000 07976nam a22007575i 4500
001 978-3-540-71549-8
003 DE-He213
005 20240730203617.0
007 cr nn 008mamaa
008 100301s2007 gw | s |||| 0|eng d
020 _a9783540715498
_9978-3-540-71549-8
024 7 _a10.1007/978-3-540-71549-8
_2doi
050 4 _aQA268
072 7 _aGPJ
_2bicssc
072 7 _aURY
_2bicssc
072 7 _aCOM083000
_2bisacsh
072 7 _aGPJ
_2thema
072 7 _aURY
_2thema
082 0 4 _a005.824
_223
245 1 0 _aIntelligence and Security Informatics
_h[electronic resource] :
_bPacific Asia Workshop, PAISI 2007, Chengdu, China, April 11-12, 2007, Proceedings /
_cedited by Christopher C. Yang, Daniel Zeng, Michael Chau, Kuiyu Chang, Qing Yang, Xueqi Cheng, Jue Wang, Fei-Yue Wang, Hsinchun Chen.
250 _a1st ed. 2007.
264 1 _aBerlin, Heidelberg :
_bSpringer Berlin Heidelberg :
_bImprint: Springer,
_c2007.
300 _aXII, 332 p.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
490 1 _aInformation Systems and Applications, incl. Internet/Web, and HCI,
_x2946-1642 ;
_v4430
505 0 _aKeynote -- Exploring Extremism and Terrorism on the Web: The Dark Web Project -- Long Papers -- Analyzing and Visualizing Gray Web Forum Structure -- An Empirical Analysis of Online Gaming Crime Characteristics from 2002 to 2004 -- Detecting Cyber Security Threats in Weblogs Using Probabilistic Models -- What-if Emergency Management System: A Generalized Voronoi Diagram Approach -- Agent Based Framework for Emergency Rescue and Assistance Planning -- Object Tracking with Self-updating Tracking Window -- A Case-Based Evolutionary Group Decision Support Method for Emergency Response -- Lightweight Anomaly Intrusion Detection in Wireless Sensor Networks -- ASITL: Adaptive Secure Interoperation Using Trust-Level -- A RT0-Based Compliance Checker Model for Automated Trust Negotiation -- TCM-KNN Algorithm for Supervised Network Intrusion Detection -- Research on Hidden Markov Model for System Call Anomaly Detection -- Towards Identifying True Threat from Network Security Data -- Security Assessment for Application Network Services Using Fault Injection -- A Secure Data Transmission Protocol for Mobile Ad Hoc Networks -- Defending DDoS Attacks Using Hidden Markov Models and Cooperative Reinforcement Learning -- A Novel Relational Database Watermarking Algorithm -- Short Papers -- Anticipatory Event Detection for Bursty Events -- Community Detection in Scale-Free Networks Based on Hypergraph Model -- The Treelike Assembly Classifier for Pedestrian Detection -- A Proposed Data Mining Approach for Internet Auction Fraud Detection -- Trends in Computer Crime and Cybercrime Research During the Period 1974-2006: A Bibliometric Approach -- The Study of Government Website Information Disclosure in Taiwan -- Informed Recognition in Software Watermarking -- An Inference Control Algorithm for RDF(S) Repository -- PPIDS: Privacy Preserving Intrusion Detection System -- Evaluating the Disaster Defense Ability of Information Systems -- Airline Safety Evaluation Based on Fuzzy TOPSIS -- A Framework for Proving the Security of Data Transmission Protocols in Sensor Network -- Port and Address Hopping for Active Cyber-Defense -- A Hybrid Model for Worm Simulations in a Large Network -- Posters -- A Web Portal for Terrorism Activities in China -- An Overview of Telemarketing Fraud Problems and Countermeasures in Taiwan -- Mining the Core Member of Terrorist Crime Group Based on Social Network Analysis -- Providing Personalized Services for HWME System by Item-Based Collaborative Filtering -- An Intelligent Agent-Oriented System for Integrating Network Security Devices and Handling Large Amount of Security Events -- Link Analysis-Based Detection of Anomalous Communication Patterns -- Social Modeling and Reasoning for Security Informatics -- Detecting Botnets by Analyzing DNS Traffic -- HMM-Based Approach for Evaluating Risk Propagation -- A Symptom-Based Taxonomy for an Early Detection of Network Attacks.
520 _aIntelligence and security informatics (ISI) is concerned with the study of the development and use of advanced information technologies and systems for national, international, and societal security-related applications. The annual IEEE International Conference series on ISI was started in 2003 and the first four meetings were held in the United States. In 2006, the Workshop on ISI (http://isi. se. cuhk. edu. hk/2006/) was held in Singapore in conjunction with the Pacific Asia Conference on Knowledge Discovery and Data Mining, with over 100 contributors and participants from all over the world. These past ISI conferences have brought together academic researchers, law enforcement and intelligence experts, information technology consultants, and practitioners to discuss their research and practice related to various ISI topics including ISI data management, data and text mining for ISI applications, terrorism informatics, deception and intent detection, terrorist and criminal social network analysis, public health and bio-security, crime analysis, cyber-infrastructure protection, transportation infrastructure security, policy studies and evaluation, and information assurance, among others. We continued this stream of ISI conferences by organizing the 2007 Pacific Asia Workshop on ISI (PAISI 2007) to especially provide a stimulating forum for ISI researchers in Pacific Asia and other regions of the world to exchange ideas and report research progress. PAISI 2007 was hosted by the Chinese Academy of Sciences, the University of Arizona, and the Chinese University of Hong Kong.
650 0 _aCryptography.
_91973
650 0 _aData encryption (Computer science).
_99168
650 0 _aApplication software.
_9176780
650 0 _aInformation storage and retrieval systems.
_922213
650 0 _aComputer networks .
_931572
650 0 _aComputers and civilization.
_921733
650 0 _aComputers
_xLaw and legislation.
_975151
650 0 _aInformation technology
_xLaw and legislation.
_982531
650 1 4 _aCryptology.
_931769
650 2 4 _aComputer and Information Systems Applications.
_9176781
650 2 4 _aInformation Storage and Retrieval.
_923927
650 2 4 _aComputer Communication Networks.
_9176782
650 2 4 _aComputers and Society.
_931668
650 2 4 _aLegal Aspects of Computing.
_953952
700 1 _aYang, Christopher C.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
_9176783
700 1 _aZeng, Daniel.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
_9176784
700 1 _aChau, Michael.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
_9176785
700 1 _aChang, Kuiyu.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
_9176786
700 1 _aYang, Qing.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
_9176787
700 1 _aCheng, Xueqi.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
_9176788
700 1 _aWang, Jue.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
_9176789
700 1 _aWang, Fei-Yue.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
_9176790
700 1 _aChen, Hsinchun.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
_9176791
710 2 _aSpringerLink (Online service)
_9176792
773 0 _tSpringer Nature eBook
776 0 8 _iPrinted edition:
_z9783540715481
776 0 8 _iPrinted edition:
_z9783540836797
830 0 _aInformation Systems and Applications, incl. Internet/Web, and HCI,
_x2946-1642 ;
_v4430
_9176793
856 4 0 _uhttps://doi.org/10.1007/978-3-540-71549-8
912 _aZDB-2-SCS
912 _aZDB-2-SXCS
912 _aZDB-2-LNC
942 _cELN
999 _c97578
_d97578