000 | 03351nam a22006735i 4500 | ||
---|---|---|---|
001 | 978-3-319-06677-6 | ||
003 | DE-He213 | ||
005 | 20240730171937.0 | ||
007 | cr nn 008mamaa | ||
008 | 140407s2014 sz | s |||| 0|eng d | ||
020 |
_a9783319066776 _9978-3-319-06677-6 |
||
024 | 7 |
_a10.1007/978-3-319-06677-6 _2doi |
|
050 | 4 | _aQA76.9.A25 | |
072 | 7 |
_aUR _2bicssc |
|
072 | 7 |
_aUTN _2bicssc |
|
072 | 7 |
_aCOM053000 _2bisacsh |
|
072 | 7 |
_aUR _2thema |
|
072 | 7 |
_aUTN _2thema |
|
082 | 0 | 4 |
_a005.8 _223 |
245 | 1 | 0 |
_aIntelligence and Security Informatics _h[electronic resource] : _bPacific Asia Workshop, PAISI 2014, Tainan, Taiwan, May 13, 2014, Proceedings / _cedited by Michael Chau, Hsinchun Chen, G. Alan Wang, Jau-Hwang Wang. |
250 | _a1st ed. 2014. | ||
264 | 1 |
_aCham : _bSpringer International Publishing : _bImprint: Springer, _c2014. |
|
300 |
_aXIV, 91 p. 25 illus. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
490 | 1 |
_aSecurity and Cryptology, _x2946-1863 ; _v8440 |
|
505 | 0 | _aRegional data sets and case studies -- Cybercrime -- Information security engineering -- Text mining. | |
520 | _aThis book constitutes the refereed proceedings of the Pacific Asia Workshop on Intelligence and Security Informatics, PAISI 2014, held in Tainan, Taiwan, in May 2014 in conjunction with PAKDD 2014, the 18th Pacific-Asia Conference on Knowledge Discovery and Data Mining. The 7 revised full papers presented together with one short paper were carefully reviewed and selected from 10 submissions. The papers are organized in topical sections on regional data sets and case studies, cybercrime, information security engineering and text mining. | ||
650 | 0 |
_aData protection. _97245 |
|
650 | 0 |
_aInformation storage and retrieval systems. _922213 |
|
650 | 0 |
_aComputer networks . _931572 |
|
650 | 0 |
_aData mining. _93907 |
|
650 | 0 |
_aComputers and civilization. _921733 |
|
650 | 0 |
_aApplication software. _9101023 |
|
650 | 1 | 4 |
_aData and Information Security. _931990 |
650 | 2 | 4 |
_aInformation Storage and Retrieval. _923927 |
650 | 2 | 4 |
_aComputer Communication Networks. _9101024 |
650 | 2 | 4 |
_aData Mining and Knowledge Discovery. _9101027 |
650 | 2 | 4 |
_aComputers and Society. _931668 |
650 | 2 | 4 |
_aComputer and Information Systems Applications. _9101030 |
700 | 1 |
_aChau, Michael. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _9101031 |
|
700 | 1 |
_aChen, Hsinchun. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _9101033 |
|
700 | 1 |
_aWang, G. Alan. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _9101035 |
|
700 | 1 |
_aWang, Jau-Hwang. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _9101036 |
|
710 | 2 |
_aSpringerLink (Online service) _9101039 |
|
773 | 0 | _tSpringer Nature eBook | |
776 | 0 | 8 |
_iPrinted edition: _z9783319066769 |
776 | 0 | 8 |
_iPrinted edition: _z9783319066783 |
830 | 0 |
_aSecurity and Cryptology, _x2946-1863 ; _v8440 _9101040 |
|
856 | 4 | 0 | _uhttps://doi.org/10.1007/978-3-319-06677-6 |
912 | _aZDB-2-SCS | ||
912 | _aZDB-2-SXCS | ||
912 | _aZDB-2-LNC | ||
942 | _cELN | ||
999 |
_c87905 _d87905 |