|
|
|
|
LEADER |
00000nam a22000005i 4500 |
001 |
978-3-642-30428-6 |
003 |
DE-He213 |
005 |
20220115023010.0 |
007 |
cr nn 008mamaa |
008 |
120523s2012 gw | s |||| 0|eng d |
020 |
|
|
|a 9783642304286
|9 978-3-642-30428-6
|
024 |
7 |
|
|a 10.1007/978-3-642-30428-6
|2 doi
|
050 |
|
4 |
|a QA76.76.A65
|
072 |
|
7 |
|a UB
|2 bicssc
|
072 |
|
7 |
|a COM032000
|2 bisacsh
|
072 |
|
7 |
|a UX
|2 thema
|
082 |
0 |
4 |
|a 005.3
|2 23
|
245 |
1 |
0 |
|a Intelligence and Security Informatics
|h [electronic resource] :
|b Pacific Asia Workshop, PAISI 2012, Kuala Lumpur, Malaysia, May 29, 2012, Proceedings /
|c edited by Michael Chau, Wei Thoo Yue, G. Alan Wang, Hsinchun Chen.
|
250 |
|
|
|a 1st ed. 2012.
|
264 |
|
1 |
|a Berlin, Heidelberg :
|b Springer Berlin Heidelberg :
|b Imprint: Springer,
|c 2012.
|
300 |
|
|
|a X, 207 p. 55 illus.
|b online resource.
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a text file
|b PDF
|2 rda
|
490 |
1 |
|
|a Security and Cryptology ;
|v 7299
|
520 |
|
|
|a This book constitutes the refereed proceedings of the Pacific Asia Workshop on Intelligence and Security Informatics, PAISI 2012, held in Kuala Lumpur, Malaysia, in May 2012 - held in conjunction with the Pacific Asia Conference on Knowledge Discovery and Data Mining (PAKDD 2012). The 8 revised full papers and the 8 revised short papers presented together with 1 keynote lecture were carefully reviewed and selected from numerous submissions. The papers are organized in topical sections on terrorism informatics and crime analysis, social media, intrusion detection, data and text mining, as well as information access and security.
|
650 |
|
0 |
|a Application software.
|
650 |
|
0 |
|a Data mining.
|
650 |
|
0 |
|a Computer networks .
|
650 |
|
0 |
|a Computers and civilization.
|
650 |
|
0 |
|a Computers-Law and legislation.
|
650 |
|
0 |
|a Information technology-Law and legislation.
|
650 |
|
0 |
|a Electronic data processing-Management.
|
650 |
1 |
4 |
|a Computer and Information Systems Applications.
|
650 |
2 |
4 |
|a Data Mining and Knowledge Discovery.
|
650 |
2 |
4 |
|a Computer Communication Networks.
|
650 |
2 |
4 |
|a Computers and Society.
|
650 |
2 |
4 |
|a Legal Aspects of Computing.
|
650 |
2 |
4 |
|a IT Operations.
|
700 |
1 |
|
|a Chau, Michael.
|e editor.
|4 edt
|4 http://id.loc.gov/vocabulary/relators/edt
|
700 |
1 |
|
|a Yue, Wei Thoo.
|e editor.
|4 edt
|4 http://id.loc.gov/vocabulary/relators/edt
|
700 |
1 |
|
|a Wang, G. Alan.
|e editor.
|4 edt
|4 http://id.loc.gov/vocabulary/relators/edt
|
700 |
1 |
|
|a Chen, Hsinchun.
|e editor.
|4 edt
|4 http://id.loc.gov/vocabulary/relators/edt
|
710 |
2 |
|
|a SpringerLink (Online service)
|
773 |
0 |
|
|t Springer Nature eBook
|
776 |
0 |
8 |
|i Printed edition:
|z 9783642304279
|
776 |
0 |
8 |
|i Printed edition:
|z 9783642304293
|
830 |
|
0 |
|a Security and Cryptology ;
|v 7299
|
856 |
4 |
0 |
|u https://doi.uam.elogim.com/10.1007/978-3-642-30428-6
|z Texto Completo
|
912 |
|
|
|a ZDB-2-SCS
|
912 |
|
|
|a ZDB-2-SXCS
|
912 |
|
|
|a ZDB-2-LNC
|
950 |
|
|
|a Computer Science (SpringerNature-11645)
|
950 |
|
|
|a Computer Science (R0) (SpringerNature-43710)
|