Intelligence and Security Informatics (eBook, PDF)
Pacific Asia Workshop, PAISI 2007, Chengdu, China, April 11-12, 2007, Proceedings
Redaktion: Yang, Christopher C.; Chen, Hsinchun; Wang, Fei-Yue; Wang, Jue; Cheng, Xueqi; Yang, Qing; Chang, Kuiyu; Chau, Michael; Zeng, Daniel
40,95 €
40,95 €
inkl. MwSt.
Sofort per Download lieferbar
20 °P sammeln
40,95 €
Als Download kaufen
40,95 €
inkl. MwSt.
Sofort per Download lieferbar
20 °P sammeln
Jetzt verschenken
Alle Infos zum eBook verschenken
40,95 €
inkl. MwSt.
Sofort per Download lieferbar
Alle Infos zum eBook verschenken
20 °P sammeln
Intelligence and Security Informatics (eBook, PDF)
Pacific Asia Workshop, PAISI 2007, Chengdu, China, April 11-12, 2007, Proceedings
Redaktion: Yang, Christopher C.; Chen, Hsinchun; Wang, Fei-Yue; Wang, Jue; Cheng, Xueqi; Yang, Qing; Chang, Kuiyu; Chau, Michael; Zeng, Daniel
- Format: PDF
- Merkliste
- Auf die Merkliste
- Bewerten Bewerten
- Teilen
- Produkt teilen
- Produkterinnerung
- Produkterinnerung
Bitte loggen Sie sich zunächst in Ihr Kundenkonto ein oder registrieren Sie sich bei
bücher.de, um das eBook-Abo tolino select nutzen zu können.
Hier können Sie sich einloggen
Hier können Sie sich einloggen
Sie sind bereits eingeloggt. Klicken Sie auf 2. tolino select Abo, um fortzufahren.
Bitte loggen Sie sich zunächst in Ihr Kundenkonto ein oder registrieren Sie sich bei bücher.de, um das eBook-Abo tolino select nutzen zu können.
This book constitutes the refereed proceedings of the Pacific Asia Workshop on Intelligence and Security Informatics, PAISI 2007, held in Chengdu, China in April 2007. Coverage includes crime analysis, emergency response and surveillance, intrusion detection, network security, data and text mining, cybercrime and information access and security, intrusion detection, network security, terrorism informatics and crime analysis.
- Geräte: PC
- ohne Kopierschutz
- eBook Hilfe
- Größe: 12.12MB
Andere Kunden interessierten sich auch für
- Intelligence and Security Informatics (eBook, PDF)73,95 €
- Information Security Practice and Experience (eBook, PDF)40,95 €
- Intelligence and Security Informatics (eBook, PDF)40,95 €
- Information Security Practice and Experience (eBook, PDF)40,95 €
- Information and Cyber Security (eBook, PDF)40,95 €
- Intelligence and Security Informatics (eBook, PDF)40,95 €
- Information Systems Security (eBook, PDF)40,95 €
-
-
-
This book constitutes the refereed proceedings of the Pacific Asia Workshop on Intelligence and Security Informatics, PAISI 2007, held in Chengdu, China in April 2007. Coverage includes crime analysis, emergency response and surveillance, intrusion detection, network security, data and text mining, cybercrime and information access and security, intrusion detection, network security, terrorism informatics and crime analysis.
Dieser Download kann aus rechtlichen Gründen nur mit Rechnungsadresse in A, B, BG, CY, CZ, D, DK, EW, E, FIN, F, GR, HR, H, IRL, I, LT, L, LR, M, NL, PL, P, R, S, SLO, SK ausgeliefert werden.
Produktdetails
- Produktdetails
- Verlag: Springer Berlin Heidelberg
- Seitenzahl: 332
- Erscheinungstermin: 10. Juli 2007
- Englisch
- ISBN-13: 9783540715498
- Artikelnr.: 44126590
- Verlag: Springer Berlin Heidelberg
- Seitenzahl: 332
- Erscheinungstermin: 10. Juli 2007
- Englisch
- ISBN-13: 9783540715498
- Artikelnr.: 44126590
- Herstellerkennzeichnung Die Herstellerinformationen sind derzeit nicht verfügbar.
Christopher C. Yang, The Chinese University of Hong Kong, China / Daniel Zeng, University of Arizona, AZ, USA / Michael Chau, University of Hong Kong, China / Kuiyu Chang, Nanyang Technological University, Singapore / Qing Yang, Chinese Academy of Sciences, China / Xueqi Cheng, Chinese Academy of Sciences, China / Jue Wang, Chinese Academy of Sciences, China / Fei-Yue Wang, Chinese Academy of Sciences, China / Hsinchun Chen, University of Arizona, AZ, USA
Keynote.- Exploring Extremism and Terrorism on the Web: The Dark Web Project.- Long Papers.- Analyzing and Visualizing Gray Web Forum Structure.- An Empirical Analysis of Online Gaming Crime Characteristics from 2002 to 2004.- Detecting Cyber Security Threats in Weblogs Using Probabilistic Models.- What-if Emergency Management System: A Generalized Voronoi Diagram Approach.- Agent Based Framework for Emergency Rescue and Assistance Planning.- Object Tracking with Self-updating Tracking Window.- A Case-Based Evolutionary Group Decision Support Method for Emergency Response.- Lightweight Anomaly Intrusion Detection in Wireless Sensor Networks.- ASITL: Adaptive Secure Interoperation Using Trust-Level.- A RT0-Based Compliance Checker Model for Automated Trust Negotiation.- TCM-KNN Algorithm for Supervised Network Intrusion Detection.- Research on Hidden Markov Model for System Call Anomaly Detection.- Towards Identifying True Threat from Network Security Data.- Security Assessment for Application Network Services Using Fault Injection.- A Secure Data Transmission Protocol for Mobile Ad Hoc Networks.- Defending DDoS Attacks Using Hidden Markov Models and Cooperative Reinforcement Learning.- A Novel Relational Database Watermarking Algorithm.- Short Papers.- Anticipatory Event Detection for Bursty Events.- Community Detection in Scale-Free Networks Based on Hypergraph Model.- The Treelike Assembly Classifier for Pedestrian Detection.- A Proposed Data Mining Approach for Internet Auction Fraud Detection.- Trends in Computer Crime and Cybercrime Research During the Period 1974-2006: A Bibliometric Approach.- The Study of Government Website Information Disclosure in Taiwan.- Informed Recognition in Software Watermarking.- An Inference Control Algorithm for RDF(S) Repository.- PPIDS: Privacy Preserving Intrusion Detection System.- Evaluating the Disaster Defense Ability of Information Systems.- Airline Safety Evaluation Based on Fuzzy TOPSIS.- A Framework for Proving the Security of Data Transmission Protocols in Sensor Network.- Port and Address Hopping for Active Cyber-Defense.- A Hybrid Model for Worm Simulations in a Large Network.- Posters.- A Web Portal for Terrorism Activities in China.- An Overview of Telemarketing Fraud Problems and Countermeasures in Taiwan.- Mining the Core Member of Terrorist Crime Group Based on Social Network Analysis.- Providing Personalized Services for HWME System by Item-Based Collaborative Filtering.- An Intelligent Agent-Oriented System for Integrating Network Security Devices and Handling Large Amount of Security Events.- Link Analysis-Based Detection of Anomalous Communication Patterns.- Social Modeling and Reasoning for Security Informatics.- Detecting Botnets by Analyzing DNS Traffic.- HMM-Based Approach for Evaluating Risk Propagation.- A Symptom-Based Taxonomy for an Early Detection of Network Attacks.
Keynote.- Exploring Extremism and Terrorism on the Web: The Dark Web Project.- Long Papers.- Analyzing and Visualizing Gray Web Forum Structure.- An Empirical Analysis of Online Gaming Crime Characteristics from 2002 to 2004.- Detecting Cyber Security Threats in Weblogs Using Probabilistic Models.- What-if Emergency Management System: A Generalized Voronoi Diagram Approach.- Agent Based Framework for Emergency Rescue and Assistance Planning.- Object Tracking with Self-updating Tracking Window.- A Case-Based Evolutionary Group Decision Support Method for Emergency Response.- Lightweight Anomaly Intrusion Detection in Wireless Sensor Networks.- ASITL: Adaptive Secure Interoperation Using Trust-Level.- A RT0-Based Compliance Checker Model for Automated Trust Negotiation.- TCM-KNN Algorithm for Supervised Network Intrusion Detection.- Research on Hidden Markov Model for System Call Anomaly Detection.- Towards Identifying True Threat from Network Security Data.- Security Assessment for Application Network Services Using Fault Injection.- A Secure Data Transmission Protocol for Mobile Ad Hoc Networks.- Defending DDoS Attacks Using Hidden Markov Models and Cooperative Reinforcement Learning.- A Novel Relational Database Watermarking Algorithm.- Short Papers.- Anticipatory Event Detection for Bursty Events.- Community Detection in Scale-Free Networks Based on Hypergraph Model.- The Treelike Assembly Classifier for Pedestrian Detection.- A Proposed Data Mining Approach for Internet Auction Fraud Detection.- Trends in Computer Crime and Cybercrime Research During the Period 1974-2006: A Bibliometric Approach.- The Study of Government Website Information Disclosure in Taiwan.- Informed Recognition in Software Watermarking.- An Inference Control Algorithm for RDF(S) Repository.- PPIDS: Privacy Preserving Intrusion Detection System.- Evaluating the Disaster Defense Ability of Information Systems.- Airline Safety Evaluation Based on Fuzzy TOPSIS.- A Framework for Proving the Security of Data Transmission Protocols in Sensor Network.- Port and Address Hopping for Active Cyber-Defense.- A Hybrid Model for Worm Simulations in a Large Network.- Posters.- A Web Portal for Terrorism Activities in China.- An Overview of Telemarketing Fraud Problems and Countermeasures in Taiwan.- Mining the Core Member of Terrorist Crime Group Based on Social Network Analysis.- Providing Personalized Services for HWME System by Item-Based Collaborative Filtering.- An Intelligent Agent-Oriented System for Integrating Network Security Devices and Handling Large Amount of Security Events.- Link Analysis-Based Detection of Anomalous Communication Patterns.- Social Modeling and Reasoning for Security Informatics.- Detecting Botnets by Analyzing DNS Traffic.- HMM-Based Approach for Evaluating Risk Propagation.- A Symptom-Based Taxonomy for an Early Detection of Network Attacks.