Intelligence and Security Informatics Pacific Asia Workshop, PAISI 2010, Hyderabad, India, June 21, 2010 Proceedings /

Intelligence and Security Informatics Pacific Asia Workshop, PAISI 2010, Hyderabad, India, June 21, 2010 Proceedings / [electronic resource] : edited by Hsinchun Chen, Michael Chau, Shu-Hsing Li, Shalini Urs, Srinath Srinivasa, G. Alan Wang. - 1st ed. 2010. - 183 p. 50 illus. online resource. - Security and Cryptology, 6122 2946-1863 ; . - Security and Cryptology, 6122 .

Terrorism Informatics and Crime Analysis -- Combined Detection Model for Criminal Network Detection -- An Association Model for Implicit Crime Link Analysis -- Design and Deployment of a National Detecting Stolen Vehicles Network System -- Fighting Cybercrime: A KM Perspective -- Transportation Infrastructure Security -- Trajectory Similarity of Network Constrained Moving Objects and Applications to Traffic Security -- An Emergent Traffic Messaging Service Using Wireless Technology -- Information Access and Security -- A Model for Detecting “Global Footprint Anomalies” in a Grid Environment -- Secure Anonymous Routing for MANETs Using Distributed Dynamic Random Path Selection -- MAD-IDS: Novel Intrusion Detection System Using Mobile Agents and Data Mining Approaches -- Data Encryption -- Fuzzy Biometric Signcryption Scheme with Bilinear Pairings in the Standard Model -- Key Independent Decryption of Graphically Encrypted Images -- Towards Confidentiality of ID-Based Signcryption Schemes under without Random Oracle Model -- JPEG Steganalysis Using HBCL Statistics and FR Index -- Data and Text Mining -- Text Mining Technique for Chinese Written Judgment of Criminal Case -- Exploration of Document Relation Quality with Consideration of Term Representation Basis, Term Weighting and Association Measure -- Identifying Controversial Issues and Their Sub-topics in News Articles -- Efficient Privacy Preserving K-Means Clustering -- A Fuzzy Threshold Based Modified Clustering Algorithm for Natural Data Exploration.

9783642136016

10.1007/978-3-642-13601-6 doi


Cryptography.
Data encryption (Computer science).
Computer networks .
Application software.
Database management.
Information storage and retrieval systems.
Data mining.
Cryptology.
Computer Communication Networks.
Computer and Information Systems Applications.
Database Management.
Information Storage and Retrieval.
Data Mining and Knowledge Discovery.

QA268

005.824
© 2024 IIIT-Delhi, library@iiitd.ac.in