top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Intelligence and security informatics : Pacific Asia workshop, Paisi 2010, Hyderabad, India, June 21, 2010. proceedings / / Hsinchun Chen ... [et al.] (eds.)
Intelligence and security informatics : Pacific Asia workshop, Paisi 2010, Hyderabad, India, June 21, 2010. proceedings / / Hsinchun Chen ... [et al.] (eds.)
Edizione [1st ed. 2010.]
Pubbl/distr/stampa New York, : Springer, 2010
Descrizione fisica 1 online resource (183 p. 50 illus.)
Disciplina 005.82
Altri autori (Persone) ChenHsinchun
Collana Lecture notes in computer science
Soggetto topico Expert systems (Computer science) - Pacific Area
Data mining - Pacific Area
Computer security - Pacific Area
Electronic surveillance - Pacific Area
National security - Pacific Area
ISBN 1-280-38713-0
9786613565051
3-642-13601-X
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Terrorism Informatics and Crime Analysis -- Combined Detection Model for Criminal Network Detection -- An Association Model for Implicit Crime Link Analysis -- Design and Deployment of a National Detecting Stolen Vehicles Network System -- Fighting Cybercrime: A KM Perspective -- Transportation Infrastructure Security -- Trajectory Similarity of Network Constrained Moving Objects and Applications to Traffic Security -- An Emergent Traffic Messaging Service Using Wireless Technology -- Information Access and Security -- A Model for Detecting “Global Footprint Anomalies” in a Grid Environment -- Secure Anonymous Routing for MANETs Using Distributed Dynamic Random Path Selection -- MAD-IDS: Novel Intrusion Detection System Using Mobile Agents and Data Mining Approaches -- Data Encryption -- Fuzzy Biometric Signcryption Scheme with Bilinear Pairings in the Standard Model -- Key Independent Decryption of Graphically Encrypted Images -- Towards Confidentiality of ID-Based Signcryption Schemes under without Random Oracle Model -- JPEG Steganalysis Using HBCL Statistics and FR Index -- Data and Text Mining -- Text Mining Technique for Chinese Written Judgment of Criminal Case -- Exploration of Document Relation Quality with Consideration of Term Representation Basis, Term Weighting and Association Measure -- Identifying Controversial Issues and Their Sub-topics in News Articles -- Efficient Privacy Preserving K-Means Clustering -- A Fuzzy Threshold Based Modified Clustering Algorithm for Natural Data Exploration.
Record Nr. UNINA-9910483250103321
New York, : Springer, 2010
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Intelligence and security informatics : Pacific Asia Workshop, PAISI 2007, Chengdu, China, April 11-12, 2007 : proceedings / / Christopher C. Yang [and eight others] (eds.)
Intelligence and security informatics : Pacific Asia Workshop, PAISI 2007, Chengdu, China, April 11-12, 2007 : proceedings / / Christopher C. Yang [and eight others] (eds.)
Edizione [1st ed. 2007.]
Pubbl/distr/stampa Berlin, Germany ; ; New York, New York : , : Springer, , [2007]
Descrizione fisica 1 online resource (340 p.)
Disciplina 006.33
Collana Information Systems and Applications, incl. Internet/Web, and HCI
Soggetto topico Computer security - Pacific Area
Data mining - Pacific Area
Electronic surveillance - Pacific Area
Expert systems (Computer science) - Pacific Area
National security - Pacific Area
ISBN 1-280-95173-7
9786610951734
3-540-71549-5
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Keynote -- Exploring Extremism and Terrorism on the Web: The Dark Web Project -- Long Papers -- Analyzing and Visualizing Gray Web Forum Structure -- An Empirical Analysis of Online Gaming Crime Characteristics from 2002 to 2004 -- Detecting Cyber Security Threats in Weblogs Using Probabilistic Models -- What-if Emergency Management System: A Generalized Voronoi Diagram Approach -- Agent Based Framework for Emergency Rescue and Assistance Planning -- Object Tracking with Self-updating Tracking Window -- A Case-Based Evolutionary Group Decision Support Method for Emergency Response -- Lightweight Anomaly Intrusion Detection in Wireless Sensor Networks -- ASITL: Adaptive Secure Interoperation Using Trust-Level -- A RT0-Based Compliance Checker Model for Automated Trust Negotiation -- TCM-KNN Algorithm for Supervised Network Intrusion Detection -- Research on Hidden Markov Model for System Call Anomaly Detection -- Towards Identifying True Threat from Network Security Data -- Security Assessment for Application Network Services Using Fault Injection -- A Secure Data Transmission Protocol for Mobile Ad Hoc Networks -- Defending DDoS Attacks Using Hidden Markov Models and Cooperative Reinforcement Learning -- A Novel Relational Database Watermarking Algorithm -- Short Papers -- Anticipatory Event Detection for Bursty Events -- Community Detection in Scale-Free Networks Based on Hypergraph Model -- The Treelike Assembly Classifier for Pedestrian Detection -- A Proposed Data Mining Approach for Internet Auction Fraud Detection -- Trends in Computer Crime and Cybercrime Research During the Period 1974-2006: A Bibliometric Approach -- The Study of Government Website Information Disclosure in Taiwan -- Informed Recognition in Software Watermarking -- An Inference Control Algorithm for RDF(S) Repository -- PPIDS: Privacy Preserving Intrusion Detection System -- Evaluating the Disaster Defense Ability of Information Systems -- Airline Safety Evaluation Based on Fuzzy TOPSIS -- A Framework for Proving the Security of Data Transmission Protocols in Sensor Network -- Port and Address Hopping for Active Cyber-Defense -- A Hybrid Model for Worm Simulations in a Large Network -- Posters -- A Web Portal for Terrorism Activities in China -- An Overview of Telemarketing Fraud Problems and Countermeasures in Taiwan -- Mining the Core Member of Terrorist Crime Group Based on Social Network Analysis -- Providing Personalized Services for HWME System by Item-Based Collaborative Filtering -- An Intelligent Agent-Oriented System for Integrating Network Security Devices and Handling Large Amount of Security Events -- Link Analysis-Based Detection of Anomalous Communication Patterns -- Social Modeling and Reasoning for Security Informatics -- Detecting Botnets by Analyzing DNS Traffic -- HMM-Based Approach for Evaluating Risk Propagation -- A Symptom-Based Taxonomy for an Early Detection of Network Attacks.
Altri titoli varianti PAISI 2007
Pacific Asia Workshop
Record Nr. UNINA-9910484541303321
Berlin, Germany ; ; New York, New York : , : Springer, , [2007]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Intelligence and security informatics : Pacific Asia Workshop, PAISI 2007, Chengdu, China, April 11-12, 2007 : proceedings / / Christopher C. Yang [and eight others] (eds.)
Intelligence and security informatics : Pacific Asia Workshop, PAISI 2007, Chengdu, China, April 11-12, 2007 : proceedings / / Christopher C. Yang [and eight others] (eds.)
Edizione [1st ed. 2007.]
Pubbl/distr/stampa Berlin, Germany ; ; New York, New York : , : Springer, , [2007]
Descrizione fisica 1 online resource (340 p.)
Disciplina 006.33
Collana Information Systems and Applications, incl. Internet/Web, and HCI
Soggetto topico Computer security - Pacific Area
Data mining - Pacific Area
Electronic surveillance - Pacific Area
Expert systems (Computer science) - Pacific Area
National security - Pacific Area
ISBN 1-280-95173-7
9786610951734
3-540-71549-5
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Keynote -- Exploring Extremism and Terrorism on the Web: The Dark Web Project -- Long Papers -- Analyzing and Visualizing Gray Web Forum Structure -- An Empirical Analysis of Online Gaming Crime Characteristics from 2002 to 2004 -- Detecting Cyber Security Threats in Weblogs Using Probabilistic Models -- What-if Emergency Management System: A Generalized Voronoi Diagram Approach -- Agent Based Framework for Emergency Rescue and Assistance Planning -- Object Tracking with Self-updating Tracking Window -- A Case-Based Evolutionary Group Decision Support Method for Emergency Response -- Lightweight Anomaly Intrusion Detection in Wireless Sensor Networks -- ASITL: Adaptive Secure Interoperation Using Trust-Level -- A RT0-Based Compliance Checker Model for Automated Trust Negotiation -- TCM-KNN Algorithm for Supervised Network Intrusion Detection -- Research on Hidden Markov Model for System Call Anomaly Detection -- Towards Identifying True Threat from Network Security Data -- Security Assessment for Application Network Services Using Fault Injection -- A Secure Data Transmission Protocol for Mobile Ad Hoc Networks -- Defending DDoS Attacks Using Hidden Markov Models and Cooperative Reinforcement Learning -- A Novel Relational Database Watermarking Algorithm -- Short Papers -- Anticipatory Event Detection for Bursty Events -- Community Detection in Scale-Free Networks Based on Hypergraph Model -- The Treelike Assembly Classifier for Pedestrian Detection -- A Proposed Data Mining Approach for Internet Auction Fraud Detection -- Trends in Computer Crime and Cybercrime Research During the Period 1974-2006: A Bibliometric Approach -- The Study of Government Website Information Disclosure in Taiwan -- Informed Recognition in Software Watermarking -- An Inference Control Algorithm for RDF(S) Repository -- PPIDS: Privacy Preserving Intrusion Detection System -- Evaluating the Disaster Defense Ability of Information Systems -- Airline Safety Evaluation Based on Fuzzy TOPSIS -- A Framework for Proving the Security of Data Transmission Protocols in Sensor Network -- Port and Address Hopping for Active Cyber-Defense -- A Hybrid Model for Worm Simulations in a Large Network -- Posters -- A Web Portal for Terrorism Activities in China -- An Overview of Telemarketing Fraud Problems and Countermeasures in Taiwan -- Mining the Core Member of Terrorist Crime Group Based on Social Network Analysis -- Providing Personalized Services for HWME System by Item-Based Collaborative Filtering -- An Intelligent Agent-Oriented System for Integrating Network Security Devices and Handling Large Amount of Security Events -- Link Analysis-Based Detection of Anomalous Communication Patterns -- Social Modeling and Reasoning for Security Informatics -- Detecting Botnets by Analyzing DNS Traffic -- HMM-Based Approach for Evaluating Risk Propagation -- A Symptom-Based Taxonomy for an Early Detection of Network Attacks.
Altri titoli varianti PAISI 2007
Pacific Asia Workshop
Record Nr. UNISA-996465998003316
Berlin, Germany ; ; New York, New York : , : Springer, , [2007]
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui