Description |
1 online resource (x, 172 pages) : illustrations |
Series |
Lecture notes in computer science, 0302-9743 ; 6122 |
|
Lecture notes in computer science ; 6122.
|
Contents |
Terrorism informatics and crime analysis. Combined detection model for criminal network detection / Fatih Ozgul, Zeki Erdem, Chris Bowerman, and Julian Bondy -- An association model for implicit crime link analysis / Jau-Hwang Wang and Chien-Lung Lin -- Design and deployment of a national detecting stolen vehicles network system / Weiping Chang and Chingwei Su -- Fighting cybercrime : a KM perspective / Weiping Chang -- Transportation infrastructure security. Trajectory similarity of network constrained moving objects and applications to traffic security / Sajimon Abraham and Paulose Sojan Lal -- An emergent traffic messaging service using wireless technology / Patrick S. Chen, Yong-Kuei Liu, and Chia-Shih Hsu -- Information access and security. A model for detecting "global footprint anomalies" in a grid environment / Pramod S. Pawar and Srinath Srinivasa -- Secure anonymous routing for MANETs using distributed dynamic random path selection / Vakul Mohanty, Dhaval Moliya, Chittaranjan Hota, and Muttukrishnan Rajarajan -- MAD-IDS : novel intrusion detection system using mobile agents and data mining approaches / Imen Brahmi, Sadok Ben Yahia, and Pascal Poncelet -- Data encryption. Fuzzy biometric signcryption scheme with bilinear pairings in the standard model / Mingwu Zhang, Bo Yang, Tsuyoshi Takagi, Yanping Shen, and Wenzheng Zhang -- Key independent decryption of graphically encrypted images / Ram Ratan -- Towards confidentiality of ID-based signcryption schemes under without random oracle model / Mingwu Zhang, Pengcheng Li, Bo Yang, Hao Wang, and Tsuyoshi Takagi -- JPEG steganalysis using HBCL statistics and FR index / Veena H. Bhat, Krishna S., P. Deepa Shenoy, Venugopal K.R., and L.M. Patnaik -- Data and text mining. Text mining technique for Chinese written judgment of criminal case / Shihchieh Chou and Tai-Ping Hsing -- Exploration of document relation quality with consideration of term representation basis, term weighting and association measure / Nichnan Kittiphattanabawon, Thanaruk Theeramunkong, and Ekawit Nantajeewarawat -- Identifying controversial issues and their sub-topics in news articles / Yoonjung Choi, Yuchul Jung, and Sung-Hyon Myaeng -- Efficient privacy preserving K-means clustering / Maneesh Upmanyu, Anoop M. Namboodiri, Kannan Srinathan, and C.V. Jawahar -- A fuzzy threshold based modified clustering algorithm for natural data exploration / Binu Thomas and G. Raju |
Summary |
This book constitutes the proceedings of the Pacific Asia Workshop on Intelligence and Security Informatics 2010, held in Hyderabad, India, in June 2010 |
Bibliography |
Includes bibliographical references and index |
Notes |
Print version record |
Subject |
Computer security -- Congresses
|
|
Computer networks -- Security measures -- Congresses
|
|
Computer networks -- Access control -- Congresses.
|
|
Internet -- Security measures -- Congresses
|
|
Computer networks.
|
|
Computer security.
|
|
Internet.
|
|
Computer Communication Networks
|
|
Computer Security
|
|
Internet
|
|
Internet.
|
|
Informatique.
|
|
Internet
|
|
Computer networks
|
|
Computer networks -- Access control
|
|
Computer networks -- Security measures
|
|
Computer security
|
|
Internet -- Security measures
|
|
Computersicherheit
|
|
Datensicherung
|
|
Kryptoanalyse
|
|
Computerkriminalität
|
|
Ad-hoc-Netz
|
|
Internet
|
Genre/Form |
proceedings (reports)
|
|
Conference papers and proceedings
|
|
Conference papers and proceedings.
|
|
Actes de congrès.
|
Form |
Electronic book
|
Author |
Chen, Hsinchun.
|
ISBN |
9783642136016 |
|
364213601X |
|