Intelligence and Security Informatics [electronic resource] : Pacific Asia Workshop, PAISI 2010, Hyderabad, India, June 21, 2010. Proceedings / edited by Hsinchun Chen, Michael Chau, Shu-hsing Li, Shalini Urs, Srinath Srinivasa, G. Alan Wang.
Material type: TextSeries: Lecture Notes in Computer Science ; 6122Publisher: Berlin, Heidelberg : Springer Berlin Heidelberg, 2010Description: 183p. 50 illus. online resourceContent type: text Media type: computer Carrier type: online resourceISBN: 9783642136016Subject(s): Computer science | Computer Communication Networks | Data encryption (Computer science) | Database management | Data mining | Information storage and retrieval systems | Information systems | Computer Science | Data Encryption | Information Systems Applications (incl.Internet) | Database Management | Information Storage and Retrieval | Data Mining and Knowledge Discovery | Computer Communication NetworksAdditional physical formats: Printed edition:: No titleDDC classification: 005.82 LOC classification: QA76.9.A25Online resources: Click here to access onlineCurrent library | Home library | Call number | Materials specified | URL | Status | Date due | Barcode |
---|---|---|---|---|---|---|---|
IMSc Library | IMSc Library | Link to resource | Available | EBK9082 |
Terrorism Informatics and Crime Analysis -- Combined Detection Model for Criminal Network Detection -- An Association Model for Implicit Crime Link Analysis -- Design and Deployment of a National Detecting Stolen Vehicles Network System -- Fighting Cybercrime: A KM Perspective -- Transportation Infrastructure Security -- Trajectory Similarity of Network Constrained Moving Objects and Applications to Traffic Security -- An Emergent Traffic Messaging Service Using Wireless Technology -- Information Access and Security -- A Model for Detecting “Global Footprint Anomalies” in a Grid Environment -- Secure Anonymous Routing for MANETs Using Distributed Dynamic Random Path Selection -- MAD-IDS: Novel Intrusion Detection System Using Mobile Agents and Data Mining Approaches -- Data Encryption -- Fuzzy Biometric Signcryption Scheme with Bilinear Pairings in the Standard Model -- Key Independent Decryption of Graphically Encrypted Images -- Towards Confidentiality of ID-Based Signcryption Schemes under without Random Oracle Model -- JPEG Steganalysis Using HBCL Statistics and FR Index -- Data and Text Mining -- Text Mining Technique for Chinese Written Judgment of Criminal Case -- Exploration of Document Relation Quality with Consideration of Term Representation Basis, Term Weighting and Association Measure -- Identifying Controversial Issues and Their Sub-topics in News Articles -- Efficient Privacy Preserving K-Means Clustering -- A Fuzzy Threshold Based Modified Clustering Algorithm for Natural Data Exploration.
There are no comments on this title.