|
|
|
|
LEADER |
03582nam a22005895i 4500 |
001 |
978-3-319-18455-5 |
003 |
DE-He213 |
005 |
20151204182719.0 |
007 |
cr nn 008mamaa |
008 |
150508s2015 gw | s |||| 0|eng d |
020 |
|
|
|a 9783319184555
|9 978-3-319-18455-5
|
024 |
7 |
|
|a 10.1007/978-3-319-18455-5
|2 doi
|
040 |
|
|
|d GrThAP
|
050 |
|
4 |
|a QA76.9.A25
|
072 |
|
7 |
|a UR
|2 bicssc
|
072 |
|
7 |
|a UTN
|2 bicssc
|
072 |
|
7 |
|a COM053000
|2 bisacsh
|
082 |
0 |
4 |
|a 005.8
|2 23
|
245 |
1 |
0 |
|a Intelligence and Security Informatics
|h [electronic resource] :
|b Pacific Asia Workshop, PAISI 2015, Ho Chi Minh City, Vietnam, May 19, 2015. Proceedings /
|c edited by Michael Chau, G. Alan Wang, Hsinchun Chen.
|
264 |
|
1 |
|a Cham :
|b Springer International Publishing :
|b Imprint: Springer,
|c 2015.
|
300 |
|
|
|a VIII, 113 p. 36 illus.
|b online resource.
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a text file
|b PDF
|2 rda
|
490 |
1 |
|
|a Lecture Notes in Computer Science,
|x 0302-9743 ;
|v 9074
|
505 |
0 |
|
|a Media Revealr: A Social Multimedia Monitoring and Intelligence System for Web Multimedia Verification -- Geotagging Social Media Content with a Refined Language Modelling Approach -- Predicting Vehicle Recalls with User-Generated Contents: A Text Mining Approach -- GCM: A Greedy-based Cross-Matching Algorithm for Identifying Users across Multiple Online Social Networks -- P2P Lending Fraud Detection: A Big Data Approach -- Drug Anti-forgery and Tracing System Based on Lightweight Asymmetric Identities -- Chinese Word POS Tagging with Markov Logic -- In Search of Plagiarism Behaviors: An Empirical Study of Online Reviews.
|
520 |
|
|
|a This book constitutes the refereed proceedings of the Pacific Asia Workshop on Intelligence and Security Informatics, PAISI 2015, held in Ho Chi Minh City, Vietnam, in May 2015 in conjunction with PAKDD 2015, the 19th Pacific-Asia Conference on Knowledge Discovery and Data Mining. The 8 revised full papers presented were carefully reviewed and selected from numerous submissions. Topics of the workshop are information sharing and big data analytics, infrastructure protection and emergency responses, cybercrime and terrorism informatics and analytics, as well as enterprise risk management, IS security, and social media analytics. The papers present a significant view on regional data sets and case studies, including online social media and multimedia, fraud deception, and text mining.
|
650 |
|
0 |
|a Computer science.
|
650 |
|
0 |
|a Computer communication systems.
|
650 |
|
0 |
|a Computer security.
|
650 |
|
0 |
|a Data mining.
|
650 |
|
0 |
|a Information storage and retrieval.
|
650 |
|
0 |
|a Computers and civilization.
|
650 |
1 |
4 |
|a Computer Science.
|
650 |
2 |
4 |
|a Systems and Data Security.
|
650 |
2 |
4 |
|a Information Storage and Retrieval.
|
650 |
2 |
4 |
|a Computer Communication Networks.
|
650 |
2 |
4 |
|a Data Mining and Knowledge Discovery.
|
650 |
2 |
4 |
|a Computers and Society.
|
650 |
2 |
4 |
|a Information Systems Applications (incl. Internet).
|
700 |
1 |
|
|a Chau, Michael.
|e editor.
|
700 |
1 |
|
|a Wang, G. Alan.
|e editor.
|
700 |
1 |
|
|a Chen, Hsinchun.
|e editor.
|
710 |
2 |
|
|a SpringerLink (Online service)
|
773 |
0 |
|
|t Springer eBooks
|
776 |
0 |
8 |
|i Printed edition:
|z 9783319184548
|
830 |
|
0 |
|a Lecture Notes in Computer Science,
|x 0302-9743 ;
|v 9074
|
856 |
4 |
0 |
|u http://dx.doi.org/10.1007/978-3-319-18455-5
|z Full Text via HEAL-Link
|
912 |
|
|
|a ZDB-2-SCS
|
912 |
|
|
|a ZDB-2-LNC
|
950 |
|
|
|a Computer Science (Springer-11645)
|