Loading…

Intelligence and Security Informatics Pacific Asia Workshop, PAISI 2010, Hyderabad, India, June 21, 2010 Proceedings /

Bibliographic Details
Call Number:Libro Electrónico
Corporate Author: SpringerLink (Online service)
Other Authors: Chen, Hsinchun (Editor), Chau, Michael (Editor), Li, Shu-Hsing (Editor), Urs, Shalini (Editor), Srinivasa, Srinath (Editor), Wang, G. Alan (Editor)
Format: Electronic eBook
Language:Inglés
Published: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2010.
Edition:1st ed. 2010.
Series:Security and Cryptology ; 6122
Subjects:
Online Access:Texto Completo
Table of Contents:
  • Terrorism Informatics and Crime Analysis
  • Combined Detection Model for Criminal Network Detection
  • An Association Model for Implicit Crime Link Analysis
  • Design and Deployment of a National Detecting Stolen Vehicles Network System
  • Fighting Cybercrime: A KM Perspective
  • Transportation Infrastructure Security
  • Trajectory Similarity of Network Constrained Moving Objects and Applications to Traffic Security
  • An Emergent Traffic Messaging Service Using Wireless Technology
  • Information Access and Security
  • A Model for Detecting "Global Footprint Anomalies" in a Grid Environment
  • Secure Anonymous Routing for MANETs Using Distributed Dynamic Random Path Selection
  • MAD-IDS: Novel Intrusion Detection System Using Mobile Agents and Data Mining Approaches
  • Data Encryption
  • Fuzzy Biometric Signcryption Scheme with Bilinear Pairings in the Standard Model
  • Key Independent Decryption of Graphically Encrypted Images
  • Towards Confidentiality of ID-Based Signcryption Schemes under without Random Oracle Model
  • JPEG Steganalysis Using HBCL Statistics and FR Index
  • Data and Text Mining
  • Text Mining Technique for Chinese Written Judgment of Criminal Case
  • Exploration of Document Relation Quality with Consideration of Term Representation Basis, Term Weighting and Association Measure
  • Identifying Controversial Issues and Their Sub-topics in News Articles
  • Efficient Privacy Preserving K-Means Clustering
  • A Fuzzy Threshold Based Modified Clustering Algorithm for Natural Data Exploration.