Coverart for item
The Resource Intelligence and Security Informatics : Pacific Asia Workshop, PAISI 2007, Chengdu, China, April 11-12, 2007, Proceedings, edited by Christopher C. Yang, Daniel Zeng, Michael Chau, Kuiyu Chang, Qing Yang, Xueqi Cheng, Jue Wang, Fei-Yue Wang, Hsinchun Chen, (electronic resource)

Intelligence and Security Informatics : Pacific Asia Workshop, PAISI 2007, Chengdu, China, April 11-12, 2007, Proceedings, edited by Christopher C. Yang, Daniel Zeng, Michael Chau, Kuiyu Chang, Qing Yang, Xueqi Cheng, Jue Wang, Fei-Yue Wang, Hsinchun Chen, (electronic resource)

Label
Intelligence and Security Informatics : Pacific Asia Workshop, PAISI 2007, Chengdu, China, April 11-12, 2007, Proceedings
Title
Intelligence and Security Informatics
Title remainder
Pacific Asia Workshop, PAISI 2007, Chengdu, China, April 11-12, 2007, Proceedings
Statement of responsibility
edited by Christopher C. Yang, Daniel Zeng, Michael Chau, Kuiyu Chang, Qing Yang, Xueqi Cheng, Jue Wang, Fei-Yue Wang, Hsinchun Chen
Creator
Contributor
Editor
Editor
Subject
Language
  • eng
  • eng
Summary
Intelligence and security informatics (ISI) is concerned with the study of the development and use of advanced information technologies and systems for national, international, and societal security-related applications. The annual IEEE International Conference series on ISI was started in 2003 and the first four meetings were held in the United States. In 2006, the Workshop on ISI (http://isi. se. cuhk. edu. hk/2006/) was held in Singapore in conjunction with the Pacific Asia Conference on Knowledge Discovery and Data Mining, with over 100 contributors and participants from all over the world. These past ISI conferences have brought together academic researchers, law enforcement and intelligence experts, information technology consultants, and practitioners to discuss their research and practice related to various ISI topics including ISI data management, data and text mining for ISI applications, terrorism informatics, deception and intent detection, terrorist and criminal social network analysis, public health and bio-security, crime analysis, cyber-infrastructure protection, transportation infrastructure security, policy studies and evaluation, and information assurance, among others. We continued this stream of ISI conferences by organizing the 2007 Pacific Asia Workshop on ISI (PAISI 2007) to especially provide a stimulating forum for ISI researchers in Pacific Asia and other regions of the world to exchange ideas and report research progress. PAISI 2007 was hosted by the Chinese Academy of Sciences, the University of Arizona, and the Chinese University of Hong Kong
Member of
Is Subseries of
Dewey number
006.3/3
http://bibfra.me/vocab/relation/httpidlocgovvocabularyrelatorsedt
  • gWE2ddqtL8M
  • MbtKcpyIkyQ
  • 95goth7w2FM
  • zXQ_Hxiq-ss
  • SBoSbzjAJSk
  • bvTgy7iK9Mk
  • Q2jLpE2UH_o
  • 1vQ5_ZWTfDg
  • uUK1ZVQRzPM
Language note
English
LC call number
QA76.9.D335
Literary form
non fiction
http://bibfra.me/vocab/lite/meetingDate
2007
http://bibfra.me/vocab/lite/meetingName
PAISI 2007
Nature of contents
dictionaries
http://library.link/vocab/relatedWorkOrContributorName
  • Yang, Christopher C.
  • Zeng, Daniel.
  • Chau, Michael.
  • Chang, Kuiyu.
  • Yang, Qing.
  • Cheng, Xueqi.
  • Wang, Jue.
  • Wang, Fei-Yue.
  • Chen, Hsinchun.
Series statement
Information Systems and Applications, incl. Internet/Web, and HCI
Series volume
4430
http://library.link/vocab/subjectName
  • Data encryption (Computer science)
  • Information storage and retrieval systems
  • Computer Communication Networks
  • Computer science
  • Computers
  • Cryptology
  • Information Systems Applications (incl. Internet)
  • Information Storage and Retrieval
  • Computer Communication Networks
  • Computers and Society
  • Legal Aspects of Computing
Label
Intelligence and Security Informatics : Pacific Asia Workshop, PAISI 2007, Chengdu, China, April 11-12, 2007, Proceedings, edited by Christopher C. Yang, Daniel Zeng, Michael Chau, Kuiyu Chang, Qing Yang, Xueqi Cheng, Jue Wang, Fei-Yue Wang, Hsinchun Chen, (electronic resource)
Instantiates
Publication
Note
Description based upon print version of record
Bibliography note
Includes bibliographical references and index
Carrier category
online resource
Carrier category code
  • cr
Content category
text
Content type code
  • txt
Contents
Keynote -- Exploring Extremism and Terrorism on the Web: The Dark Web Project -- Long Papers -- Analyzing and Visualizing Gray Web Forum Structure -- An Empirical Analysis of Online Gaming Crime Characteristics from 2002 to 2004 -- Detecting Cyber Security Threats in Weblogs Using Probabilistic Models -- What-if Emergency Management System: A Generalized Voronoi Diagram Approach -- Agent Based Framework for Emergency Rescue and Assistance Planning -- Object Tracking with Self-updating Tracking Window -- A Case-Based Evolutionary Group Decision Support Method for Emergency Response -- Lightweight Anomaly Intrusion Detection in Wireless Sensor Networks -- ASITL: Adaptive Secure Interoperation Using Trust-Level -- A RT0-Based Compliance Checker Model for Automated Trust Negotiation -- TCM-KNN Algorithm for Supervised Network Intrusion Detection -- Research on Hidden Markov Model for System Call Anomaly Detection -- Towards Identifying True Threat from Network Security Data -- Security Assessment for Application Network Services Using Fault Injection -- A Secure Data Transmission Protocol for Mobile Ad Hoc Networks -- Defending DDoS Attacks Using Hidden Markov Models and Cooperative Reinforcement Learning -- A Novel Relational Database Watermarking Algorithm -- Short Papers -- Anticipatory Event Detection for Bursty Events -- Community Detection in Scale-Free Networks Based on Hypergraph Model -- The Treelike Assembly Classifier for Pedestrian Detection -- A Proposed Data Mining Approach for Internet Auction Fraud Detection -- Trends in Computer Crime and Cybercrime Research During the Period 1974-2006: A Bibliometric Approach -- The Study of Government Website Information Disclosure in Taiwan -- Informed Recognition in Software Watermarking -- An Inference Control Algorithm for RDF(S) Repository -- PPIDS: Privacy Preserving Intrusion Detection System -- Evaluating the Disaster Defense Ability of Information Systems -- Airline Safety Evaluation Based on Fuzzy TOPSIS -- A Framework for Proving the Security of Data Transmission Protocols in Sensor Network -- Port and Address Hopping for Active Cyber-Defense -- A Hybrid Model for Worm Simulations in a Large Network -- Posters -- A Web Portal for Terrorism Activities in China -- An Overview of Telemarketing Fraud Problems and Countermeasures in Taiwan -- Mining the Core Member of Terrorist Crime Group Based on Social Network Analysis -- Providing Personalized Services for HWME System by Item-Based Collaborative Filtering -- An Intelligent Agent-Oriented System for Integrating Network Security Devices and Handling Large Amount of Security Events -- Link Analysis-Based Detection of Anomalous Communication Patterns -- Social Modeling and Reasoning for Security Informatics -- Detecting Botnets by Analyzing DNS Traffic -- HMM-Based Approach for Evaluating Risk Propagation -- A Symptom-Based Taxonomy for an Early Detection of Network Attacks
Dimensions
unknown
Edition
1st ed. 2007.
Extent
1 online resource (340 p.)
Form of item
online
Isbn
9783540715498
Media category
computer
Media type code
  • c
Other control number
10.1007/978-3-540-71549-8
Specific material designation
remote
System control number
  • (CKB)1000000000490699
  • (EBL)3037304
  • (SSID)ssj0000299912
  • (PQKBManifestationID)11248742
  • (PQKBTitleCode)TC0000299912
  • (PQKBWorkID)10242761
  • (PQKB)10773766
  • (DE-He213)978-3-540-71549-8
  • (MiAaPQ)EBC3037304
  • (EXLCZ)991000000000490699
Label
Intelligence and Security Informatics : Pacific Asia Workshop, PAISI 2007, Chengdu, China, April 11-12, 2007, Proceedings, edited by Christopher C. Yang, Daniel Zeng, Michael Chau, Kuiyu Chang, Qing Yang, Xueqi Cheng, Jue Wang, Fei-Yue Wang, Hsinchun Chen, (electronic resource)
Publication
Note
Description based upon print version of record
Bibliography note
Includes bibliographical references and index
Carrier category
online resource
Carrier category code
  • cr
Content category
text
Content type code
  • txt
Contents
Keynote -- Exploring Extremism and Terrorism on the Web: The Dark Web Project -- Long Papers -- Analyzing and Visualizing Gray Web Forum Structure -- An Empirical Analysis of Online Gaming Crime Characteristics from 2002 to 2004 -- Detecting Cyber Security Threats in Weblogs Using Probabilistic Models -- What-if Emergency Management System: A Generalized Voronoi Diagram Approach -- Agent Based Framework for Emergency Rescue and Assistance Planning -- Object Tracking with Self-updating Tracking Window -- A Case-Based Evolutionary Group Decision Support Method for Emergency Response -- Lightweight Anomaly Intrusion Detection in Wireless Sensor Networks -- ASITL: Adaptive Secure Interoperation Using Trust-Level -- A RT0-Based Compliance Checker Model for Automated Trust Negotiation -- TCM-KNN Algorithm for Supervised Network Intrusion Detection -- Research on Hidden Markov Model for System Call Anomaly Detection -- Towards Identifying True Threat from Network Security Data -- Security Assessment for Application Network Services Using Fault Injection -- A Secure Data Transmission Protocol for Mobile Ad Hoc Networks -- Defending DDoS Attacks Using Hidden Markov Models and Cooperative Reinforcement Learning -- A Novel Relational Database Watermarking Algorithm -- Short Papers -- Anticipatory Event Detection for Bursty Events -- Community Detection in Scale-Free Networks Based on Hypergraph Model -- The Treelike Assembly Classifier for Pedestrian Detection -- A Proposed Data Mining Approach for Internet Auction Fraud Detection -- Trends in Computer Crime and Cybercrime Research During the Period 1974-2006: A Bibliometric Approach -- The Study of Government Website Information Disclosure in Taiwan -- Informed Recognition in Software Watermarking -- An Inference Control Algorithm for RDF(S) Repository -- PPIDS: Privacy Preserving Intrusion Detection System -- Evaluating the Disaster Defense Ability of Information Systems -- Airline Safety Evaluation Based on Fuzzy TOPSIS -- A Framework for Proving the Security of Data Transmission Protocols in Sensor Network -- Port and Address Hopping for Active Cyber-Defense -- A Hybrid Model for Worm Simulations in a Large Network -- Posters -- A Web Portal for Terrorism Activities in China -- An Overview of Telemarketing Fraud Problems and Countermeasures in Taiwan -- Mining the Core Member of Terrorist Crime Group Based on Social Network Analysis -- Providing Personalized Services for HWME System by Item-Based Collaborative Filtering -- An Intelligent Agent-Oriented System for Integrating Network Security Devices and Handling Large Amount of Security Events -- Link Analysis-Based Detection of Anomalous Communication Patterns -- Social Modeling and Reasoning for Security Informatics -- Detecting Botnets by Analyzing DNS Traffic -- HMM-Based Approach for Evaluating Risk Propagation -- A Symptom-Based Taxonomy for an Early Detection of Network Attacks
Dimensions
unknown
Edition
1st ed. 2007.
Extent
1 online resource (340 p.)
Form of item
online
Isbn
9783540715498
Media category
computer
Media type code
  • c
Other control number
10.1007/978-3-540-71549-8
Specific material designation
remote
System control number
  • (CKB)1000000000490699
  • (EBL)3037304
  • (SSID)ssj0000299912
  • (PQKBManifestationID)11248742
  • (PQKBTitleCode)TC0000299912
  • (PQKBWorkID)10242761
  • (PQKB)10773766
  • (DE-He213)978-3-540-71549-8
  • (MiAaPQ)EBC3037304
  • (EXLCZ)991000000000490699

Library Locations

  • Architecture LibraryBorrow it
    Gould Hall 830 Van Vleet Oval Rm. 105, Norman, OK, 73019, US
    35.205706 -97.445050
  • Bizzell Memorial LibraryBorrow it
    401 W. Brooks St., Norman, OK, 73019, US
    35.207487 -97.447906
  • Boorstin CollectionBorrow it
    401 W. Brooks St., Norman, OK, 73019, US
    35.207487 -97.447906
  • Chinese Literature Translation ArchiveBorrow it
    401 W. Brooks St., RM 414, Norman, OK, 73019, US
    35.207487 -97.447906
  • Engineering LibraryBorrow it
    Felgar Hall 865 Asp Avenue, Rm. 222, Norman, OK, 73019, US
    35.205706 -97.445050
  • Fine Arts LibraryBorrow it
    Catlett Music Center 500 West Boyd Street, Rm. 20, Norman, OK, 73019, US
    35.210371 -97.448244
  • Harry W. Bass Business History CollectionBorrow it
    401 W. Brooks St., Rm. 521NW, Norman, OK, 73019, US
    35.207487 -97.447906
  • History of Science CollectionsBorrow it
    401 W. Brooks St., Rm. 521NW, Norman, OK, 73019, US
    35.207487 -97.447906
  • John and Mary Nichols Rare Books and Special CollectionsBorrow it
    401 W. Brooks St., Rm. 509NW, Norman, OK, 73019, US
    35.207487 -97.447906
  • Library Service CenterBorrow it
    2601 Technology Place, Norman, OK, 73019, US
    35.185561 -97.398361
  • Price College Digital LibraryBorrow it
    Adams Hall 102 307 West Brooks St., Norman, OK, 73019, US
    35.210371 -97.448244
  • Western History CollectionsBorrow it
    Monnet Hall 630 Parrington Oval, Rm. 300, Norman, OK, 73019, US
    35.209584 -97.445414
Processing Feedback ...