Cargando…

Intelligence and Security Informatics Pacific Asia Workshop, PAISI 2007, Chengdu, China, April 11-12, 2007, Proceedings /

Intelligence and security informatics (ISI) is concerned with the study of the development and use of advanced information technologies and systems for national, international, and societal security-related applications. The annual IEEE International Conference series on ISI was started in 2003 and...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor Corporativo: SpringerLink (Online service)
Otros Autores: Yang, Christopher C. (Editor ), Zeng, Daniel (Editor ), Chau, Michael (Editor ), Chang, Kuiyu (Editor ), Yang, Qing (Editor ), Cheng, Xueqi (Editor ), Wang, Jue (Editor ), Wang, Fei-Yue (Editor ), Chen, Hsinchun (Editor )
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2007.
Edición:1st ed. 2007.
Colección:Information Systems and Applications, incl. Internet/Web, and HCI ; 4430
Temas:
Acceso en línea:Texto Completo
Tabla de Contenidos:
  • Keynote
  • Exploring Extremism and Terrorism on the Web: The Dark Web Project
  • Long Papers
  • Analyzing and Visualizing Gray Web Forum Structure
  • An Empirical Analysis of Online Gaming Crime Characteristics from 2002 to 2004
  • Detecting Cyber Security Threats in Weblogs Using Probabilistic Models
  • What-if Emergency Management System: A Generalized Voronoi Diagram Approach
  • Agent Based Framework for Emergency Rescue and Assistance Planning
  • Object Tracking with Self-updating Tracking Window
  • A Case-Based Evolutionary Group Decision Support Method for Emergency Response
  • Lightweight Anomaly Intrusion Detection in Wireless Sensor Networks
  • ASITL: Adaptive Secure Interoperation Using Trust-Level
  • A RT0-Based Compliance Checker Model for Automated Trust Negotiation
  • TCM-KNN Algorithm for Supervised Network Intrusion Detection
  • Research on Hidden Markov Model for System Call Anomaly Detection
  • Towards Identifying True Threat from Network Security Data
  • Security Assessment for Application Network Services Using Fault Injection
  • A Secure Data Transmission Protocol for Mobile Ad Hoc Networks
  • Defending DDoS Attacks Using Hidden Markov Models and Cooperative Reinforcement Learning
  • A Novel Relational Database Watermarking Algorithm
  • Short Papers
  • Anticipatory Event Detection for Bursty Events
  • Community Detection in Scale-Free Networks Based on Hypergraph Model
  • The Treelike Assembly Classifier for Pedestrian Detection
  • A Proposed Data Mining Approach for Internet Auction Fraud Detection
  • Trends in Computer Crime and Cybercrime Research During the Period 1974-2006: A Bibliometric Approach
  • The Study of Government Website Information Disclosure in Taiwan
  • Informed Recognition in Software Watermarking
  • An Inference Control Algorithm for RDF(S) Repository
  • PPIDS: Privacy Preserving Intrusion Detection System
  • Evaluating the Disaster Defense Ability of Information Systems
  • Airline Safety Evaluation Based on Fuzzy TOPSIS
  • A Framework for Proving the Security of Data Transmission Protocols in Sensor Network
  • Port and Address Hopping for Active Cyber-Defense
  • A Hybrid Model for Worm Simulations in a Large Network
  • Posters
  • A Web Portal for Terrorism Activities in China
  • An Overview of Telemarketing Fraud Problems and Countermeasures in Taiwan
  • Mining the Core Member of Terrorist Crime Group Based on Social Network Analysis
  • Providing Personalized Services for HWME System by Item-Based Collaborative Filtering
  • An Intelligent Agent-Oriented System for Integrating Network Security Devices and Handling Large Amount of Security Events
  • Link Analysis-Based Detection of Anomalous Communication Patterns
  • Social Modeling and Reasoning for Security Informatics
  • Detecting Botnets by Analyzing DNS Traffic
  • HMM-Based Approach for Evaluating Risk Propagation
  • A Symptom-Based Taxonomy for an Early Detection of Network Attacks.