|
|
|
|
LEADER |
00000nam a22000005i 4500 |
001 |
978-3-319-06677-6 |
003 |
DE-He213 |
005 |
20220115060239.0 |
007 |
cr nn 008mamaa |
008 |
140407s2014 sz | s |||| 0|eng d |
020 |
|
|
|a 9783319066776
|9 978-3-319-06677-6
|
024 |
7 |
|
|a 10.1007/978-3-319-06677-6
|2 doi
|
050 |
|
4 |
|a QA76.9.A25
|
072 |
|
7 |
|a UR
|2 bicssc
|
072 |
|
7 |
|a UTN
|2 bicssc
|
072 |
|
7 |
|a COM053000
|2 bisacsh
|
072 |
|
7 |
|a UR
|2 thema
|
072 |
|
7 |
|a UTN
|2 thema
|
082 |
0 |
4 |
|a 005.8
|2 23
|
245 |
1 |
0 |
|a Intelligence and Security Informatics
|h [electronic resource] :
|b Pacific Asia Workshop, PAISI 2014, Tainan, Taiwan, May 13, 2014, Proceedings /
|c edited by Michael Chau, Hsinchun Chen, G. Alan Wang, Jau-Hwang Wang.
|
250 |
|
|
|a 1st ed. 2014.
|
264 |
|
1 |
|a Cham :
|b Springer International Publishing :
|b Imprint: Springer,
|c 2014.
|
300 |
|
|
|a XIV, 91 p. 25 illus.
|b online resource.
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a text file
|b PDF
|2 rda
|
490 |
1 |
|
|a Security and Cryptology ;
|v 8440
|
505 |
0 |
|
|a Regional data sets and case studies -- Cybercrime -- Information security engineering -- Text mining.
|
520 |
|
|
|a This book constitutes the refereed proceedings of the Pacific Asia Workshop on Intelligence and Security Informatics, PAISI 2014, held in Tainan, Taiwan, in May 2014 in conjunction with PAKDD 2014, the 18th Pacific-Asia Conference on Knowledge Discovery and Data Mining. The 7 revised full papers presented together with one short paper were carefully reviewed and selected from 10 submissions. The papers are organized in topical sections on regional data sets and case studies, cybercrime, information security engineering and text mining.
|
650 |
|
0 |
|a Data protection.
|
650 |
|
0 |
|a Information storage and retrieval systems.
|
650 |
|
0 |
|a Computer networks .
|
650 |
|
0 |
|a Data mining.
|
650 |
|
0 |
|a Computers and civilization.
|
650 |
|
0 |
|a Application software.
|
650 |
1 |
4 |
|a Data and Information Security.
|
650 |
2 |
4 |
|a Information Storage and Retrieval.
|
650 |
2 |
4 |
|a Computer Communication Networks.
|
650 |
2 |
4 |
|a Data Mining and Knowledge Discovery.
|
650 |
2 |
4 |
|a Computers and Society.
|
650 |
2 |
4 |
|a Computer and Information Systems Applications.
|
700 |
1 |
|
|a Chau, Michael.
|e editor.
|4 edt
|4 http://id.loc.gov/vocabulary/relators/edt
|
700 |
1 |
|
|a Chen, Hsinchun.
|e editor.
|4 edt
|4 http://id.loc.gov/vocabulary/relators/edt
|
700 |
1 |
|
|a Wang, G. Alan.
|e editor.
|4 edt
|4 http://id.loc.gov/vocabulary/relators/edt
|
700 |
1 |
|
|a Wang, Jau-Hwang.
|e editor.
|4 edt
|4 http://id.loc.gov/vocabulary/relators/edt
|
710 |
2 |
|
|a SpringerLink (Online service)
|
773 |
0 |
|
|t Springer Nature eBook
|
776 |
0 |
8 |
|i Printed edition:
|z 9783319066783
|
776 |
0 |
8 |
|i Printed edition:
|z 9783319066769
|
830 |
|
0 |
|a Security and Cryptology ;
|v 8440
|
856 |
4 |
0 |
|u https://doi.uam.elogim.com/10.1007/978-3-319-06677-6
|z Texto Completo
|
912 |
|
|
|a ZDB-2-SCS
|
912 |
|
|
|a ZDB-2-SXCS
|
912 |
|
|
|a ZDB-2-LNC
|
950 |
|
|
|a Computer Science (SpringerNature-11645)
|
950 |
|
|
|a Computer Science (R0) (SpringerNature-43710)
|