Intelligence and Security Informatics [electronic resource] : Pacific Asia Workshop, PAISI 2010, Hyderabad, India, June 21, 2010. Proceedings / edited by Hsinchun Chen, Michael Chau, Shu-hsing Li, Shalini Urs, Srinath Srinivasa, G. Alan Wang.

Por: Chen, Hsinchun [editor.]Colaborador(es): Chau, Michael [editor.] | Li, Shu-hsing [editor.] | Urs, Shalini [editor.] | Srinivasa, Srinath [editor.] | Wang, G. Alan [editor.]Tipo de material: TextoTextoSeries Lecture Notes in Computer Science, 6122Editor: Berlin, Heidelberg : Springer Berlin Heidelberg, 2010Descripción: 183p. 50 illus. online resourceTipo de contenido: text Tipo de medio: computer Tipo de portador: online resourceISBN: 9783642136016Trabajos contenidos: SpringerLink (Online service)Tema(s): Computer science | Computer Communication Networks | Data encryption (Computer science) | Database management | Data mining | Information storage and retrieval systems | Information systems | Computer Science | Data Encryption | Information Systems Applications (incl.Internet) | Database Management | Information Storage and Retrieval | Data Mining and Knowledge Discovery | Computer Communication NetworksFormatos físicos adicionales: Sin títuloClasificación CDD: 005.82 Clasificación LoC: Libro electrónicoRecursos en línea: de clik aquí para ver el libro electrónico
Contenidos:
Springer eBooks
Etiquetas de esta biblioteca: No hay etiquetas de esta biblioteca para este título. Ingresar para agregar etiquetas.
    Valoración media: 0.0 (0 votos)
No hay ítems correspondientes a este registro

Terrorism Informatics and Crime Analysis -- Combined Detection Model for Criminal Network Detection -- An Association Model for Implicit Crime Link Analysis -- Design and Deployment of a National Detecting Stolen Vehicles Network System -- Fighting Cybercrime: A KM Perspective -- Transportation Infrastructure Security -- Trajectory Similarity of Network Constrained Moving Objects and Applications to Traffic Security -- An Emergent Traffic Messaging Service Using Wireless Technology -- Information Access and Security -- A Model for Detecting ǣGlobal Footprint Anomaliesǥ in a Grid Environment -- Secure Anonymous Routing for MANETs Using Distributed Dynamic Random Path Selection -- MAD-IDS: Novel Intrusion Detection System Using Mobile Agents and Data Mining Approaches -- Data Encryption -- Fuzzy Biometric Signcryption Scheme with Bilinear Pairings in the Standard Model -- Key Independent Decryption of Graphically Encrypted Images -- Towards Confidentiality of ID-Based Signcryption Schemes under without Random Oracle Model -- JPEG Steganalysis Using HBCL Statistics and FR Index -- Data and Text Mining -- Text Mining Technique for Chinese Written Judgment of Criminal Case -- Exploration of Document Relation Quality with Consideration of Term Representation Basis, Term Weighting and Association Measure -- Identifying Controversial Issues and Their Sub-topics in News Articles -- Efficient Privacy Preserving K-Means Clustering -- A Fuzzy Threshold Based Modified Clustering Algorithm for Natural Data Exploration.

ZDB-2-SCS

ZDB-2-LNC

No hay comentarios en este titulo.

para colocar un comentario.