E-Book, Englisch, 524 Seiten, eBook
Reihe: Information Systems and Applications, incl. Internet/Web, and HCI
Yang / Chen / Carley Intelligence and Security Informatics
2008
ISBN: 978-3-540-69304-8
Verlag: Springer
Format: PDF
Kopierschutz: 1 - PDF Watermark
IEEE ISI 2008 International Workshops: PAISI, PACCF and SOCO 2008, Taipei, Taiwan, June 17, 2008, Proceedings
E-Book, Englisch, 524 Seiten, eBook
Reihe: Information Systems and Applications, incl. Internet/Web, and HCI
ISBN: 978-3-540-69304-8
Verlag: Springer
Format: PDF
Kopierschutz: 1 - PDF Watermark
Zielgruppe
Research
Autoren/Hrsg.
Weitere Infos & Material
Pacific Asia Workshop on Intelligence and Security Informatics (PAISI 2008).- Chinese Word Segmentation for Terrorism-Related Contents.- A Term Association Inference Model for Single Documents: A Stepping Stone for Investigation through Information Extraction.- Method for Evaluating the Security Risk of a Website Against Phishing Attacks.- CyberIR – A Technological Approach to Fight Cybercrime.- The Banknote Anti-forgery System Based on Digital Signature Algorithms.- Sequence Matching for Suspicious Activity Detection in Anti-Money Laundering.- Data Protection in Memory Using Byte Reordering.- Highly Efficient Password-Based Three-Party Key Exchange in Random Oracle Model.- A Pairwise Key Pre-distribution Scheme for Wireless Sensor Network.- Attacks on SVD-Based Watermarking Schemes.- Trigger Based Security Alarming Scheme for Moving Objects on Road Networks.- Reducing False Alarm of Video-Based Smoke Detection by Support Vector Machine.- Privacy-Preserving Collaborative Social Networks.- Efficient Secret Authenticatable Anonymous Signcryption Scheme with Identity Privacy.- How to Publicly Verifiably Expand a Member without Changing Old Shares in a Secret Sharing Scheme.- Comparing Two Models for Terrorist Group Detection: GDM or OGDM?.- Applying Case-Based Reasoning and Expert Systems to Coastal Patrol Crime Investigation in Taiwan.- Integrating Data Sources and Network Analysis Tools to Support the Fight Against Organized Crime.- Visual Analytics for Supporting Entity Relationship Discovery on Text Data.- Feature Weighting and Selection for a Real-Time Network Intrusion Detection System Based on GA with KNN.- Locality-Based Server Profiling for Intrusion Detection.- Pacific Asia Workshop on Cybercrime and Computer Forensics (PACCF 2008).- A Simple WordNet-OntologyBased Email Retrieval System for Digital Forensics.- Preservation of Evidence in Case of Online Gaming Crime.- Dataset Analysis of Proxy Logs Detecting to Curb Propagations in Network Attacks.- Identifying Chinese E-Mail Documents’ Authorship for the Purpose of Computer Forensic.- A Collaborative Forensics Framework for VoIP Services in Multi-network Environments.- Wireless Forensic: A New Radio Frequency Based Locating System.- Applying Public-Key Watermarking Techniques in Forensic Imaging to Preserve the Authenticity of the Evidence.- Computer Forensics and Culture.- E-Commerce Security: The Categorical Role of Computers in Forensic Online Crime.- Forensic Artifacts of Microsoft Windows Vista System.- Workshop on Social Computing (SOCO 2008).- How Useful Are Tags? — An Empirical Analysis of Collaborative Tagging for Web Page Recommendation.- A Generative Model for Statistical Determination of Information Content from Conversation Threads.- Using “Cited by” Information to Find the Context of Research Papers.- Online Communities: A Social Computing Perspective.- User-Centered Interface Design of Social Websites.- Discovering Trends in Collaborative Tagging Systems.- Socio-contextual Filters for Discovering Similar Knowledge-Gathering Tasks in Generic Information Systems.- Exploring Social Dynamics in Online Bookmarking Systems.- Dispositional Factors in the Use of Social Networking Sites: Findings and Implications for Social Computing Research.- Agent-Based Social Simulation and Modeling in Social Computing.- Transforming Raw-Email Data into Social-Network Information.- Using Social Networks to Organize Researcher Community.- Online Gaming Perpetrators Model.- Proposal for a Multiagent Architecture for Self-Organizing Systems (MA-SOS).- Applying Text Mining toAssist People Who Inquire HIV/AIDS Information from Internet.- Polarity Classification of Public Health Opinions in Chinese.- Parallel Crawling and Capturing for On-Line Auction.- A New Credit Card Payment Scheme Using Mobile Phones Based on Visual Cryptography.- Detecting Hidden Hierarchy in Terrorist Networks: Some Case Studies.- Keyphrase Extraction from Chinese News Web Pages Based on Semantic Relations.- Automatic Recognition of News Web Pages.- Understanding Users’ Attitudes Towards Using a VoIP Survey.- Privacy-Preserving Collaborative E-Voting.- Privacy-Aware Access Control through Negotiation in Daily Life Service.