Intelligence and security informatics : Pacific Asia Workshop, PAISI 2010, Hyderabad, India, June 21, 2010 ; proceedings /
Saved in:
Meeting name: | PAISI 2010 (2010 : Hyderabad, India) |
---|---|
Imprint: | Berlin : Springer, 2010. |
Description: | 1 online resource (x, 172 pages) : illustrations. |
Language: | English |
Series: | Lecture notes in computer science, 0302-9743 ; 6122 Lecture notes in computer science ; 6122. |
Subject: | |
Format: | E-Resource Book |
URL for this record: | http://pi.lib.uchicago.edu/1001/cat/bib/11074412 |
Table of Contents:
- Terrorism informatics and crime analysis. Combined detection model for criminal network detection / Fatih Ozgul, Zeki Erdem, Chris Bowerman, and Julian Bondy
- An association model for implicit crime link analysis / Jau-Hwang Wang and Chien-Lung Lin
- Design and deployment of a national detecting stolen vehicles network system / Weiping Chang and Chingwei Su
- Fighting cybercrime : a KM perspective / Weiping Chang
- Transportation infrastructure security. Trajectory similarity of network constrained moving objects and applications to traffic security / Sajimon Abraham and Paulose Sojan Lal
- An emergent traffic messaging service using wireless technology / Patrick S. Chen, Yong-Kuei Liu, and Chia-Shih Hsu
- Information access and security. A model for detecting "global footprint anomalies" in a grid environment / Pramod S. Pawar and Srinath Srinivasa
- Secure anonymous routing for MANETs using distributed dynamic random path selection / Vakul Mohanty, Dhaval Moliya, Chittaranjan Hota, and Muttukrishnan Rajarajan
- MAD-IDS : novel intrusion detection system using mobile agents and data mining approaches / Imen Brahmi, Sadok Ben Yahia, and Pascal Poncelet
- Data encryption. Fuzzy biometric signcryption scheme with bilinear pairings in the standard model / Mingwu Zhang, Bo Yang, Tsuyoshi Takagi, Yanping Shen, and Wenzheng Zhang
- Key independent decryption of graphically encrypted images / Ram Ratan
- Towards confidentiality of ID-based signcryption schemes under without random oracle model / Mingwu Zhang, Pengcheng Li, Bo Yang, Hao Wang, and Tsuyoshi Takagi
- JPEG steganalysis using HBCL statistics and FR index / Veena H. Bhat, Krishna S., P. Deepa Shenoy, Venugopal K.R., and L.M. Patnaik
- Data and text mining. Text mining technique for Chinese written judgment of criminal case / Shihchieh Chou and Tai-Ping Hsing
- Exploration of document relation quality with consideration of term representation basis, term weighting and association measure / Nichnan Kittiphattanabawon, Thanaruk Theeramunkong, and Ekawit Nantajeewarawat
- Identifying controversial issues and their sub-topics in news articles / Yoonjung Choi, Yuchul Jung, and Sung-Hyon Myaeng
- Efficient privacy preserving K-means clustering / Maneesh Upmanyu, Anoop M. Namboodiri, Kannan Srinathan, and C.V. Jawahar
- A fuzzy threshold based modified clustering algorithm for natural data exploration / Binu Thomas and G. Raju.