Benutzerdefiniertes Cover
Benutzerdefiniertes Cover
Normale Ansicht MARC-Ansicht ISBD

Intelligence and Security Informatics : Pacific Asia Workshop, PAISI 2010, Hyderabad, India, June 21, 2010. Proceedings / edited by Hsinchun Chen, Michael Chau, Shu-hsing Li, Shalini Urs, Srinath Srinivasa, G. Alan Wang

Von: Mitwirkende(r): Resource type: Ressourcentyp: Buch (Online)Buch (Online)Sprache: Englisch Reihen: SpringerLink Bücher | Lecture notes in computer science ; 6122Verlag: Berlin, Heidelberg : Springer Berlin Heidelberg, 2010Beschreibung: Online-Ressource (183p. 50 illus, digital)ISBN:
  • 9783642136016
Schlagwörter: Genre/Form: Andere physische Formen: 9783642136009 | Buchausg. u.d.T.: Intelligence and security informatics. Berlin : Springer, 2010. X, 172 S.DDC-Klassifikation:
  • 005.82
  • 005.824 23
  • 004
  • 004 360
LOC-Klassifikation:
  • QA76.9.A25
  • QA76.76.E95
DOI: DOI: 10.1007/978-3-642-13601-6Online-Ressourcen: Zusammenfassung: Terrorism Informatics and Crime Analysis -- Combined Detection Model for Criminal Network Detection -- An Association Model for Implicit Crime Link Analysis -- Design and Deployment of a National Detecting Stolen Vehicles Network System -- Fighting Cybercrime: A KM Perspective -- Transportation Infrastructure Security -- Trajectory Similarity of Network Constrained Moving Objects and Applications to Traffic Security -- An Emergent Traffic Messaging Service Using Wireless Technology -- Information Access and Security -- A Model for Detecting “Global Footprint Anomalies” in a Grid Environment -- Secure Anonymous Routing for MANETs Using Distributed Dynamic Random Path Selection -- MAD-IDS: Novel Intrusion Detection System Using Mobile Agents and Data Mining Approaches -- Data Encryption -- Fuzzy Biometric Signcryption Scheme with Bilinear Pairings in the Standard Model -- Key Independent Decryption of Graphically Encrypted Images -- Towards Confidentiality of ID-Based Signcryption Schemes under without Random Oracle Model -- JPEG Steganalysis Using HBCL Statistics and FR Index -- Data and Text Mining -- Text Mining Technique for Chinese Written Judgment of Criminal Case -- Exploration of Document Relation Quality with Consideration of Term Representation Basis, Term Weighting and Association Measure -- Identifying Controversial Issues and Their Sub-topics in News Articles -- Efficient Privacy Preserving K-Means Clustering -- A Fuzzy Threshold Based Modified Clustering Algorithm for Natural Data Exploration.PPN: PPN: 1649785666Package identifier: Produktsigel: ZDB-2-LNC | ZDB-2-SCS | ZDB-2-SXCS | ZDB-2-SEB
Dieser Titel hat keine Exemplare