Intelligence and security informatics : Pacific Asia Workshop, PAISI 2007, Chengdu, China, April 11-12, 2007 : proceedings, Christopher C. Yang [and others] (eds.)
Resource Information
The instance Intelligence and security informatics : Pacific Asia Workshop, PAISI 2007, Chengdu, China, April 11-12, 2007 : proceedings, Christopher C. Yang [and others] (eds.) represents a material embodiment of a distinct intellectual or artistic creation found in University of Missouri Libraries. This resource is a combination of several types including: Instance, Electronic.
The Resource
Intelligence and security informatics : Pacific Asia Workshop, PAISI 2007, Chengdu, China, April 11-12, 2007 : proceedings, Christopher C. Yang [and others] (eds.)
Resource Information
The instance Intelligence and security informatics : Pacific Asia Workshop, PAISI 2007, Chengdu, China, April 11-12, 2007 : proceedings, Christopher C. Yang [and others] (eds.) represents a material embodiment of a distinct intellectual or artistic creation found in University of Missouri Libraries. This resource is a combination of several types including: Instance, Electronic.
- Label
- Intelligence and security informatics : Pacific Asia Workshop, PAISI 2007, Chengdu, China, April 11-12, 2007 : proceedings, Christopher C. Yang [and others] (eds.)
- Title remainder
- Pacific Asia Workshop, PAISI 2007, Chengdu, China, April 11-12, 2007 : proceedings
- Statement of responsibility
- Christopher C. Yang [and others] (eds.)
- Bibliography note
- Includes bibliographical references and index
- Carrier category
- online resource
- Carrier category code
-
- cr
- Carrier MARC source
- rdacarrier
- Color
- multicolored
- Content category
- text
- Content type code
-
- txt
- Content type MARC source
- rdacontent
- Contents
- Keynote -- Exploring Extremism and Terrorism on the Web: The Dark Web Project -- Long Papers -- Analyzing and Visualizing Gray Web Forum Structure -- An Empirical Analysis of Online Gaming Crime Characteristics from 2002 to 2004 -- Detecting Cyber Security Threats in Weblogs Using Probabilistic Models -- What-if Emergency Management System: A Generalized Voronoi Diagram Approach -- Agent Based Framework for Emergency Rescue and Assistance Planning -- Object Tracking with Self-updating Tracking Window -- A Case-Based Evolutionary Group Decision Support Method for Emergency Response -- Lightweight Anomaly Intrusion Detection in Wireless Sensor Networks -- ASITL: Adaptive Secure Interoperation Using Trust-Level -- A RT0-Based Compliance Checker Model for Automated Trust Negotiation -- TCM-KNN Algorithm for Supervised Network Intrusion Detection -- Research on Hidden Markov Model for System Call Anomaly Detection -- Towards Identifying True Threat from Network Security Data -- Security Assessment for Application Network Services Using Fault Injection -- A Secure Data Transmission Protocol for Mobile Ad Hoc Networks -- Defending DDoS Attacks Using Hidden Markov Models and Cooperative Reinforcement Learning -- A Novel Relational Database Watermarking Algorithm -- Short Papers -- Anticipatory Event Detection for Bursty Events -- Community Detection in Scale-Free Networks Based on Hypergraph Model -- The Treelike Assembly Classifier for Pedestrian Detection -- A Proposed Data Mining Approach for Internet Auction Fraud Detection -- Trends in Computer Crime and Cybercrime Research During the Period 1974-2006: A Bibliometric Approach -- The Study of Government Website Information Disclosure in Taiwan -- Informed Recognition in Software Watermarking -- An Inference Control Algorithm for RDF(S) Repository -- PPIDS: Privacy Preserving Intrusion Detection System -- Evaluating the Disaster Defense Ability of Information Systems -- Airline Safety Evaluation Based on Fuzzy TOPSIS -- A Framework for Proving the Security of Data Transmission Protocols in Sensor Network -- Port and Address Hopping for Active Cyber-Defense -- A Hybrid Model for Worm Simulations in a Large Network -- Posters -- A Web Portal for Terrorism Activities in China -- An Overview of Telemarketing Fraud Problems and Countermeasures in Taiwan -- Mining the Core Member of Terrorist Crime Group Based on Social Network Analysis -- Providing Personalized Services for HWME System by Item-Based Collaborative Filtering -- An Intelligent Agent-Oriented System for Integrating Network Security Devices and Handling Large Amount of Security Events -- Link Analysis-Based Detection of Anomalous Communication Patterns -- Social Modeling and Reasoning for Security Informatics -- Detecting Botnets by Analyzing DNS Traffic -- HMM-Based Approach for Evaluating Risk Propagation -- A Symptom-Based Taxonomy for an Early Detection of Network Attacks
- Control code
- 191468254
- Dimensions
- unknown
- Extent
- 1 online resource (xii, 330 pages)
- Form of item
- online
- Isbn
- 9783540715481
- Media category
- computer
- Media MARC source
- rdamedia
- Media type code
-
- c
- Other control number
- 10.1007/978-3-540-71549-8
- Other physical details
- illustrations.
- http://library.link/vocab/ext/overdrive/overdriveId
- 978-3-540-71548-1
- Record ID
- .b129986963
- Specific material designation
- remote
- System control number
- (OCoLC)191468254
Context
Context of Intelligence and security informatics : Pacific Asia Workshop, PAISI 2007, Chengdu, China, April 11-12, 2007 : proceedings, Christopher C. Yang [and others] (eds.)Embed
Settings
Select options that apply then copy and paste the RDF/HTML data fragment to include in your application
Embed this data in a secure (HTTPS) page:
Layout options:
Include data citation:
<div class="citation" vocab="http://schema.org/"><i class="fa fa-external-link-square fa-fw"></i> Data from <span resource="http://link.library.missouri.edu/resource/8g4dEWUW_UM/" typeof="Book http://bibfra.me/vocab/lite/Instance"><span property="name http://bibfra.me/vocab/lite/label"><a href="http://link.library.missouri.edu/resource/8g4dEWUW_UM/">Intelligence and security informatics : Pacific Asia Workshop, PAISI 2007, Chengdu, China, April 11-12, 2007 : proceedings, Christopher C. Yang [and others] (eds.)</a></span> - <span property="potentialAction" typeOf="OrganizeAction"><span property="agent" typeof="LibrarySystem http://library.link/vocab/LibrarySystem" resource="http://link.library.missouri.edu/"><span property="name http://bibfra.me/vocab/lite/label"><a property="url" href="http://link.library.missouri.edu/">University of Missouri Libraries</a></span></span></span></span></div>
Note: Adjust the width and height settings defined in the RDF/HTML code fragment to best match your requirements
Preview
Cite Data - Experimental
Data Citation of the Instance Intelligence and security informatics : Pacific Asia Workshop, PAISI 2007, Chengdu, China, April 11-12, 2007 : proceedings, Christopher C. Yang [and others] (eds.)
Copy and paste the following RDF/HTML data fragment to cite this resource
<div class="citation" vocab="http://schema.org/"><i class="fa fa-external-link-square fa-fw"></i> Data from <span resource="http://link.library.missouri.edu/resource/8g4dEWUW_UM/" typeof="Book http://bibfra.me/vocab/lite/Instance"><span property="name http://bibfra.me/vocab/lite/label"><a href="http://link.library.missouri.edu/resource/8g4dEWUW_UM/">Intelligence and security informatics : Pacific Asia Workshop, PAISI 2007, Chengdu, China, April 11-12, 2007 : proceedings, Christopher C. Yang [and others] (eds.)</a></span> - <span property="potentialAction" typeOf="OrganizeAction"><span property="agent" typeof="LibrarySystem http://library.link/vocab/LibrarySystem" resource="http://link.library.missouri.edu/"><span property="name http://bibfra.me/vocab/lite/label"><a property="url" href="http://link.library.missouri.edu/">University of Missouri Libraries</a></span></span></span></span></div>