Description |
1 online resource (x, 115 pages) : illustrations |
Series |
Lecture notes in computer science ; 8039 |
|
LNCS sublibrary. SL 4, Security and cryptology |
|
Lecture notes in computer science ; 8039.
|
|
LNCS sublibrary. SL 4, Security and cryptology.
|
Contents |
Information Sharing and Data/Text Mining -- Belief Manipulation: A Formal Model of Deceit in Message Passing Systems / Aaron Hunter -- Region of Interest Discovery in Location-Based Social Networking Services with Protected Locations / Rong Tan, Junzhong Gu, Peng Chen, Zhou Zhong -- Label Micro-blog Topics Using the Bayesian Inference Method / Heng Gao, Qiudan Li, Xiaolong Zheng -- Terrorism Informatics -- Collective Intelligence for Suicide Surveillance in Web Forums / Tim M.H. Li, Ben C.M. Ng, Michael Chau, Paul W.C. Wong, Paul S.F. Yip -- Computing Optimal Attack Strategies Using Unconstrained Influence Diagrams / Viliam Lisý, Radek Píbil -- Network-Based Data Analytics -- Identifying Peer Influence in Online Social Networks Using Transfer Entropy / Saike He, Xiaolong Zheng, Daniel Zeng, Kainan Cui, Zhu Zhang, Chuan Luo -- Modeling Relationship Strength for Link Prediction / Ning Li, Xu Feng, Shufan Ji, Ke Xu -- What Is the Uniqueness of Growth Pattern in Human Flesh Search Organization? / Tao Wang, Qingpeng Zhang, Julei Fu, Xiao Wang, Suncong Zheng -- Information Access and Security -- Energy Saving Replay Attack Prevention in Clustered Wireless Sensor Networks / Amrita Ghosal, Aadirupa Saha, Sipra Das Bit -- Detecting Web Attacks Based on Domain Statistics / Chia-Mei Chen, Jhe-Jhun Huang, Ya-Hui Ou -- A Novel Key Scheme Based on QR Decomposition for Wireless Sensor Networks / Weimin Xie, Liejun Wang, Mingwei Wang |
Summary |
This book constitutes the refereed proceedings of the Pacific Asia Workshop on Intelligence and Security Informatics, PAISI 2013, held in Beijing, China, in August 2013 in conjunction with the International Joint Conference on Artificial Intelligence (IJCAI 2013). The 4 revised full papers presented together with 7 short papers were carefully reviewed and selected from numerous submissions. The papers are organized in topical sections on information sharing and data/text mining; terrorism informatics; network-based data analytics; and information access and security |
Notes |
International conference proceedings |
|
Includes author index |
Bibliography |
Includes author index |
Notes |
Print version record |
Subject |
Computer security -- Congresses
|
|
Computer networks -- Security measures -- Congresses
|
|
Computer networks.
|
|
Computer security.
|
|
Computer Communication Networks
|
|
Computer Security
|
|
Computer networks
|
|
Computer networks -- Security measures
|
|
Computer security
|
Genre/Form |
proceedings (reports)
|
|
Conference papers and proceedings
|
|
Conference papers and proceedings.
|
|
Actes de congrès.
|
Form |
Electronic book
|
Author |
Wang, G. Alan, editor
|
ISBN |
9783642396939 |
|
3642396933 |
|
3642396925 |
|
9783642396922 |
|