Application software
Data mining
Computer communication systems
Computers and civilization
Cryptology
Applications of Mathematics
Information Systems Applications (incl. Internet)
Data Mining and Knowledge Discovery
Computer Communication Networks
Computers and Society
ISBN 3-540-69304-1
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Pacific Asia Workshop on Intelligence and Security Informatics (PAISI 2008) -- Chinese Word Segmentation for Terrorism-Related Contents -- A Term Association Inference Model for Single Documents: A Stepping Stone for Investigation through Information Extraction -- Method for Evaluating the Security Risk of a Website Against Phishing Attacks -- CyberIR – A Technological Approach to Fight Cybercrime -- The Banknote Anti-forgery System Based on Digital Signature Algorithms -- Sequence Matching for Suspicious Activity Detection in Anti-Money Laundering -- Data Protection in Memory Using Byte Reordering -- Highly Efficient Password-Based Three-Party Key Exchange in Random Oracle Model -- A Pairwise Key Pre-distribution Scheme for Wireless Sensor Network -- Attacks on SVD-Based Watermarking Schemes -- Trigger Based Security Alarming Scheme for Moving Objects on Road Networks -- Reducing False Alarm of Video-Based Smoke Detection by Support Vector Machine -- Privacy-Preserving Collaborative Social Networks -- Efficient Secret Authenticatable Anonymous Signcryption Scheme with Identity Privacy -- How to Publicly Verifiably Expand a Member without Changing Old Shares in a Secret Sharing Scheme -- Comparing Two Models for Terrorist Group Detection: GDM or OGDM? -- Applying Case-Based Reasoning and Expert Systems to Coastal Patrol Crime Investigation in Taiwan -- Integrating Data Sources and Network Analysis Tools to Support the Fight Against Organized Crime -- Visual Analytics for Supporting Entity Relationship Discovery on Text Data -- Feature Weighting and Selection for a Real-Time Network Intrusion Detection System Based on GA with KNN -- Locality-Based Server Profiling for Intrusion Detection -- Pacific Asia Workshop on Cybercrime and Computer Forensics (PACCF 2008) -- A Simple WordNet-Ontology Based Email Retrieval System for Digital Forensics -- Preservation of Evidence in Case of Online Gaming Crime -- Dataset Analysis of Proxy Logs Detecting to Curb Propagations in Network Attacks -- Identifying Chinese E-Mail Documents’ Authorship for the Purpose of Computer Forensic -- A Collaborative Forensics Framework for VoIP Services in Multi-network Environments -- Wireless Forensic: A New Radio Frequency Based Locating System -- Applying Public-Key Watermarking Techniques in Forensic Imaging to Preserve the Authenticity of the Evidence -- Computer Forensics and Culture -- E-Commerce Security: The Categorical Role of Computers in Forensic Online Crime -- Forensic Artifacts of Microsoft Windows Vista System -- Workshop on Social Computing (SOCO 2008) -- How Useful Are Tags? — An Empirical Analysis of Collaborative Tagging for Web Page Recommendation -- A Generative Model for Statistical Determination of Information Content from Conversation Threads -- Using “Cited by” Information to Find the Context of Research Papers -- Online Communities: A Social Computing Perspective -- User-Centered Interface Design of Social Websites -- Discovering Trends in Collaborative Tagging Systems -- Socio-contextual Filters for Discovering Similar Knowledge-Gathering Tasks in Generic Information Systems -- Exploring Social Dynamics in Online Bookmarking Systems -- Dispositional Factors in the Use of Social Networking Sites: Findings and Implications for Social Computing Research -- Agent-Based Social Simulation and Modeling in Social Computing -- Transforming Raw-Email Data into Social-Network Information -- Using Social Networks to Organize Researcher Community -- Online Gaming Perpetrators Model -- Proposal for a Multiagent Architecture for Self-Organizing Systems (MA-SOS) -- Applying Text Mining to Assist People Who Inquire HIV/AIDS Information from Internet -- Polarity Classification of Public Health Opinions in Chinese -- Parallel Crawling and Capturing for On-Line Auction -- A New Credit Card Payment Scheme Using Mobile Phones Based on Visual Cryptography -- Detecting Hidden Hierarchy in Terrorist Networks: Some Case Studies -- Keyphrase Extraction from Chinese News Web Pages Based on Semantic Relations -- Automatic Recognition of News Web Pages -- Understanding Users’ Attitudes Towards Using a VoIP Survey -- Privacy-Preserving Collaborative E-Voting -- Privacy-Aware Access Control through Negotiation in Daily Life Service.
Record Nr. UNINA-9910483013603321
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2008
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Intelligence and Security Informatics [[electronic resource] ] : International Workshop, WISI 2006, Singapore, April 9, 2006, Proceedings / / edited by Hsinchun Chen, Feiyue Wang, Christopher C. Yang, Daniel Zeng, Michael Chau, Kuiyu Chang
Intelligence and Security Informatics [[electronic resource] ] : International Workshop, WISI 2006, Singapore, April 9, 2006, Proceedings / / edited by Hsinchun Chen, Feiyue Wang, Christopher C. Yang, Daniel Zeng, Michael Chau, Kuiyu Chang
Edizione [1st ed. 2006.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2006
Descrizione fisica 1 online resource (XII, 188 p.)
Disciplina 005.7
Collana Information Systems and Applications, incl. Internet/Web, and HCI
Soggetto topico Application software
Information storage and retrieval
Computer communication systems
Computers and civilization
Computers
Law and legislation
Management information systems
Computer science
Information Systems Applications (incl. Internet)
Information Storage and Retrieval
Computer Communication Networks
Computers and Society
Legal Aspects of Computing
Management of Computing and Information Systems
ISBN 3-540-33362-2
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Keynote Speech -- Data Mining for Security Applications -- Web and Text Mining for Terrorism Informatics -- Unraveling International Terrorist Groups’ Exploitation of the Web: Technical Sophistication, Media Richness, and Web Interactivity -- Multi-lingual Detection of Terrorist Content on the Web -- INEXT: An Investigative Search Tool for Knowledge Extraction -- Cybercrime Analysis -- Cybercrime in Taiwan – An Analysis of Suspect Records -- Analysis of Computer Crime Characteristics in Taiwan -- A Cross Datasets Referring Outlier Detection Model Applied to Suspicious Financial Transaction Discrimination -- Network Security -- Detecting Novel Network Attacks with a Data Field -- Improving Authentication Accuracy of Unfamiliar Passwords with Pauses and Cues for Keystroke Dynamics-Based Authentication -- Illegal Intrusion Detection Based on Hidden Information Database -- Defender Personality Traits -- Crime Data Mining -- Mining Criminal Databases to Finding Investigation Clues—By Example of Stolen Automobiles Database -- Country Corruption Analysis with Self Organizing Maps and Support Vector Machines -- Temporal Representation in Spike Detection of Sparse Personal Identity Streams -- Mining Positive Associations of Urban Criminal Activities Using Hierarchical Crime Hot Spots -- VCCM Mining: Mining Virtual Community Core Members Based on Gene Expression Programming -- Posters -- Integration of a Cryptographic File System and Access Control -- Applications of Homomorphic Functions to Software Obfuscation -- Security Model for Informational Privacy -- A Viable System for Tracing Illegal Users of Video -- Privacy and Security Enhanced Offline Oblivious Transfer for Massive Data Distribution -- The Effectiveness of Artificial Rhythms and Cues in Keystroke Dynamics Based User Authentication -- Cascade Damage Estimation Model for Internet Attacks -- A New Secure Key Exchange Protocol Between STB and Smart Card in DTV Broadcasting -- A Fuzzy Anomaly Detection System -- Hidden Markov Model Based Intrusion Detection -- One-Class Strategies for Security Information Detection -- Design of an Emergency Prediction and Prevention Platform for Societal Security Decision Support Using Neural Networks -- A Novel Identity Authentication Technique Without Trustworthy Third-Party Based on Fingerprint Verification -- Cyberspace Community Analysis and Simulation Using Complex Dynamic Social Networks -- Analysis of Infectious Disease Data Based on Evolutionary Computation -- Rule+Exception Learning-Based Class Specification and Labeling in Intelligence and Security Analysis -- A Computational Framework for Decision Analysis and Support in ISI: Artificial Societies, Computational Experiments, and Parallel Systems.
Record Nr. UNISA-996466125803316
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2006
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Intelligence and Security Informatics [[electronic resource] ] : International Workshop, WISI 2006, Singapore, April 9, 2006, Proceedings / / edited by Hsinchun Chen, Feiyue Wang, Christopher C. Yang, Daniel Zeng, Michael Chau, Kuiyu Chang
Intelligence and Security Informatics [[electronic resource] ] : International Workshop, WISI 2006, Singapore, April 9, 2006, Proceedings / / edited by Hsinchun Chen, Feiyue Wang, Christopher C. Yang, Daniel Zeng, Michael Chau, Kuiyu Chang
Edizione [1st ed. 2006.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2006
Descrizione fisica 1 online resource (XII, 188 p.)
Disciplina 005.7
Collana Information Systems and Applications, incl. Internet/Web, and HCI
Soggetto topico Application software
Information storage and retrieval
Computer communication systems
Computers and civilization
Computers
Law and legislation
Management information systems
Computer science
Information Systems Applications (incl. Internet)
Information Storage and Retrieval
Computer Communication Networks
Computers and Society
Legal Aspects of Computing
Management of Computing and Information Systems
ISBN 3-540-33362-2
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Keynote Speech -- Data Mining for Security Applications -- Web and Text Mining for Terrorism Informatics -- Unraveling International Terrorist Groups’ Exploitation of the Web: Technical Sophistication, Media Richness, and Web Interactivity -- Multi-lingual Detection of Terrorist Content on the Web -- INEXT: An Investigative Search Tool for Knowledge Extraction -- Cybercrime Analysis -- Cybercrime in Taiwan – An Analysis of Suspect Records -- Analysis of Computer Crime Characteristics in Taiwan -- A Cross Datasets Referring Outlier Detection Model Applied to Suspicious Financial Transaction Discrimination -- Network Security -- Detecting Novel Network Attacks with a Data Field -- Improving Authentication Accuracy of Unfamiliar Passwords with Pauses and Cues for Keystroke Dynamics-Based Authentication -- Illegal Intrusion Detection Based on Hidden Information Database -- Defender Personality Traits -- Crime Data Mining -- Mining Criminal Databases to Finding Investigation Clues—By Example of Stolen Automobiles Database -- Country Corruption Analysis with Self Organizing Maps and Support Vector Machines -- Temporal Representation in Spike Detection of Sparse Personal Identity Streams -- Mining Positive Associations of Urban Criminal Activities Using Hierarchical Crime Hot Spots -- VCCM Mining: Mining Virtual Community Core Members Based on Gene Expression Programming -- Posters -- Integration of a Cryptographic File System and Access Control -- Applications of Homomorphic Functions to Software Obfuscation -- Security Model for Informational Privacy -- A Viable System for Tracing Illegal Users of Video -- Privacy and Security Enhanced Offline Oblivious Transfer for Massive Data Distribution -- The Effectiveness of Artificial Rhythms and Cues in Keystroke Dynamics Based User Authentication -- Cascade Damage Estimation Model for Internet Attacks -- A New Secure Key Exchange Protocol Between STB and Smart Card in DTV Broadcasting -- A Fuzzy Anomaly Detection System -- Hidden Markov Model Based Intrusion Detection -- One-Class Strategies for Security Information Detection -- Design of an Emergency Prediction and Prevention Platform for Societal Security Decision Support Using Neural Networks -- A Novel Identity Authentication Technique Without Trustworthy Third-Party Based on Fingerprint Verification -- Cyberspace Community Analysis and Simulation Using Complex Dynamic Social Networks -- Analysis of Infectious Disease Data Based on Evolutionary Computation -- Rule+Exception Learning-Based Class Specification and Labeling in Intelligence and Security Analysis -- A Computational Framework for Decision Analysis and Support in ISI: Artificial Societies, Computational Experiments, and Parallel Systems.
Record Nr. UNINA-9910484531703321
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2006
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Proceedings of the ACM SIGKDD Workshop on Intelligence and Security Informatics 2010 : ISI-KDD 2010 : Washington, DC, USA
Proceedings of the ACM SIGKDD Workshop on Intelligence and Security Informatics 2010 : ISI-KDD 2010 : Washington, DC, USA
Autore Chen Hsinchun
Pubbl/distr/stampa [Place of publication not identified], : ACM, 2006
Descrizione fisica 1 online resource (83 pages)
Collana ACM Conferences
Soggetto topico Engineering & Applied Sciences
Technology - General
Computer Science
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Altri titoli varianti Proceedings of the Association for Computing Machinery Special Interest Group on Knowledge Discovery in Data Workshop on Intelligence and Security Informatics 2010 : ISI-KDD 2010 : Washington, District of Columbia, United States of America
ACM SIGKDD Workshop on Intelligence and Security Informatics
Record Nr. UNINA-9910376014003321
Chen Hsinchun  
[Place of publication not identified], : ACM, 2006
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Proceedings of the ACM SIGKDD Workshop on Intelligence and Security Informatics 2012 : Beijing, China : ISI-KDD 2012
Proceedings of the ACM SIGKDD Workshop on Intelligence and Security Informatics 2012 : Beijing, China : ISI-KDD 2012
Autore Yang Christopher C
Pubbl/distr/stampa [Place of publication not identified], : ACM, 2012
Descrizione fisica 1 online resource (65 pages)
Collana ACM International Conference Proceedings Series
Soggetto topico Engineering & Applied Sciences
Computer Science
ISBN 1-4503-1550-X
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Altri titoli varianti Proceedings of the Association for Computing Machinery Special Interest Group on Knowledge Discovery in Data Workshop on Intelligence and Security Informatics 2012 : Beijing, China : ISI-KDD 2012
Proceedings of the ACM SIGKDD Workshop on Intelligence and Security Informatics
Record Nr. UNINA-9910376322703321
Yang Christopher C  
[Place of publication not identified], : ACM, 2012
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Smart Health [[electronic resource] ] : International Conference, ICSH 2013, Beijing, China, August 3-4, 2013. Proceedings / / edited by Daniel Zeng, Christopher C. Yang, Vincent S. Tseng, Chunxiao Xing, Hsinchun Chen, Fei-Yue Wang, Xiaolong Zheng
Smart Health [[electronic resource] ] : International Conference, ICSH 2013, Beijing, China, August 3-4, 2013. Proceedings / / edited by Daniel Zeng, Christopher C. Yang, Vincent S. Tseng, Chunxiao Xing, Hsinchun Chen, Fei-Yue Wang, Xiaolong Zheng
Edizione [1st ed. 2013.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2013
Descrizione fisica 1 online resource (XII, 151 p. 47 illus.)
Disciplina 502.85
Collana Information Systems and Applications, incl. Internet/Web, and HCI
Soggetto topico Health informatics
Computers
Database management
Data mining
Information storage and retrieval
Application software
Health Informatics
Information Systems and Communication Service
Database Management
Data Mining and Knowledge Discovery
Information Storage and Retrieval
Information Systems Applications (incl. Internet)
Soggetto non controllato Smart health
ICSH
ISBN 3-642-39844-8
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Information Sharing, Integrating and Extraction -- Mining Clinical and Medical Data -- Smart Health Applications.
Record Nr. UNISA-996466037503316
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2013
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Smart Health [[electronic resource] ] : International Conference, ICSH 2013, Beijing, China, August 3-4, 2013. Proceedings / / edited by Daniel Zeng, Christopher C. Yang, Vincent S. Tseng, Chunxiao Xing, Hsinchun Chen, Fei-Yue Wang, Xiaolong Zheng
Smart Health [[electronic resource] ] : International Conference, ICSH 2013, Beijing, China, August 3-4, 2013. Proceedings / / edited by Daniel Zeng, Christopher C. Yang, Vincent S. Tseng, Chunxiao Xing, Hsinchun Chen, Fei-Yue Wang, Xiaolong Zheng
Edizione [1st ed. 2013.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2013
Descrizione fisica 1 online resource (XII, 151 p. 47 illus.)
Disciplina 502.85
Collana Information Systems and Applications, incl. Internet/Web, and HCI
Soggetto topico Health informatics
Computers
Database management
Data mining
Information storage and retrieval
Application software
Health Informatics
Information Systems and Communication Service
Database Management
Data Mining and Knowledge Discovery
Information Storage and Retrieval
Information Systems Applications (incl. Internet)
Soggetto non controllato Smart health
ICSH
ISBN 3-642-39844-8
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Information Sharing, Integrating and Extraction -- Mining Clinical and Medical Data -- Smart Health Applications.
Record Nr. UNINA-9910483820703321
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2013
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui