Intelligence and Security Informatics Pacific Asia Workshop, PAISI 2007, Chengdu, China, April 11-12, 2007. Proceedings /

Intelligence and security informatics (ISI) is concerned with the study of the development and use of advanced information technologies and systems for national, international, and societal security-related applications. The annual IEEE International Conference series on ISI was started in 2003 and...

Πλήρης περιγραφή

Λεπτομέρειες βιβλιογραφικής εγγραφής
Συγγραφή απο Οργανισμό/Αρχή: SpringerLink (Online service)
Άλλοι συγγραφείς: Yang, Christopher C. (Επιμελητής έκδοσης), Zeng, Daniel (Επιμελητής έκδοσης), Chau, Michael (Επιμελητής έκδοσης), Chang, Kuiyu (Επιμελητής έκδοσης), Yang, Qing (Επιμελητής έκδοσης), Cheng, Xueqi (Επιμελητής έκδοσης), Wang, Jue (Επιμελητής έκδοσης), Wang, Fei-Yue (Επιμελητής έκδοσης), Chen, Hsinchun (Επιμελητής έκδοσης)
Μορφή: Ηλεκτρονική πηγή Ηλ. βιβλίο
Γλώσσα:English
Έκδοση: Berlin, Heidelberg : Springer Berlin Heidelberg, 2007.
Σειρά:Lecture Notes in Computer Science, 4430
Θέματα:
Διαθέσιμο Online:Full Text via HEAL-Link
Πίνακας περιεχομένων:
  • Keynote
  • Exploring Extremism and Terrorism on the Web: The Dark Web Project
  • Long Papers
  • Analyzing and Visualizing Gray Web Forum Structure
  • An Empirical Analysis of Online Gaming Crime Characteristics from 2002 to 2004
  • Detecting Cyber Security Threats in Weblogs Using Probabilistic Models
  • What-if Emergency Management System: A Generalized Voronoi Diagram Approach
  • Agent Based Framework for Emergency Rescue and Assistance Planning
  • Object Tracking with Self-updating Tracking Window
  • A Case-Based Evolutionary Group Decision Support Method for Emergency Response
  • Lightweight Anomaly Intrusion Detection in Wireless Sensor Networks
  • ASITL: Adaptive Secure Interoperation Using Trust-Level
  • A RT0-Based Compliance Checker Model for Automated Trust Negotiation
  • TCM-KNN Algorithm for Supervised Network Intrusion Detection
  • Research on Hidden Markov Model for System Call Anomaly Detection
  • Towards Identifying True Threat from Network Security Data
  • Security Assessment for Application Network Services Using Fault Injection
  • A Secure Data Transmission Protocol for Mobile Ad Hoc Networks
  • Defending DDoS Attacks Using Hidden Markov Models and Cooperative Reinforcement Learning
  • A Novel Relational Database Watermarking Algorithm
  • Short Papers
  • Anticipatory Event Detection for Bursty Events
  • Community Detection in Scale-Free Networks Based on Hypergraph Model
  • The Treelike Assembly Classifier for Pedestrian Detection
  • A Proposed Data Mining Approach for Internet Auction Fraud Detection
  • Trends in Computer Crime and Cybercrime Research During the Period 1974-2006: A Bibliometric Approach
  • The Study of Government Website Information Disclosure in Taiwan
  • Informed Recognition in Software Watermarking
  • An Inference Control Algorithm for RDF(S) Repository
  • PPIDS: Privacy Preserving Intrusion Detection System
  • Evaluating the Disaster Defense Ability of Information Systems
  • Airline Safety Evaluation Based on Fuzzy TOPSIS
  • A Framework for Proving the Security of Data Transmission Protocols in Sensor Network
  • Port and Address Hopping for Active Cyber-Defense
  • A Hybrid Model for Worm Simulations in a Large Network
  • Posters
  • A Web Portal for Terrorism Activities in China
  • An Overview of Telemarketing Fraud Problems and Countermeasures in Taiwan
  • Mining the Core Member of Terrorist Crime Group Based on Social Network Analysis
  • Providing Personalized Services for HWME System by Item-Based Collaborative Filtering
  • An Intelligent Agent-Oriented System for Integrating Network Security Devices and Handling Large Amount of Security Events
  • Link Analysis-Based Detection of Anomalous Communication Patterns
  • Social Modeling and Reasoning for Security Informatics
  • Detecting Botnets by Analyzing DNS Traffic
  • HMM-Based Approach for Evaluating Risk Propagation
  • A Symptom-Based Taxonomy for an Early Detection of Network Attacks.