Cargando…

Intelligent systems for security informatics /

The Intelligent Systems Series comprises titles that present state-of-the-art knowledge and the latest advances in intelligent systems. Its scope includes theoretical studies, design methods, and real-world implementations and applications. The most prevalent topics in Intelligence and Security Info...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Otros Autores: Yang, Christopher C.
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Oxford ; Waltham, MA : Academic Press, ©2013.
Colección:Intelligent systems series.
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)

MARC

LEADER 00000cam a2200000Ia 4500
001 OR_ocn827935868
003 OCoLC
005 20231017213018.0
006 m o d
007 cr cnu---unuuu
008 130218s2013 enk ob 001 0 eng d
040 |a OPELS  |b eng  |e pn  |c OPELS  |d E7B  |d CDX  |d N$T  |d IDEBK  |d B24X7  |d COO  |d YDXCP  |d UMC  |d OCLCF  |d UMI  |d UPM  |d DEBBG  |d GGVRL  |d DEBSZ  |d UIU  |d OCLCO  |d OCLCQ  |d OCLCO  |d OCLCQ  |d OCLCO  |d OCLCQ  |d OCLCO  |d LIV  |d OCLCQ  |d OCLCA  |d U3W  |d D6H  |d CEF  |d UWO  |d LEAUB  |d ESU  |d REDDC  |d OCLCO  |d OCLCQ  |d OCLCO 
019 |a 828247149  |a 868597681  |a 1069651470  |a 1229061797 
020 |a 9780124059023  |q (electronic bk.) 
020 |a 0124059023  |q (electronic bk.) 
020 |z 9780124047020 
020 |z 0124047025 
029 1 |a AU@  |b 000050661738 
029 1 |a CHBIS  |b 009942846 
029 1 |a CHNEW  |b 000605193 
029 1 |a CHVBK  |b 302881158 
029 1 |a DEBBG  |b BV041778425 
029 1 |a DEBBG  |b BV042315116 
029 1 |a DEBSZ  |b 404329152 
029 1 |a DEBSZ  |b 405346948 
029 1 |a NLGGC  |b 357333551 
029 1 |a NZ1  |b 15026445 
029 1 |a NZ1  |b 15190931 
029 1 |a CHNEW  |b 001011010 
029 1 |a AU@  |b 000067101106 
029 1 |a AU@  |b 000068473021 
035 |a (OCoLC)827935868  |z (OCoLC)828247149  |z (OCoLC)868597681  |z (OCoLC)1069651470  |z (OCoLC)1229061797 
037 |a CL0500000362  |b Safari Books Online 
050 4 |a QA76.9.A25  |b I58 2013 
072 7 |a COM  |x 060040  |2 bisacsh 
072 7 |a COM  |x 043050  |2 bisacsh 
072 7 |a COM  |x 053000  |2 bisacsh 
082 0 4 |a 005.8  |2 23 
049 |a UAMI 
245 0 0 |a Intelligent systems for security informatics /  |c Christopher C. Yang [and others]. 
260 |a Oxford ;  |a Waltham, MA :  |b Academic Press,  |c ©2013. 
300 |a 1 online resource. 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
490 1 |a Intelligent systems series 
520 |a The Intelligent Systems Series comprises titles that present state-of-the-art knowledge and the latest advances in intelligent systems. Its scope includes theoretical studies, design methods, and real-world implementations and applications. The most prevalent topics in Intelligence and Security Informatics (ISI) include data management, data and text mining for ISI applications, terrorism informatics, deception and intent detection, terrorist and criminal social network analysis, public health and bio-security, crime analysis, cyber-infrastructure protection, transportation infrastructure security, policy studies and evaluation, and information assurance, among others. This book covers the most active research work in recent years. Pulls together key information on ensuring national security around the worldThe latest research on this subject is concisely presented within the book, with several figures to support the text. Will be of interest to attendees of The Intelligence and Security Informatics conference series, which include IEEE International Conference on Intelligence and Security Informatics (IEEE ISI). 
504 |a Includes bibliographical references and index. 
505 0 |a Chapter 1. Revealing the hidden world of the dark web : social media forums and videos -- chapter 2. Proactive cyber defense -- chapter 3. Privacy-preserving social network integration, analysis, and mining -- chapter 4. A digraph model for risk identification and management in SCADA systems -- chapter 5. High-level architecture and design of a decision engine for marine safety and security -- chapter 6. Criminal identity resolution using personal and social identity attributes : a collective resolution approach -- chapter 7. Al Qaeda terrorist financing -- chapter 8. Study on covert networks of terrorists based on interactive relationship hypothesis -- chapter 9. Incorporating data and methodologies for knowledge discovery for crime. 
590 |a O'Reilly  |b O'Reilly Online Learning: Academic/Public Library Edition 
650 0 |a Computer security. 
650 0 |a Computer networks  |x Security measures. 
650 0 |a Information technology  |x Security measures. 
650 6 |a Sécurité informatique. 
650 6 |a Réseaux d'ordinateurs  |x Sécurité  |x Mesures. 
650 6 |a Technologie de l'information  |x Sécurité  |x Mesures. 
650 7 |a COMPUTERS  |x Internet  |x Security.  |2 bisacsh 
650 7 |a COMPUTERS  |x Networking  |x Security.  |2 bisacsh 
650 7 |a COMPUTERS  |x Security  |x General.  |2 bisacsh 
650 7 |a Computer networks  |x Security measures  |2 fast 
650 7 |a Computer security  |2 fast 
650 7 |a Information technology  |x Security measures  |2 fast 
700 1 |a Yang, Christopher C. 
776 0 8 |i Print version:  |t Intelligent systems for security informatics.  |b 1st ed.  |d Amsterdam ; Boston : Elsevier/Academic Press ; [Hangzhou, China] : Zhejiang University Press, 2013  |z 9780124047020  |w (DLC) 2012277621  |w (OCoLC)802322418 
830 0 |a Intelligent systems series. 
856 4 0 |u https://learning.oreilly.com/library/view/~/9780124047020/?ar  |z Texto completo (Requiere registro previo con correo institucional) 
938 |a Books 24x7  |b B247  |n bks00051030 
938 |a Coutts Information Services  |b COUT  |n 24652928 
938 |a ebrary  |b EBRY  |n ebr10653100 
938 |a EBSCOhost  |b EBSC  |n 486538 
938 |a Cengage Learning  |b GVRL  |n GVRL6ZTX 
938 |a ProQuest MyiLibrary Digital eBook Collection  |b IDEB  |n cis24652928 
938 |a YBP Library Services  |b YANK  |n 9998586 
994 |a 92  |b IZTAP