000 03583nam a22006015i 4500
001 978-3-319-18455-5
003 DE-He213
005 20200421111704.0
007 cr nn 008mamaa
008 150508s2015 gw | s |||| 0|eng d
020 _a9783319184555
_9978-3-319-18455-5
024 7 _a10.1007/978-3-319-18455-5
_2doi
050 4 _aQA76.9.A25
072 7 _aUR
_2bicssc
072 7 _aUTN
_2bicssc
072 7 _aCOM053000
_2bisacsh
082 0 4 _a005.8
_223
245 1 0 _aIntelligence and Security Informatics
_h[electronic resource] :
_bPacific Asia Workshop, PAISI 2015, Ho Chi Minh City, Vietnam, May 19, 2015. Proceedings /
_cedited by Michael Chau, G. Alan Wang, Hsinchun Chen.
264 1 _aCham :
_bSpringer International Publishing :
_bImprint: Springer,
_c2015.
300 _aVIII, 113 p. 36 illus.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
490 1 _aLecture Notes in Computer Science,
_x0302-9743 ;
_v9074
505 0 _aMedia Revealr: A Social Multimedia Monitoring and Intelligence System for Web Multimedia Verification -- Geotagging Social Media Content with a Refined Language Modelling Approach -- Predicting Vehicle Recalls with User-Generated Contents: A Text Mining Approach -- GCM: A Greedy-based Cross-Matching Algorithm for Identifying Users across Multiple Online Social Networks -- P2P Lending Fraud Detection: A Big Data Approach -- Drug Anti-forgery and Tracing System Based on Lightweight Asymmetric Identities -- Chinese Word POS Tagging with Markov Logic -- In Search of Plagiarism Behaviors: An Empirical Study of Online Reviews.
520 _aThis book constitutes the refereed proceedings of the Pacific Asia Workshop on Intelligence and Security Informatics, PAISI 2015, held in Ho Chi Minh City, Vietnam, in May 2015 in conjunction with PAKDD 2015, the 19th Pacific-Asia Conference on Knowledge Discovery and Data Mining. The 8 revised full papers presented were carefully reviewed and selected from numerous submissions. Topics of the workshop are information sharing and big data analytics, infrastructure protection and emergency responses, cybercrime and terrorism informatics and analytics, as well as enterprise risk management, IS security, and social media analytics. The papers present a significant view on regional data sets and case studies, including online social media and multimedia, fraud deception, and text mining.
650 0 _aComputer science.
650 0 _aComputer communication systems.
650 0 _aComputer security.
650 0 _aData mining.
650 0 _aInformation storage and retrieval.
650 0 _aComputers and civilization.
650 1 4 _aComputer Science.
650 2 4 _aSystems and Data Security.
650 2 4 _aInformation Storage and Retrieval.
650 2 4 _aComputer Communication Networks.
650 2 4 _aData Mining and Knowledge Discovery.
650 2 4 _aComputers and Society.
650 2 4 _aInformation Systems Applications (incl. Internet).
700 1 _aChau, Michael.
_eeditor.
700 1 _aWang, G. Alan.
_eeditor.
700 1 _aChen, Hsinchun.
_eeditor.
710 2 _aSpringerLink (Online service)
773 0 _tSpringer eBooks
776 0 8 _iPrinted edition:
_z9783319184548
830 0 _aLecture Notes in Computer Science,
_x0302-9743 ;
_v9074
856 4 0 _uhttp://dx.doi.org/10.1007/978-3-319-18455-5
912 _aZDB-2-SCS
912 _aZDB-2-LNC
942 _cEBK
999 _c55141
_d55141