Intelligence and Security Informatics [electronic resource] : Pacific Asia Workshop, PAISI 2010, Hyderabad, India, June 21, 2010. Proceedings / edited by Hsinchun Chen, Michael Chau, Shu-hsing Li, Shalini Urs, Srinath Srinivasa, G. Alan Wang.

Contributor(s): Chen, Hsinchun [editor.] | Chau, Michael [editor.] | Li, Shu-hsing [editor.] | Urs, Shalini [editor.] | Srinivasa, Srinath [editor.] | Wang, G. Alan [editor.] | SpringerLink (Online service)Material type: TextTextSeries: Lecture Notes in Computer Science ; 6122Publisher: Berlin, Heidelberg : Springer Berlin Heidelberg, 2010Description: 183p. 50 illus. online resourceContent type: text Media type: computer Carrier type: online resourceISBN: 9783642136016Subject(s): Computer science | Computer Communication Networks | Data encryption (Computer science) | Database management | Data mining | Information storage and retrieval systems | Information systems | Computer Science | Data Encryption | Information Systems Applications (incl.Internet) | Database Management | Information Storage and Retrieval | Data Mining and Knowledge Discovery | Computer Communication NetworksAdditional physical formats: Printed edition:: No titleDDC classification: 005.82 LOC classification: QA76.9.A25Online resources: Click here to access online
Contents:
Terrorism Informatics and Crime Analysis -- Combined Detection Model for Criminal Network Detection -- An Association Model for Implicit Crime Link Analysis -- Design and Deployment of a National Detecting Stolen Vehicles Network System -- Fighting Cybercrime: A KM Perspective -- Transportation Infrastructure Security -- Trajectory Similarity of Network Constrained Moving Objects and Applications to Traffic Security -- An Emergent Traffic Messaging Service Using Wireless Technology -- Information Access and Security -- A Model for Detecting “Global Footprint Anomalies” in a Grid Environment -- Secure Anonymous Routing for MANETs Using Distributed Dynamic Random Path Selection -- MAD-IDS: Novel Intrusion Detection System Using Mobile Agents and Data Mining Approaches -- Data Encryption -- Fuzzy Biometric Signcryption Scheme with Bilinear Pairings in the Standard Model -- Key Independent Decryption of Graphically Encrypted Images -- Towards Confidentiality of ID-Based Signcryption Schemes under without Random Oracle Model -- JPEG Steganalysis Using HBCL Statistics and FR Index -- Data and Text Mining -- Text Mining Technique for Chinese Written Judgment of Criminal Case -- Exploration of Document Relation Quality with Consideration of Term Representation Basis, Term Weighting and Association Measure -- Identifying Controversial Issues and Their Sub-topics in News Articles -- Efficient Privacy Preserving K-Means Clustering -- A Fuzzy Threshold Based Modified Clustering Algorithm for Natural Data Exploration.
In: Springer eBooks
Item type: E-BOOKS
Tags from this library: No tags from this library for this title. Log in to add tags.
    Average rating: 0.0 (0 votes)
Current library Home library Call number Materials specified URL Status Date due Barcode
IMSc Library
IMSc Library
Link to resource Available EBK9082

Terrorism Informatics and Crime Analysis -- Combined Detection Model for Criminal Network Detection -- An Association Model for Implicit Crime Link Analysis -- Design and Deployment of a National Detecting Stolen Vehicles Network System -- Fighting Cybercrime: A KM Perspective -- Transportation Infrastructure Security -- Trajectory Similarity of Network Constrained Moving Objects and Applications to Traffic Security -- An Emergent Traffic Messaging Service Using Wireless Technology -- Information Access and Security -- A Model for Detecting “Global Footprint Anomalies” in a Grid Environment -- Secure Anonymous Routing for MANETs Using Distributed Dynamic Random Path Selection -- MAD-IDS: Novel Intrusion Detection System Using Mobile Agents and Data Mining Approaches -- Data Encryption -- Fuzzy Biometric Signcryption Scheme with Bilinear Pairings in the Standard Model -- Key Independent Decryption of Graphically Encrypted Images -- Towards Confidentiality of ID-Based Signcryption Schemes under without Random Oracle Model -- JPEG Steganalysis Using HBCL Statistics and FR Index -- Data and Text Mining -- Text Mining Technique for Chinese Written Judgment of Criminal Case -- Exploration of Document Relation Quality with Consideration of Term Representation Basis, Term Weighting and Association Measure -- Identifying Controversial Issues and Their Sub-topics in News Articles -- Efficient Privacy Preserving K-Means Clustering -- A Fuzzy Threshold Based Modified Clustering Algorithm for Natural Data Exploration.

There are no comments on this title.

to post a comment.
The Institute of Mathematical Sciences, Chennai, India

Powered by Koha