Atjaunināt sīkdatņu piekrišanu

E-grāmata: Intelligence and Security Informatics: IEEE ISI 2008 International Workshops: PAISI, PACCF and SOCO 2008, Taipei, Taiwan, June 17, 2008, Proceedings

Edited by , Edited by , Edited by , Edited by , Edited by , Edited by , Edited by , Edited by , Edited by , Edited by
  • Formāts: PDF+DRM
  • Sērija : Lecture Notes in Computer Science 5075
  • Izdošanas datums: 10-Jun-2008
  • Izdevniecība: Springer-Verlag Berlin and Heidelberg GmbH & Co. K
  • Valoda: eng
  • ISBN-13: 9783540693048
Citas grāmatas par šo tēmu:
  • Formāts - PDF+DRM
  • Cena: 53,52 €*
  • * ši ir gala cena, t.i., netiek piemērotas nekādas papildus atlaides
  • Ielikt grozā
  • Pievienot vēlmju sarakstam
  • Šī e-grāmata paredzēta tikai personīgai lietošanai. E-grāmatas nav iespējams atgriezt un nauda par iegādātajām e-grāmatām netiek atmaksāta.
  • Formāts: PDF+DRM
  • Sērija : Lecture Notes in Computer Science 5075
  • Izdošanas datums: 10-Jun-2008
  • Izdevniecība: Springer-Verlag Berlin and Heidelberg GmbH & Co. K
  • Valoda: eng
  • ISBN-13: 9783540693048
Citas grāmatas par šo tēmu:

DRM restrictions

  • Kopēšana (kopēt/ievietot):

    nav atļauts

  • Drukāšana:

    nav atļauts

  • Lietošana:

    Digitālo tiesību pārvaldība (Digital Rights Management (DRM))
    Izdevējs ir piegādājis šo grāmatu šifrētā veidā, kas nozīmē, ka jums ir jāinstalē bezmaksas programmatūra, lai to atbloķētu un lasītu. Lai lasītu šo e-grāmatu, jums ir jāizveido Adobe ID. Vairāk informācijas šeit. E-grāmatu var lasīt un lejupielādēt līdz 6 ierīcēm (vienam lietotājam ar vienu un to pašu Adobe ID).

    Nepieciešamā programmatūra
    Lai lasītu šo e-grāmatu mobilajā ierīcē (tālrunī vai planšetdatorā), jums būs jāinstalē šī bezmaksas lietotne: PocketBook Reader (iOS / Android)

    Lai lejupielādētu un lasītu šo e-grāmatu datorā vai Mac datorā, jums ir nepieciešamid Adobe Digital Editions (šī ir bezmaksas lietotne, kas īpaši izstrādāta e-grāmatām. Tā nav tas pats, kas Adobe Reader, kas, iespējams, jau ir jūsu datorā.)

    Jūs nevarat lasīt šo e-grāmatu, izmantojot Amazon Kindle.

This book constitutes the refereed proceedings of the three international workshops PAISI 2008, PACCF 2008, and SOCO 2008, held as satellite events of the IEEE International Conference on Intelligence and Security Informatics, ISI 2008, in Taipei, Taiwan, in June 2008.



The 55 revised full papers presented were carefully reviewed and selected from the presentations at the workshops. The 21 papers of the Pacific Asia Workshop on Intelligence and Security Informatics (PAISI 2008) cover topics such as information retrieval and event detection, internet security and cybercrime, currency and data protection, cryptography, image and video analysis, privacy issues, social networks, modeling and visualization, and network intrusion detection. The Pacific Asia Workshop on Cybercrime and Computer Forensics (PACCF 2008) furnishes 10 papers about forensic information management, forensic technologies, and forensic principles and tools. The 24 papers of the Workshop on Social Computing (SOCO 2008) are organized in topical sections on social web and social information management, social networks and agent-based modeling, as well as social opinions, e-commerce, security and privacy considerations.
Pacific Asia Workshop on Intelligence and Security Informatics (PAISI
2008).- Chinese Word Segmentation for Terrorism-Related Contents.- A Term
Association Inference Model for Single Documents: A Stepping Stone for
Investigation through Information Extraction.- Method for Evaluating the
Security Risk of a Website Against Phishing Attacks.- CyberIR A
Technological Approach to Fight Cybercrime.- The Banknote Anti-forgery System
Based on Digital Signature Algorithms.- Sequence Matching for Suspicious
Activity Detection in Anti-Money Laundering.- Data Protection in Memory Using
Byte Reordering.- Highly Efficient Password-Based Three-Party Key Exchange in
Random Oracle Model.- A Pairwise Key Pre-distribution Scheme for Wireless
Sensor Network.- Attacks on SVD-Based Watermarking Schemes.- Trigger Based
Security Alarming Scheme for Moving Objects on Road Networks.- Reducing False
Alarm of Video-Based Smoke Detection by Support Vector Machine.-
Privacy-Preserving Collaborative Social Networks.- Efficient Secret
Authenticatable Anonymous Signcryption Scheme with Identity Privacy.- How to
Publicly Verifiably Expand a Member without Changing Old Shares in a Secret
Sharing Scheme.- Comparing Two Models for Terrorist Group Detection: GDM or
OGDM?.- Applying Case-Based Reasoning and Expert Systems to Coastal Patrol
Crime Investigation in Taiwan.- Integrating Data Sources and Network Analysis
Tools to Support the Fight Against Organized Crime.- Visual Analytics for
Supporting Entity Relationship Discovery on Text Data.- Feature Weighting and
Selection for a Real-Time Network Intrusion Detection System Based on GA with
KNN.- Locality-Based Server Profiling for Intrusion Detection.- Pacific Asia
Workshop on Cybercrime and Computer Forensics (PACCF 2008).- A Simple
WordNet-OntologyBased Email Retrieval System for Digital Forensics.-
Preservation of Evidence in Case of Online Gaming Crime.- Dataset Analysis of
Proxy Logs Detecting to Curb Propagations in Network Attacks.- Identifying
Chinese E-Mail Documents Authorship for the Purpose of Computer Forensic.- A
Collaborative Forensics Framework for VoIP Services in Multi-network
Environments.- Wireless Forensic: A New Radio Frequency Based Locating
System.- Applying Public-Key Watermarking Techniques in Forensic Imaging to
Preserve the Authenticity of the Evidence.- Computer Forensics and Culture.-
E-Commerce Security: The Categorical Role of Computers in Forensic Online
Crime.- Forensic Artifacts of Microsoft Windows Vista System.- Workshop on
Social Computing (SOCO 2008).- How Useful Are Tags? An Empirical Analysis
of Collaborative Tagging for Web Page Recommendation.- A Generative Model for
Statistical Determination of Information Content from Conversation Threads.-
Using Cited by Information to Find the Context of Research Papers.- Online
Communities: A Social Computing Perspective.- User-Centered Interface Design
of Social Websites.- Discovering Trends in Collaborative Tagging Systems.-
Socio-contextual Filters for Discovering Similar Knowledge-Gathering Tasks in
Generic Information Systems.- Exploring Social Dynamics in Online Bookmarking
Systems.- Dispositional Factors in the Use of Social Networking Sites:
Findings and Implications for Social Computing Research.- Agent-Based Social
Simulation and Modeling in Social Computing.- Transforming Raw-Email Data
into Social-Network Information.- Using Social Networks to Organize
Researcher Community.- Online Gaming Perpetrators Model.- Proposal for a
Multiagent Architecture for Self-Organizing Systems (MA-SOS).- Applying Text
Mining toAssist People Who Inquire HIV/AIDS Information from Internet.-
Polarity Classification of Public Health Opinions in Chinese.- Parallel
Crawling and Capturing for On-Line Auction.- A New Credit Card Payment Scheme
Using Mobile Phones Based on Visual Cryptography.- Detecting Hidden Hierarchy
in Terrorist Networks: Some Case Studies.- Keyphrase Extraction from Chinese
News Web Pages Based on Semantic Relations.- Automatic Recognition of News
Web Pages.- Understanding Users Attitudes Towards Using a VoIP Survey.-
Privacy-Preserving Collaborative E-Voting.- Privacy-Aware Access Control
through Negotiation in Daily Life Service.