000 | 03340nam a22006495i 4500 | ||
---|---|---|---|
001 | 978-3-642-30428-6 | ||
003 | DE-He213 | ||
005 | 20240730194812.0 | ||
007 | cr nn 008mamaa | ||
008 | 120523s2012 gw | s |||| 0|eng d | ||
020 |
_a9783642304286 _9978-3-642-30428-6 |
||
024 | 7 |
_a10.1007/978-3-642-30428-6 _2doi |
|
050 | 4 | _aQA76.76.A65 | |
072 | 7 |
_aUB _2bicssc |
|
072 | 7 |
_aCOM005000 _2bisacsh |
|
072 | 7 |
_aUX _2thema |
|
082 | 0 | 4 |
_a005.3 _223 |
245 | 1 | 0 |
_aIntelligence and Security Informatics _h[electronic resource] : _bPacific Asia Workshop, PAISI 2012, Kuala Lumpur, Malaysia, May 29, 2012, Proceedings / _cedited by Michael Chau, G. Alan Wang, Wei Thoo Yue, Hsinchun Chen. |
250 | _a1st ed. 2012. | ||
264 | 1 |
_aBerlin, Heidelberg : _bSpringer Berlin Heidelberg : _bImprint: Springer, _c2012. |
|
300 |
_aX, 207 p. 55 illus. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
490 | 1 |
_aSecurity and Cryptology, _x2946-1863 ; _v7299 |
|
520 | _aThis book constitutes the refereed proceedings of the Pacific Asia Workshop on Intelligence and Security Informatics, PAISI 2012, held in Kuala Lumpur, Malaysia, in May 2012 - held in conjunction with the Pacific Asia Conference on Knowledge Discovery and Data Mining (PAKDD 2012). The 8 revised full papers and the 8 revised short papers presented together with 1 keynote lecture were carefully reviewed and selected from numerous submissions. The papers are organized in topical sections on terrorism informatics and crime analysis, social media, intrusion detection, data and text mining, as well as information access and security. | ||
650 | 0 |
_aApplication software. _9158035 |
|
650 | 0 |
_aData mining. _93907 |
|
650 | 0 |
_aComputer networks . _931572 |
|
650 | 0 |
_aComputers and civilization. _921733 |
|
650 | 0 |
_aComputers _xLaw and legislation. _975151 |
|
650 | 0 |
_aInformation technology _xLaw and legislation. _982531 |
|
650 | 0 |
_aElectronic data processing _xManagement. _9158036 |
|
650 | 1 | 4 |
_aComputer and Information Systems Applications. _9158037 |
650 | 2 | 4 |
_aData Mining and Knowledge Discovery. _9158038 |
650 | 2 | 4 |
_aComputer Communication Networks. _9158039 |
650 | 2 | 4 |
_aComputers and Society. _931668 |
650 | 2 | 4 |
_aLegal Aspects of Computing. _953952 |
650 | 2 | 4 |
_aIT Operations. _931703 |
700 | 1 |
_aChau, Michael. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _9158040 |
|
700 | 1 |
_aWang, G. Alan. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _9158041 |
|
700 | 1 |
_aYue, Wei Thoo. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _9158042 |
|
700 | 1 |
_aChen, Hsinchun. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _9158043 |
|
710 | 2 |
_aSpringerLink (Online service) _9158044 |
|
773 | 0 | _tSpringer Nature eBook | |
776 | 0 | 8 |
_iPrinted edition: _z9783642304279 |
776 | 0 | 8 |
_iPrinted edition: _z9783642304293 |
830 | 0 |
_aSecurity and Cryptology, _x2946-1863 ; _v7299 _9158045 |
|
856 | 4 | 0 | _uhttps://doi.org/10.1007/978-3-642-30428-6 |
912 | _aZDB-2-SCS | ||
912 | _aZDB-2-SXCS | ||
912 | _aZDB-2-LNC | ||
942 | _cELN | ||
999 |
_c95328 _d95328 |