|
|
|
|
LEADER |
05897nam a22006255i 4500 |
001 |
978-3-540-25952-7 |
003 |
DE-He213 |
005 |
20151204183852.0 |
007 |
cr nn 008mamaa |
008 |
121227s2004 gw | s |||| 0|eng d |
020 |
|
|
|a 9783540259527
|9 978-3-540-25952-7
|
024 |
7 |
|
|a 10.1007/b98042
|2 doi
|
040 |
|
|
|d GrThAP
|
050 |
|
4 |
|a Q334-342
|
050 |
|
4 |
|a TJ210.2-211.495
|
072 |
|
7 |
|a UYQ
|2 bicssc
|
072 |
|
7 |
|a TJFM1
|2 bicssc
|
072 |
|
7 |
|a COM004000
|2 bisacsh
|
082 |
0 |
4 |
|a 006.3
|2 23
|
245 |
1 |
0 |
|a Intelligence and Security Informatics
|h [electronic resource] :
|b Second Symposium on Intelligence and Security Informatics, ISI 2004, Tucson, AZ, USA, June 10-11, 2004. Proceedings /
|c edited by Hsinchun Chen, Reagan Moore, Daniel D. Zeng, John Leavitt.
|
264 |
|
1 |
|a Berlin, Heidelberg :
|b Springer Berlin Heidelberg,
|c 2004.
|
300 |
|
|
|a XVI, 544 p.
|b online resource.
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a text file
|b PDF
|2 rda
|
490 |
1 |
|
|a Lecture Notes in Computer Science,
|x 0302-9743 ;
|v 3073
|
505 |
0 |
|
|a Full Papers -- Aligning Simulation Models of Smallpox Outbreaks -- Data Analytics for Bioterrorism Surveillance -- West Nile Virus and Botulism Portal: A Case Study in Infectious Disease Informatics -- A Novel Policy and Information Flow Security Model for Active Network -- A Novel Autonomous Trust Management Model for Mobile Agents -- Privacy-Preserving Inter-database Operations -- Finding Unusual Correlation Using Matrix Decompositions -- Generating Concept Hierarchies from Text for Intelligence Analysis -- Interactive Query Languages for Intelligence Tasks -- Terrorism Knowledge Discovery Project: A Knowledge Discovery Approach to Addressing the Threats of Terrorism -- The Architecture of the Cornell Knowledge Broker -- Computer-Based Training for Deception Detection: What Users Want? -- Identifying Multi-ID Users in Open Forums -- Self-efficacy, Training Effectiveness, and Deception Detection: A Longitudinal Study of Lie Detection Training -- Composite Role-Based Monitoring (CRBM) for Countering Insider Threats -- Critical Infrastructure Integration Modeling and Simulation -- Mining Normal and Intrusive Activity Patterns for Computer Intrusion Detection -- The Optimal Deployment of Filters to Limit Forged Address Attacks in Communication Networks -- A Tool for Internet Chatroom Surveillance -- ChatTrack: Chat Room Topic Detection Using Classification -- SECRETS: A Secure Real-Time Multimedia Surveillance System -- Studying E-Mail Graphs for Intelligence Monitoring and Analysis in the Absence of Semantic Information -- THEMIS: Threat Evaluation Metamodel for Information Systems -- Balancing Security and Privacy in the 21 st Century -- IT Security Risk Management under Network Effects and Layered Protection Strategy -- Mind the Gap: The Growing Distance between Institutional and Technical Capabilities in Organizations Performing Critical Operations -- Analyzing and Visualizing Criminal Network Dynamics: A Case Study -- Discovering Hidden Groups in Communication Networks -- Generating Networks of Illegal Drug Users Using Large Samples of Partial Ego-Network Data -- Short Papers -- Using Speech Act Profiling for Deception Detection -- Testing Various Modes of Computer-Based Training for Deception Detection -- The Use of Data Mining Techniques in Operational Crime Fighting -- Spatial Forecast Methods for Terrorist Events in Urban Environments -- Web-Based Intelligence Notification System: Architecture and Design -- Cross-Lingual Semantics for Crime Analysis Using Associate Constraint Network -- Experimental Studies Using Median Polish Procedure to Reduce Alarm Rates in Data Cubes of Intrusion Data -- Information Sharing and Collaboration Policies within Government Agencies -- Intrusion-Tolerant Intrusion Detection System -- Optimal Redundancy Allocation for Disaster Recovery Planning in the Network Economy -- Semantic Analysis for Monitoring Insider Threats -- Towards a Social Network Approach for Monitoring Insider Threats to Information Security -- Extended Abstracts for Posters -- Policy-Based Information Sharing with Semantics -- Determining the Gender of the Unseen Name through Hyphenation -- A Framework for a Secure Federated Patient Healthcare System -- Vulnerability Analysis and Evaluation within an Intranet -- Security Informatics: A Paradigm Shift in Information Technology Education -- Research of Characteristics of Worm Traffic -- Panel Discussion Papers -- MIPT: Sharing Terrorism Information Resources -- Post-9/11 Evolution of Al Qaeda -- Utilizing the Social and Behavioral Sciences to Assess, Model, Forecast and Preemptively Respond to Terrorism.
|
650 |
|
0 |
|a Computer science.
|
650 |
|
0 |
|a Operating systems (Computers).
|
650 |
|
0 |
|a Information storage and retrieval.
|
650 |
|
0 |
|a Artificial intelligence.
|
650 |
|
0 |
|a Computers and civilization.
|
650 |
|
0 |
|a Computers.
|
650 |
|
0 |
|a Law and legislation.
|
650 |
1 |
4 |
|a Computer Science.
|
650 |
2 |
4 |
|a Artificial Intelligence (incl. Robotics).
|
650 |
2 |
4 |
|a Information Systems Applications (incl. Internet).
|
650 |
2 |
4 |
|a Information Storage and Retrieval.
|
650 |
2 |
4 |
|a Operating Systems.
|
650 |
2 |
4 |
|a Computers and Society.
|
650 |
2 |
4 |
|a Legal Aspects of Computing.
|
700 |
1 |
|
|a Chen, Hsinchun.
|e editor.
|
700 |
1 |
|
|a Moore, Reagan.
|e editor.
|
700 |
1 |
|
|a Zeng, Daniel D.
|e editor.
|
700 |
1 |
|
|a Leavitt, John.
|e editor.
|
710 |
2 |
|
|a SpringerLink (Online service)
|
773 |
0 |
|
|t Springer eBooks
|
776 |
0 |
8 |
|i Printed edition:
|z 9783540221258
|
830 |
|
0 |
|a Lecture Notes in Computer Science,
|x 0302-9743 ;
|v 3073
|
856 |
4 |
0 |
|u http://dx.doi.org/10.1007/b98042
|z Full Text via HEAL-Link
|
912 |
|
|
|a ZDB-2-SCS
|
912 |
|
|
|a ZDB-2-LNC
|
912 |
|
|
|a ZDB-2-BAE
|
950 |
|
|
|a Computer Science (Springer-11645)
|