Intelligence and Security Informatics (Record no. 97578)

000 -LEADER
fixed length control field 07976nam a22007575i 4500
001 - CONTROL NUMBER
control field 978-3-540-71549-8
003 - CONTROL NUMBER IDENTIFIER
control field DE-He213
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20240730203617.0
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION
fixed length control field cr nn 008mamaa
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 100301s2007 gw | s |||| 0|eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9783540715498
-- 978-3-540-71549-8
024 7# - OTHER STANDARD IDENTIFIER
Standard number or code 10.1007/978-3-540-71549-8
Source of number or code doi
050 #4 - LIBRARY OF CONGRESS CALL NUMBER
Classification number QA268
072 #7 - SUBJECT CATEGORY CODE
Subject category code GPJ
Source bicssc
072 #7 - SUBJECT CATEGORY CODE
Subject category code URY
Source bicssc
072 #7 - SUBJECT CATEGORY CODE
Subject category code COM083000
Source bisacsh
072 #7 - SUBJECT CATEGORY CODE
Subject category code GPJ
Source thema
072 #7 - SUBJECT CATEGORY CODE
Subject category code URY
Source thema
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 005.824
Edition number 23
245 10 - TITLE STATEMENT
Title Intelligence and Security Informatics
Medium [electronic resource] :
Remainder of title Pacific Asia Workshop, PAISI 2007, Chengdu, China, April 11-12, 2007, Proceedings /
Statement of responsibility, etc. edited by Christopher C. Yang, Daniel Zeng, Michael Chau, Kuiyu Chang, Qing Yang, Xueqi Cheng, Jue Wang, Fei-Yue Wang, Hsinchun Chen.
250 ## - EDITION STATEMENT
Edition statement 1st ed. 2007.
264 #1 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE
Place of production, publication, distribution, manufacture Berlin, Heidelberg :
Name of producer, publisher, distributor, manufacturer Springer Berlin Heidelberg :
-- Imprint: Springer,
Date of production, publication, distribution, manufacture, or copyright notice 2007.
300 ## - PHYSICAL DESCRIPTION
Extent XII, 332 p.
Other physical details online resource.
336 ## - CONTENT TYPE
Content type term text
Content type code txt
Source rdacontent
337 ## - MEDIA TYPE
Media type term computer
Media type code c
Source rdamedia
338 ## - CARRIER TYPE
Carrier type term online resource
Carrier type code cr
Source rdacarrier
347 ## - DIGITAL FILE CHARACTERISTICS
File type text file
Encoding format PDF
Source rda
490 1# - SERIES STATEMENT
Series statement Information Systems and Applications, incl. Internet/Web, and HCI,
International Standard Serial Number 2946-1642 ;
Volume/sequential designation 4430
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note Keynote -- Exploring Extremism and Terrorism on the Web: The Dark Web Project -- Long Papers -- Analyzing and Visualizing Gray Web Forum Structure -- An Empirical Analysis of Online Gaming Crime Characteristics from 2002 to 2004 -- Detecting Cyber Security Threats in Weblogs Using Probabilistic Models -- What-if Emergency Management System: A Generalized Voronoi Diagram Approach -- Agent Based Framework for Emergency Rescue and Assistance Planning -- Object Tracking with Self-updating Tracking Window -- A Case-Based Evolutionary Group Decision Support Method for Emergency Response -- Lightweight Anomaly Intrusion Detection in Wireless Sensor Networks -- ASITL: Adaptive Secure Interoperation Using Trust-Level -- A RT0-Based Compliance Checker Model for Automated Trust Negotiation -- TCM-KNN Algorithm for Supervised Network Intrusion Detection -- Research on Hidden Markov Model for System Call Anomaly Detection -- Towards Identifying True Threat from Network Security Data -- Security Assessment for Application Network Services Using Fault Injection -- A Secure Data Transmission Protocol for Mobile Ad Hoc Networks -- Defending DDoS Attacks Using Hidden Markov Models and Cooperative Reinforcement Learning -- A Novel Relational Database Watermarking Algorithm -- Short Papers -- Anticipatory Event Detection for Bursty Events -- Community Detection in Scale-Free Networks Based on Hypergraph Model -- The Treelike Assembly Classifier for Pedestrian Detection -- A Proposed Data Mining Approach for Internet Auction Fraud Detection -- Trends in Computer Crime and Cybercrime Research During the Period 1974-2006: A Bibliometric Approach -- The Study of Government Website Information Disclosure in Taiwan -- Informed Recognition in Software Watermarking -- An Inference Control Algorithm for RDF(S) Repository -- PPIDS: Privacy Preserving Intrusion Detection System -- Evaluating the Disaster Defense Ability of Information Systems -- Airline Safety Evaluation Based on Fuzzy TOPSIS -- A Framework for Proving the Security of Data Transmission Protocols in Sensor Network -- Port and Address Hopping for Active Cyber-Defense -- A Hybrid Model for Worm Simulations in a Large Network -- Posters -- A Web Portal for Terrorism Activities in China -- An Overview of Telemarketing Fraud Problems and Countermeasures in Taiwan -- Mining the Core Member of Terrorist Crime Group Based on Social Network Analysis -- Providing Personalized Services for HWME System by Item-Based Collaborative Filtering -- An Intelligent Agent-Oriented System for Integrating Network Security Devices and Handling Large Amount of Security Events -- Link Analysis-Based Detection of Anomalous Communication Patterns -- Social Modeling and Reasoning for Security Informatics -- Detecting Botnets by Analyzing DNS Traffic -- HMM-Based Approach for Evaluating Risk Propagation -- A Symptom-Based Taxonomy for an Early Detection of Network Attacks.
520 ## - SUMMARY, ETC.
Summary, etc. Intelligence and security informatics (ISI) is concerned with the study of the development and use of advanced information technologies and systems for national, international, and societal security-related applications. The annual IEEE International Conference series on ISI was started in 2003 and the first four meetings were held in the United States. In 2006, the Workshop on ISI (http://isi. se. cuhk. edu. hk/2006/) was held in Singapore in conjunction with the Pacific Asia Conference on Knowledge Discovery and Data Mining, with over 100 contributors and participants from all over the world. These past ISI conferences have brought together academic researchers, law enforcement and intelligence experts, information technology consultants, and practitioners to discuss their research and practice related to various ISI topics including ISI data management, data and text mining for ISI applications, terrorism informatics, deception and intent detection, terrorist and criminal social network analysis, public health and bio-security, crime analysis, cyber-infrastructure protection, transportation infrastructure security, policy studies and evaluation, and information assurance, among others. We continued this stream of ISI conferences by organizing the 2007 Pacific Asia Workshop on ISI (PAISI 2007) to especially provide a stimulating forum for ISI researchers in Pacific Asia and other regions of the world to exchange ideas and report research progress. PAISI 2007 was hosted by the Chinese Academy of Sciences, the University of Arizona, and the Chinese University of Hong Kong.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Cryptography.
9 (RLIN) 1973
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Data encryption (Computer science).
9 (RLIN) 9168
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Application software.
9 (RLIN) 176780
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Information storage and retrieval systems.
9 (RLIN) 22213
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Computer networks .
9 (RLIN) 31572
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Computers and civilization.
9 (RLIN) 21733
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Computers
General subdivision Law and legislation.
9 (RLIN) 75151
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Information technology
General subdivision Law and legislation.
9 (RLIN) 82531
650 14 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Cryptology.
9 (RLIN) 31769
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Computer and Information Systems Applications.
9 (RLIN) 176781
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Information Storage and Retrieval.
9 (RLIN) 23927
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Computer Communication Networks.
9 (RLIN) 176782
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Computers and Society.
9 (RLIN) 31668
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Legal Aspects of Computing.
9 (RLIN) 53952
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Yang, Christopher C.
Relator term editor.
Relationship edt
-- http://id.loc.gov/vocabulary/relators/edt
9 (RLIN) 176783
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Zeng, Daniel.
Relator term editor.
Relationship edt
-- http://id.loc.gov/vocabulary/relators/edt
9 (RLIN) 176784
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Chau, Michael.
Relator term editor.
Relationship edt
-- http://id.loc.gov/vocabulary/relators/edt
9 (RLIN) 176785
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Chang, Kuiyu.
Relator term editor.
Relationship edt
-- http://id.loc.gov/vocabulary/relators/edt
9 (RLIN) 176786
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Yang, Qing.
Relator term editor.
Relationship edt
-- http://id.loc.gov/vocabulary/relators/edt
9 (RLIN) 176787
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Cheng, Xueqi.
Relator term editor.
Relationship edt
-- http://id.loc.gov/vocabulary/relators/edt
9 (RLIN) 176788
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Wang, Jue.
Relator term editor.
Relationship edt
-- http://id.loc.gov/vocabulary/relators/edt
9 (RLIN) 176789
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Wang, Fei-Yue.
Relator term editor.
Relationship edt
-- http://id.loc.gov/vocabulary/relators/edt
9 (RLIN) 176790
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Chen, Hsinchun.
Relator term editor.
Relationship edt
-- http://id.loc.gov/vocabulary/relators/edt
9 (RLIN) 176791
710 2# - ADDED ENTRY--CORPORATE NAME
Corporate name or jurisdiction name as entry element SpringerLink (Online service)
9 (RLIN) 176792
773 0# - HOST ITEM ENTRY
Title Springer Nature eBook
776 08 - ADDITIONAL PHYSICAL FORM ENTRY
Relationship information Printed edition:
International Standard Book Number 9783540715481
776 08 - ADDITIONAL PHYSICAL FORM ENTRY
Relationship information Printed edition:
International Standard Book Number 9783540836797
830 #0 - SERIES ADDED ENTRY--UNIFORM TITLE
Uniform title Information Systems and Applications, incl. Internet/Web, and HCI,
International Standard Serial Number 2946-1642 ;
Volume/sequential designation 4430
9 (RLIN) 176793
856 40 - ELECTRONIC LOCATION AND ACCESS
Uniform Resource Identifier <a href="https://doi.org/10.1007/978-3-540-71549-8">https://doi.org/10.1007/978-3-540-71549-8</a>
912 ## -
-- ZDB-2-SCS
912 ## -
-- ZDB-2-SXCS
912 ## -
-- ZDB-2-LNC
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Koha item type eBooks-Lecture Notes in CS

No items available.