Intelligence and security informatics : Pacific Asia Workshop, PAISI 2010, Hyderabad, India, June 21, 2010 ; proceedings /

Saved in:
Bibliographic Details
Meeting name:PAISI 2010 (2010 : Hyderabad, India)
Imprint:Berlin : Springer, 2010.
Description:1 online resource (x, 172 pages) : illustrations.
Language:English
Series:Lecture notes in computer science, 0302-9743 ; 6122
Lecture notes in computer science ; 6122.
Subject:
Format: E-Resource Book
URL for this record:http://pi.lib.uchicago.edu/1001/cat/bib/11074412
Hidden Bibliographic Details
Other authors / contributors:Chen, Hsinchun.
ISBN:9783642136016
364213601X
9783642136009
3642136001
Notes:Includes bibliographical references and index.
Print version record.
Summary:This book constitutes the proceedings of the Pacific Asia Workshop on Intelligence and Security Informatics 2010, held in Hyderabad, India, in June 2010.
Other form:Print version: PAISI 2010 (2010 : Hyderabad, India). Intelligence and security informatics. Berlin : Springer, 2010 9783642136009 3642136001
Table of Contents:
  • Terrorism informatics and crime analysis. Combined detection model for criminal network detection / Fatih Ozgul, Zeki Erdem, Chris Bowerman, and Julian Bondy
  • An association model for implicit crime link analysis / Jau-Hwang Wang and Chien-Lung Lin
  • Design and deployment of a national detecting stolen vehicles network system / Weiping Chang and Chingwei Su
  • Fighting cybercrime : a KM perspective / Weiping Chang
  • Transportation infrastructure security. Trajectory similarity of network constrained moving objects and applications to traffic security / Sajimon Abraham and Paulose Sojan Lal
  • An emergent traffic messaging service using wireless technology / Patrick S. Chen, Yong-Kuei Liu, and Chia-Shih Hsu
  • Information access and security. A model for detecting "global footprint anomalies" in a grid environment / Pramod S. Pawar and Srinath Srinivasa
  • Secure anonymous routing for MANETs using distributed dynamic random path selection / Vakul Mohanty, Dhaval Moliya, Chittaranjan Hota, and Muttukrishnan Rajarajan
  • MAD-IDS : novel intrusion detection system using mobile agents and data mining approaches / Imen Brahmi, Sadok Ben Yahia, and Pascal Poncelet
  • Data encryption. Fuzzy biometric signcryption scheme with bilinear pairings in the standard model / Mingwu Zhang, Bo Yang, Tsuyoshi Takagi, Yanping Shen, and Wenzheng Zhang
  • Key independent decryption of graphically encrypted images / Ram Ratan
  • Towards confidentiality of ID-based signcryption schemes under without random oracle model / Mingwu Zhang, Pengcheng Li, Bo Yang, Hao Wang, and Tsuyoshi Takagi
  • JPEG steganalysis using HBCL statistics and FR index / Veena H. Bhat, Krishna S., P. Deepa Shenoy, Venugopal K.R., and L.M. Patnaik
  • Data and text mining. Text mining technique for Chinese written judgment of criminal case / Shihchieh Chou and Tai-Ping Hsing
  • Exploration of document relation quality with consideration of term representation basis, term weighting and association measure / Nichnan Kittiphattanabawon, Thanaruk Theeramunkong, and Ekawit Nantajeewarawat
  • Identifying controversial issues and their sub-topics in news articles / Yoonjung Choi, Yuchul Jung, and Sung-Hyon Myaeng
  • Efficient privacy preserving K-means clustering / Maneesh Upmanyu, Anoop M. Namboodiri, Kannan Srinathan, and C.V. Jawahar
  • A fuzzy threshold based modified clustering algorithm for natural data exploration / Binu Thomas and G. Raju.