Intelligence and Security Informatics (Record no. 96915)
[ view plain ]
000 -LEADER | |
---|---|
fixed length control field | 07332nam a22006855i 4500 |
001 - CONTROL NUMBER | |
control field | 978-3-540-33362-3 |
003 - CONTROL NUMBER IDENTIFIER | |
control field | DE-He213 |
005 - DATE AND TIME OF LATEST TRANSACTION | |
control field | 20240730202233.0 |
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION | |
fixed length control field | cr nn 008mamaa |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION | |
fixed length control field | 100301s2006 gw | s |||| 0|eng d |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
International Standard Book Number | 9783540333623 |
-- | 978-3-540-33362-3 |
024 7# - OTHER STANDARD IDENTIFIER | |
Standard number or code | 10.1007/11734628 |
Source of number or code | doi |
050 #4 - LIBRARY OF CONGRESS CALL NUMBER | |
Classification number | QA76.76.A65 |
072 #7 - SUBJECT CATEGORY CODE | |
Subject category code | UB |
Source | bicssc |
072 #7 - SUBJECT CATEGORY CODE | |
Subject category code | COM005000 |
Source | bisacsh |
072 #7 - SUBJECT CATEGORY CODE | |
Subject category code | UX |
Source | thema |
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER | |
Classification number | 005.3 |
Edition number | 23 |
245 10 - TITLE STATEMENT | |
Title | Intelligence and Security Informatics |
Medium | [electronic resource] : |
Remainder of title | International Workshop, WISI 2006, Singapore, April 9, 2006, Proceedings / |
Statement of responsibility, etc. | edited by Hsinchun Chen, Feiyue Wang, Christopher C. Yang, Daniel Zeng, Michael Chau, Kuiyu Chang. |
250 ## - EDITION STATEMENT | |
Edition statement | 1st ed. 2006. |
264 #1 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE | |
Place of production, publication, distribution, manufacture | Berlin, Heidelberg : |
Name of producer, publisher, distributor, manufacturer | Springer Berlin Heidelberg : |
-- | Imprint: Springer, |
Date of production, publication, distribution, manufacture, or copyright notice | 2006. |
300 ## - PHYSICAL DESCRIPTION | |
Extent | XII, 188 p. |
Other physical details | online resource. |
336 ## - CONTENT TYPE | |
Content type term | text |
Content type code | txt |
Source | rdacontent |
337 ## - MEDIA TYPE | |
Media type term | computer |
Media type code | c |
Source | rdamedia |
338 ## - CARRIER TYPE | |
Carrier type term | online resource |
Carrier type code | cr |
Source | rdacarrier |
347 ## - DIGITAL FILE CHARACTERISTICS | |
File type | text file |
Encoding format | |
Source | rda |
490 1# - SERIES STATEMENT | |
Series statement | Information Systems and Applications, incl. Internet/Web, and HCI, |
International Standard Serial Number | 2946-1642 ; |
Volume/sequential designation | 3917 |
505 0# - FORMATTED CONTENTS NOTE | |
Formatted contents note | Keynote Speech -- Data Mining for Security Applications -- Web and Text Mining for Terrorism Informatics -- Unraveling International Terrorist Groups' Exploitation of the Web: Technical Sophistication, Media Richness, and Web Interactivity -- Multi-lingual Detection of Terrorist Content on the Web -- INEXT: An Investigative Search Tool for Knowledge Extraction -- Cybercrime Analysis -- Cybercrime in Taiwan - An Analysis of Suspect Records -- Analysis of Computer Crime Characteristics in Taiwan -- A Cross Datasets Referring Outlier Detection Model Applied to Suspicious Financial Transaction Discrimination -- Network Security -- Detecting Novel Network Attacks with a Data Field -- Improving Authentication Accuracy of Unfamiliar Passwords with Pauses and Cues for Keystroke Dynamics-Based Authentication -- Illegal Intrusion Detection Based on Hidden Information Database -- Defender Personality Traits -- Crime Data Mining -- Mining Criminal Databases to Finding Investigation Clues-By Example of Stolen Automobiles Database -- Country Corruption Analysis with Self Organizing Maps and Support Vector Machines -- Temporal Representation in Spike Detection of Sparse Personal Identity Streams -- Mining Positive Associations of Urban Criminal Activities Using Hierarchical Crime Hot Spots -- VCCM Mining: Mining Virtual Community Core Members Based on Gene Expression Programming -- Posters -- Integration of a Cryptographic File System and Access Control -- Applications of Homomorphic Functions to Software Obfuscation -- Security Model for Informational Privacy -- A Viable System for Tracing Illegal Users of Video -- Privacy and Security Enhanced Offline Oblivious Transfer for Massive Data Distribution -- The Effectiveness of Artificial Rhythms and Cues in Keystroke Dynamics Based User Authentication.-Cascade Damage Estimation Model for Internet Attacks -- A New Secure Key Exchange Protocol Between STB and Smart Card in DTV Broadcasting -- A Fuzzy Anomaly Detection System -- Hidden Markov Model Based Intrusion Detection -- One-Class Strategies for Security Information Detection -- Design of an Emergency Prediction and Prevention Platform for Societal Security Decision Support Using Neural Networks -- A Novel Identity Authentication Technique Without Trustworthy Third-Party Based on Fingerprint Verification -- Cyberspace Community Analysis and Simulation Using Complex Dynamic Social Networks -- Analysis of Infectious Disease Data Based on Evolutionary Computation -- Rule+Exception Learning-Based Class Specification and Labeling in Intelligence and Security Analysis -- A Computational Framework for Decision Analysis and Support in ISI: Artificial Societies, Computational Experiments, and Parallel Systems. |
520 ## - SUMMARY, ETC. | |
Summary, etc. | Intelligence and security informatics (ISI) can be broadly defined as the study of the development and use of advanced information technologies and systems for national and international security-related applications. The First and Second Symposiums on ISI were held in Tucson, Arizona, in 2003 and 2004, respectively. In 2005, the IEEE International Conference on ISI was held in Atlanta, Georgia. These ISI conferences brought together academic researchers, law enforcement and intelligence experts, information technology consultants and practitioners to discuss their research and practice related to various ISI topics including ISI data management, data and text mining for ISI applications, terrorism informatics, deception detection, terrorist and criminal social network analysis, crime analysis, monitoring and surveillance, policy studies and evaluation, and information assurance, among others. We continued these stream of ISI conferences by organizing the Workshop on Intelligence and Security Informatics (WISI 2006) in conjunction with the Pacific Asia Conference on Knowledge Discovery and Data Mining (PAKDD 2006). WISI 2006 provided a stimulating forum for ISI researchers in Pacific Asia and other regions of the world to exchange ideas and report research progress. WISI 2006 was hosted by the Chinese University of Hong Kong, the University of Arizona, the Nanyang Technological University, and the Chinese Academy of Sciences. The one-day program included one keynote speech, four refereed paper sessions, two invited sessions and a poster reception. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | Application software. |
9 (RLIN) | 170511 |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | Information storage and retrieval systems. |
9 (RLIN) | 22213 |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | Computer networks . |
9 (RLIN) | 31572 |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | Computers and civilization. |
9 (RLIN) | 21733 |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | Computers |
General subdivision | Law and legislation. |
9 (RLIN) | 75151 |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | Information technology |
General subdivision | Law and legislation. |
9 (RLIN) | 82531 |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | Electronic data processing |
General subdivision | Management. |
9 (RLIN) | 170512 |
650 14 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | Computer and Information Systems Applications. |
9 (RLIN) | 170513 |
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | Information Storage and Retrieval. |
9 (RLIN) | 23927 |
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | Computer Communication Networks. |
9 (RLIN) | 170514 |
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | Computers and Society. |
9 (RLIN) | 31668 |
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | Legal Aspects of Computing. |
9 (RLIN) | 53952 |
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | IT Operations. |
9 (RLIN) | 31703 |
700 1# - ADDED ENTRY--PERSONAL NAME | |
Personal name | Chen, Hsinchun. |
Relator term | editor. |
Relationship | edt |
-- | http://id.loc.gov/vocabulary/relators/edt |
9 (RLIN) | 170515 |
700 1# - ADDED ENTRY--PERSONAL NAME | |
Personal name | Wang, Feiyue. |
Relator term | editor. |
Relationship | edt |
-- | http://id.loc.gov/vocabulary/relators/edt |
9 (RLIN) | 170516 |
700 1# - ADDED ENTRY--PERSONAL NAME | |
Personal name | Yang, Christopher C. |
Relator term | editor. |
Relationship | edt |
-- | http://id.loc.gov/vocabulary/relators/edt |
9 (RLIN) | 170517 |
700 1# - ADDED ENTRY--PERSONAL NAME | |
Personal name | Zeng, Daniel. |
Relator term | editor. |
Relationship | edt |
-- | http://id.loc.gov/vocabulary/relators/edt |
9 (RLIN) | 170518 |
700 1# - ADDED ENTRY--PERSONAL NAME | |
Personal name | Chau, Michael. |
Relator term | editor. |
Relationship | edt |
-- | http://id.loc.gov/vocabulary/relators/edt |
9 (RLIN) | 170519 |
700 1# - ADDED ENTRY--PERSONAL NAME | |
Personal name | Chang, Kuiyu. |
Relator term | editor. |
Relationship | edt |
-- | http://id.loc.gov/vocabulary/relators/edt |
9 (RLIN) | 170520 |
710 2# - ADDED ENTRY--CORPORATE NAME | |
Corporate name or jurisdiction name as entry element | SpringerLink (Online service) |
9 (RLIN) | 170521 |
773 0# - HOST ITEM ENTRY | |
Title | Springer Nature eBook |
776 08 - ADDITIONAL PHYSICAL FORM ENTRY | |
Relationship information | Printed edition: |
International Standard Book Number | 9783540333616 |
776 08 - ADDITIONAL PHYSICAL FORM ENTRY | |
Relationship information | Printed edition: |
International Standard Book Number | 9783540822608 |
830 #0 - SERIES ADDED ENTRY--UNIFORM TITLE | |
Uniform title | Information Systems and Applications, incl. Internet/Web, and HCI, |
International Standard Serial Number | 2946-1642 ; |
Volume/sequential designation | 3917 |
9 (RLIN) | 170522 |
856 40 - ELECTRONIC LOCATION AND ACCESS | |
Uniform Resource Identifier | <a href="https://doi.org/10.1007/11734628">https://doi.org/10.1007/11734628</a> |
912 ## - | |
-- | ZDB-2-SCS |
912 ## - | |
-- | ZDB-2-SXCS |
912 ## - | |
-- | ZDB-2-LNC |
942 ## - ADDED ENTRY ELEMENTS (KOHA) | |
Koha item type | eBooks-Lecture Notes in CS |
No items available.