Coverart for item
The Resource Intelligence and Security Informatics : IEEE ISI 2008 International Workshops: PAISI, PACCF and SOCO 2008, Taipei, Taiwan, June 17, 2008, Proceedings, edited by Christopher C. Yang, Hsinchun Chen, Michael Chau, Kuiyu Chang, Sheau-Dong Lang, Patrick Chen, Raymond Hsieh, Daniel Zeng, Fei-Yue Wang, Kathleen M. Carley, Wenji Mao, Justin Zhan, (electronic resource)

Intelligence and Security Informatics : IEEE ISI 2008 International Workshops: PAISI, PACCF and SOCO 2008, Taipei, Taiwan, June 17, 2008, Proceedings, edited by Christopher C. Yang, Hsinchun Chen, Michael Chau, Kuiyu Chang, Sheau-Dong Lang, Patrick Chen, Raymond Hsieh, Daniel Zeng, Fei-Yue Wang, Kathleen M. Carley, Wenji Mao, Justin Zhan, (electronic resource)

Label
Intelligence and Security Informatics : IEEE ISI 2008 International Workshops: PAISI, PACCF and SOCO 2008, Taipei, Taiwan, June 17, 2008, Proceedings
Title
Intelligence and Security Informatics
Title remainder
IEEE ISI 2008 International Workshops: PAISI, PACCF and SOCO 2008, Taipei, Taiwan, June 17, 2008, Proceedings
Statement of responsibility
edited by Christopher C. Yang, Hsinchun Chen, Michael Chau, Kuiyu Chang, Sheau-Dong Lang, Patrick Chen, Raymond Hsieh, Daniel Zeng, Fei-Yue Wang, Kathleen M. Carley, Wenji Mao, Justin Zhan
Contributor
Editor
Editor
Subject
Language
  • eng
  • eng
Summary
This book constitutes the refereed proceedings of the three international workshops PAISI 2008, PACCF 2008, and SOCO 2008, held as satellite events of the IEEE International Conference on Intelligence and Security Informatics, ISI 2008, in Taipei, Taiwan, in June 2008. The 55 revised full papers presented were carefully reviewed and selected from the presentations at the workshops. The 21 papers of the Pacific Asia Workshop on Intelligence and Security Informatics (PAISI 2008) cover topics such as information retrieval and event detection, internet security and cybercrime, currency and data protection, cryptography, image and video analysis, privacy issues, social networks, modeling and visualization, and network intrusion detection. The Pacific Asia Workshop on Cybercrime and Computer Forensics (PACCF 2008) furnishes 10 papers about forensic information management, forensic technologies, and forensic principles and tools. The 24 papers of the Workshop on Social Computing (SOCO 2008) are organized in topical sections on social web and social information management, social networks and agent-based modeling, as well as social opinions, e-commerce, security and privacy considerations
Member of
Is Subseries of
Dewey number
005.82
http://bibfra.me/vocab/relation/httpidlocgovvocabularyrelatorsedt
  • gWE2ddqtL8M
  • uUK1ZVQRzPM
  • 95goth7w2FM
  • zXQ_Hxiq-ss
  • KJ0v-gctkSY
  • Kt1TCk5Pzkg
  • RYfN1tuDEz0
  • MbtKcpyIkyQ
  • 1vQ5_ZWTfDg
  • PiNnZoLlFEE
  • CjAf791WXj8
  • I6kpzntDM-0
Image bit depth
0
Language note
English
LC call number
QA76.9.D335
Literary form
non fiction
Nature of contents
dictionaries
http://library.link/vocab/relatedWorkOrContributorDate
2008
http://library.link/vocab/relatedWorkOrContributorName
  • ISI 2008
  • Institute of Electrical and Electronics Engineers
  • Yang, Christopher C.
  • Chen, Hsinchun.
  • Chau, Michael.
  • Chang, Kuiyu.
  • Lang, Sheau-Dong.
  • Chen, Patrick.
  • Hsieh, Raymond.
  • Zeng, Daniel.
  • Wang, Fei-Yue.
  • Carley, Kathleen M.
  • Mao, Wenji.
  • Zhan, Justin.
Series statement
Information Systems and Applications, incl. Internet/Web, and HCI
Series volume
5075
http://library.link/vocab/subjectName
  • Data encryption (Computer science)
  • Mathematics
  • Data mining
  • Computer Communication Networks
  • Computer science
  • Cryptology
  • Applications of Mathematics
  • Information Systems Applications (incl. Internet)
  • Data Mining and Knowledge Discovery
  • Computer Communication Networks
  • Computers and Society
Label
Intelligence and Security Informatics : IEEE ISI 2008 International Workshops: PAISI, PACCF and SOCO 2008, Taipei, Taiwan, June 17, 2008, Proceedings, edited by Christopher C. Yang, Hsinchun Chen, Michael Chau, Kuiyu Chang, Sheau-Dong Lang, Patrick Chen, Raymond Hsieh, Daniel Zeng, Fei-Yue Wang, Kathleen M. Carley, Wenji Mao, Justin Zhan, (electronic resource)
Instantiates
Publication
Note
International conference proceedings
Antecedent source
mixed
Bibliography note
Includes bibliographical references and index
Carrier category
online resource
Carrier category code
  • cr
Color
not applicable
Content category
text
Content type code
  • txt
Contents
Pacific Asia Workshop on Intelligence and Security Informatics (PAISI 2008) -- Chinese Word Segmentation for Terrorism-Related Contents -- A Term Association Inference Model for Single Documents: A Stepping Stone for Investigation through Information Extraction -- Method for Evaluating the Security Risk of a Website Against Phishing Attacks -- CyberIR – A Technological Approach to Fight Cybercrime -- The Banknote Anti-forgery System Based on Digital Signature Algorithms -- Sequence Matching for Suspicious Activity Detection in Anti-Money Laundering -- Data Protection in Memory Using Byte Reordering -- Highly Efficient Password-Based Three-Party Key Exchange in Random Oracle Model -- A Pairwise Key Pre-distribution Scheme for Wireless Sensor Network -- Attacks on SVD-Based Watermarking Schemes -- Trigger Based Security Alarming Scheme for Moving Objects on Road Networks -- Reducing False Alarm of Video-Based Smoke Detection by Support Vector Machine -- Privacy-Preserving Collaborative Social Networks -- Efficient Secret Authenticatable Anonymous Signcryption Scheme with Identity Privacy -- How to Publicly Verifiably Expand a Member without Changing Old Shares in a Secret Sharing Scheme -- Comparing Two Models for Terrorist Group Detection: GDM or OGDM? -- Applying Case-Based Reasoning and Expert Systems to Coastal Patrol Crime Investigation in Taiwan -- Integrating Data Sources and Network Analysis Tools to Support the Fight Against Organized Crime -- Visual Analytics for Supporting Entity Relationship Discovery on Text Data -- Feature Weighting and Selection for a Real-Time Network Intrusion Detection System Based on GA with KNN -- Locality-Based Server Profiling for Intrusion Detection -- Pacific Asia Workshop on Cybercrime and Computer Forensics (PACCF 2008) -- A Simple WordNet-Ontology Based Email Retrieval System for Digital Forensics -- Preservation of Evidence in Case of Online Gaming Crime -- Dataset Analysis of Proxy Logs Detecting to Curb Propagations in Network Attacks -- Identifying Chinese E-Mail Documents’ Authorship for the Purpose of Computer Forensic -- A Collaborative Forensics Framework for VoIP Services in Multi-network Environments -- Wireless Forensic: A New Radio Frequency Based Locating System -- Applying Public-Key Watermarking Techniques in Forensic Imaging to Preserve the Authenticity of the Evidence -- Computer Forensics and Culture -- E-Commerce Security: The Categorical Role of Computers in Forensic Online Crime -- Forensic Artifacts of Microsoft Windows Vista System -- Workshop on Social Computing (SOCO 2008) -- How Useful Are Tags? — An Empirical Analysis of Collaborative Tagging for Web Page Recommendation -- A Generative Model for Statistical Determination of Information Content from Conversation Threads -- Using “Cited by” Information to Find the Context of Research Papers -- Online Communities: A Social Computing Perspective -- User-Centered Interface Design of Social Websites -- Discovering Trends in Collaborative Tagging Systems -- Socio-contextual Filters for Discovering Similar Knowledge-Gathering Tasks in Generic Information Systems -- Exploring Social Dynamics in Online Bookmarking Systems -- Dispositional Factors in the Use of Social Networking Sites: Findings and Implications for Social Computing Research -- Agent-Based Social Simulation and Modeling in Social Computing -- Transforming Raw-Email Data into Social-Network Information -- Using Social Networks to Organize Researcher Community -- Online Gaming Perpetrators Model -- Proposal for a Multiagent Architecture for Self-Organizing Systems (MA-SOS) -- Applying Text Mining to Assist People Who Inquire HIV/AIDS Information from Internet -- Polarity Classification of Public Health Opinions in Chinese -- Parallel Crawling and Capturing for On-Line Auction -- A New Credit Card Payment Scheme Using Mobile Phones Based on Visual Cryptography -- Detecting Hidden Hierarchy in Terrorist Networks: Some Case Studies -- Keyphrase Extraction from Chinese News Web Pages Based on Semantic Relations -- Automatic Recognition of News Web Pages -- Understanding Users’ Attitudes Towards Using a VoIP Survey -- Privacy-Preserving Collaborative E-Voting -- Privacy-Aware Access Control through Negotiation in Daily Life Service
Dimensions
unknown
Edition
1st ed. 2008.
Extent
1 online resource (XXII, 524 p. 186 illus.)
File format
multiple file formats
Form of item
online
Isbn
9783540693048
Level of compression
uncompressed
Media category
computer
Media type code
  • c
Other control number
10.1007/978-3-540-69304-8
Quality assurance targets
absent
Reformatting quality
access
Specific material designation
remote
System control number
  • (CKB)1000000000440782
  • (SSID)ssj0000318358
  • (PQKBManifestationID)11241975
  • (PQKBTitleCode)TC0000318358
  • (PQKBWorkID)10308184
  • (PQKB)10120464
  • (DE-He213)978-3-540-69304-8
  • (MiAaPQ)EBC3068594
  • (EXLCZ)991000000000440782
Label
Intelligence and Security Informatics : IEEE ISI 2008 International Workshops: PAISI, PACCF and SOCO 2008, Taipei, Taiwan, June 17, 2008, Proceedings, edited by Christopher C. Yang, Hsinchun Chen, Michael Chau, Kuiyu Chang, Sheau-Dong Lang, Patrick Chen, Raymond Hsieh, Daniel Zeng, Fei-Yue Wang, Kathleen M. Carley, Wenji Mao, Justin Zhan, (electronic resource)
Publication
Note
International conference proceedings
Antecedent source
mixed
Bibliography note
Includes bibliographical references and index
Carrier category
online resource
Carrier category code
  • cr
Color
not applicable
Content category
text
Content type code
  • txt
Contents
Pacific Asia Workshop on Intelligence and Security Informatics (PAISI 2008) -- Chinese Word Segmentation for Terrorism-Related Contents -- A Term Association Inference Model for Single Documents: A Stepping Stone for Investigation through Information Extraction -- Method for Evaluating the Security Risk of a Website Against Phishing Attacks -- CyberIR – A Technological Approach to Fight Cybercrime -- The Banknote Anti-forgery System Based on Digital Signature Algorithms -- Sequence Matching for Suspicious Activity Detection in Anti-Money Laundering -- Data Protection in Memory Using Byte Reordering -- Highly Efficient Password-Based Three-Party Key Exchange in Random Oracle Model -- A Pairwise Key Pre-distribution Scheme for Wireless Sensor Network -- Attacks on SVD-Based Watermarking Schemes -- Trigger Based Security Alarming Scheme for Moving Objects on Road Networks -- Reducing False Alarm of Video-Based Smoke Detection by Support Vector Machine -- Privacy-Preserving Collaborative Social Networks -- Efficient Secret Authenticatable Anonymous Signcryption Scheme with Identity Privacy -- How to Publicly Verifiably Expand a Member without Changing Old Shares in a Secret Sharing Scheme -- Comparing Two Models for Terrorist Group Detection: GDM or OGDM? -- Applying Case-Based Reasoning and Expert Systems to Coastal Patrol Crime Investigation in Taiwan -- Integrating Data Sources and Network Analysis Tools to Support the Fight Against Organized Crime -- Visual Analytics for Supporting Entity Relationship Discovery on Text Data -- Feature Weighting and Selection for a Real-Time Network Intrusion Detection System Based on GA with KNN -- Locality-Based Server Profiling for Intrusion Detection -- Pacific Asia Workshop on Cybercrime and Computer Forensics (PACCF 2008) -- A Simple WordNet-Ontology Based Email Retrieval System for Digital Forensics -- Preservation of Evidence in Case of Online Gaming Crime -- Dataset Analysis of Proxy Logs Detecting to Curb Propagations in Network Attacks -- Identifying Chinese E-Mail Documents’ Authorship for the Purpose of Computer Forensic -- A Collaborative Forensics Framework for VoIP Services in Multi-network Environments -- Wireless Forensic: A New Radio Frequency Based Locating System -- Applying Public-Key Watermarking Techniques in Forensic Imaging to Preserve the Authenticity of the Evidence -- Computer Forensics and Culture -- E-Commerce Security: The Categorical Role of Computers in Forensic Online Crime -- Forensic Artifacts of Microsoft Windows Vista System -- Workshop on Social Computing (SOCO 2008) -- How Useful Are Tags? — An Empirical Analysis of Collaborative Tagging for Web Page Recommendation -- A Generative Model for Statistical Determination of Information Content from Conversation Threads -- Using “Cited by” Information to Find the Context of Research Papers -- Online Communities: A Social Computing Perspective -- User-Centered Interface Design of Social Websites -- Discovering Trends in Collaborative Tagging Systems -- Socio-contextual Filters for Discovering Similar Knowledge-Gathering Tasks in Generic Information Systems -- Exploring Social Dynamics in Online Bookmarking Systems -- Dispositional Factors in the Use of Social Networking Sites: Findings and Implications for Social Computing Research -- Agent-Based Social Simulation and Modeling in Social Computing -- Transforming Raw-Email Data into Social-Network Information -- Using Social Networks to Organize Researcher Community -- Online Gaming Perpetrators Model -- Proposal for a Multiagent Architecture for Self-Organizing Systems (MA-SOS) -- Applying Text Mining to Assist People Who Inquire HIV/AIDS Information from Internet -- Polarity Classification of Public Health Opinions in Chinese -- Parallel Crawling and Capturing for On-Line Auction -- A New Credit Card Payment Scheme Using Mobile Phones Based on Visual Cryptography -- Detecting Hidden Hierarchy in Terrorist Networks: Some Case Studies -- Keyphrase Extraction from Chinese News Web Pages Based on Semantic Relations -- Automatic Recognition of News Web Pages -- Understanding Users’ Attitudes Towards Using a VoIP Survey -- Privacy-Preserving Collaborative E-Voting -- Privacy-Aware Access Control through Negotiation in Daily Life Service
Dimensions
unknown
Edition
1st ed. 2008.
Extent
1 online resource (XXII, 524 p. 186 illus.)
File format
multiple file formats
Form of item
online
Isbn
9783540693048
Level of compression
uncompressed
Media category
computer
Media type code
  • c
Other control number
10.1007/978-3-540-69304-8
Quality assurance targets
absent
Reformatting quality
access
Specific material designation
remote
System control number
  • (CKB)1000000000440782
  • (SSID)ssj0000318358
  • (PQKBManifestationID)11241975
  • (PQKBTitleCode)TC0000318358
  • (PQKBWorkID)10308184
  • (PQKB)10120464
  • (DE-He213)978-3-540-69304-8
  • (MiAaPQ)EBC3068594
  • (EXLCZ)991000000000440782

Library Locations

  • Architecture LibraryBorrow it
    Gould Hall 830 Van Vleet Oval Rm. 105, Norman, OK, 73019, US
    35.205706 -97.445050
  • Bizzell Memorial LibraryBorrow it
    401 W. Brooks St., Norman, OK, 73019, US
    35.207487 -97.447906
  • Boorstin CollectionBorrow it
    401 W. Brooks St., Norman, OK, 73019, US
    35.207487 -97.447906
  • Chinese Literature Translation ArchiveBorrow it
    401 W. Brooks St., RM 414, Norman, OK, 73019, US
    35.207487 -97.447906
  • Engineering LibraryBorrow it
    Felgar Hall 865 Asp Avenue, Rm. 222, Norman, OK, 73019, US
    35.205706 -97.445050
  • Fine Arts LibraryBorrow it
    Catlett Music Center 500 West Boyd Street, Rm. 20, Norman, OK, 73019, US
    35.210371 -97.448244
  • Harry W. Bass Business History CollectionBorrow it
    401 W. Brooks St., Rm. 521NW, Norman, OK, 73019, US
    35.207487 -97.447906
  • History of Science CollectionsBorrow it
    401 W. Brooks St., Rm. 521NW, Norman, OK, 73019, US
    35.207487 -97.447906
  • John and Mary Nichols Rare Books and Special CollectionsBorrow it
    401 W. Brooks St., Rm. 509NW, Norman, OK, 73019, US
    35.207487 -97.447906
  • Library Service CenterBorrow it
    2601 Technology Place, Norman, OK, 73019, US
    35.185561 -97.398361
  • Price College Digital LibraryBorrow it
    Adams Hall 102 307 West Brooks St., Norman, OK, 73019, US
    35.210371 -97.448244
  • Western History CollectionsBorrow it
    Monnet Hall 630 Parrington Oval, Rm. 300, Norman, OK, 73019, US
    35.209584 -97.445414
Processing Feedback ...