> Details
Chau, Michael
[Author]
;
Wang, G. Alan
[Other];
Yue, Wei Thoo
[Other];
Chen, Hsinchun
[Other]
Intelligence and Security Informatics
Sharing
Reference
management
Direct link
Bookmarks
Remove from
bookmarks
Share this by email
Share this on Twitter
Share this on Facebook
Share this on Whatsapp
- Media type: E-Book; Conference Proceedings
- Title: Intelligence and Security Informatics : Pacific Asia Workshop, PAISI 2012, Kuala Lumpur, Malaysia, May 29, 2012. Proceedings
- Contributor: Chau, Michael [Author]; Wang, G. Alan [Other]; Yue, Wei Thoo [Other]; Chen, Hsinchun [Other]
-
Published:
Berlin, Heidelberg: Springer Berlin Heidelberg, 2012
-
Published in:
Lecture notes in computer science ; 7299
Bücher - Extent: Online-Ressource (X, 207p, digital)
- Language: English
- DOI: 10.1007/978-3-642-30428-6
- ISBN: 9783642304286
- Identifier:
-
RVK notation:
SS 4800 : Lecture notes in computer science
-
Keywords:
Computerkriminalität
>
World Wide Web 2.0
>
Data Mining
>
Text Mining
>
Kryptologie
>
Datensicherung
>
Computersicherheit
Internet > Terrorismus > Content Management > Data Mining > Innere Sicherheit
Computerkriminalität > Computerforensik > Data Mining > Wissensextraktion > Kryptoanalyse > Computersicherheit
Kritische Informationsinfrastruktur > Schutz > Privatsphäre > Zugriffskontrolle > Authentifikation
Internet > Soziales Netzwerk > Social Media > Wissensextraktion > Computersicherheit > Datensicherung
Maschinelles Sehen > Bilderkennung > Automatische Identifikation > Objektverfolgung > Kamera
Internet > Soziales Netzwerk > Social Media > Wissensextraktion > Computersicherheit > Datensicherung
- Origination:
-
Footnote:
Literaturangaben
- Description: This book constitutes the refereed proceedings of the Pacific Asia Workshop on Intelligence and Security Informatics, PAISI 2012, held in Kuala Lumpur, Malaysia, in May 2012 - held in conjunction with the Pacific Asia Conference on Knowledge Discovery and Data Mining (PAKDD 2012). The 8 revised full papers and the 8 revised short papers presented together with 1 keynote lecture were carefully reviewed and selected from numerous submissions. The papers are organized in topical sections on terrorism informatics and crime analysis, social media, intrusion detection, data and text mining, as well as information access and security.