Intelligence and Security Informatics: IEEE ISI 2008 International Workshops : PAISI, PACCF, and SOCO 2008, Taipei, Taiwan, June 17, 2008, Proceedings
by Yang, Christopher C.; Chen, Hsinchun; Chau, Michael; Chang, Kuiyu; Lang, Sheau-dongRent Textbook
Digital
New Textbook
We're Sorry
Sold Out
Used Textbook
We're Sorry
Sold Out
How Marketplace Works:
- This item is offered by an independent seller and not shipped from our warehouse
- Item details like edition and cover design may differ from our description; see seller's comments before ordering.
- Sellers much confirm and ship within two business days; otherwise, the order will be cancelled and refunded.
- Marketplace purchases cannot be returned to eCampus.com. Contact the seller directly for inquiries; if no response within two days, contact customer service.
- Additional shipping costs apply to Marketplace purchases. Review shipping costs at checkout.
Summary
Table of Contents
| Information Retrieval and Event Detection | |
| Chinese Word Segmentation for Terrorism-Related Contents | p. 1 |
| A Term Association Inference Model for Single Documents: A Stepping Stone for Investigation through Information Extraction | p. 14 |
| Internet Security and Cybercrime | |
| Method for Evaluating the Security Risk of a Website Against Phishing Attacks | p. 21 |
| CyberIR - A Technological Approach to Fight Cybercrime | p. 32 |
| Currency and Data Protection | |
| The Banknote Anti-forgery System Based on Digital Signature Algorithms | p. 44 |
| Sequence Matching for Suspicious Activity Detection in Anti-Money Laundering | p. 50 |
| Data Protection in Memory Using Byte Reordering | p. 62 |
| Cryptography | |
| Highly Efficient Password-Based Three-Party Key Exchange in Random Oracle Model | p. 69 |
| A Pairwise Key Pre-distribution Scheme for Wireless Sensor Network | p. 77 |
| Image and Video Analysis | |
| Attacks on SVD-Based Watermarking Schemes | p. 83 |
| Trigger Based Security Alarming Scheme for Moving Objects on Road Networks | p. 92 |
| Reducing False Alarm of Video-Based Smoke Detection by Support Vector Machine | p. 102 |
| Privacy Issues | |
| Privacy-Preserving Collaborative Social Networks | p. 114 |
| Efficient Secret Authenticatable Anonymous Signcryption Scheme with Identity Privacy | p. 126 |
| How to Publicly Verifiably Expand a Member without Changing Old Shares in a Secret Sharing Scheme | p. 138 |
| Social Networks | |
| Comparing Two Models for Terrorist Group Detection: GDM or OGDM? | p. 149 |
| Applying Case-Based Reasoning and Expert Systems to Coastal Patrol Crime Investigation in Taiwan | p. 161 |
| Modeling and Visualization | |
| Integrating Data Sources and Network Analysis Tools to Support the Fight Against Organized Crime | p. 171 |
| Visual Analytics for Supporting Entity Relationship Discovery on Text Data | p. 183 |
| Network Intrusion Detection | |
| Feature Weighting and Selection for a Real-Time Network Intrusion Detection System Based on GA with KNN | p. 195 |
| Locality-Based Server Profiling for Intrusion Detection | p. 205 |
| Forensic Information Management | |
| A Simple WordNet-Ontology Based Email Retrieval System for Digital Forensics | p. 217 |
| Preservation of Evidence in Case of Online Gaming Crime | p. 229 |
| Dataset Analysis of Proxy Logs Detecting to Curb Propagations in Network Attacks | p. 245 |
| Identifying Chinese E-Mail Documents' Authorship for the Purpose of Computer Forensic | p. 251 |
| Forensic Technologies | |
| A Collaborative Forensics Framework for VoIP Services in Multi-network Environments | p. 260 |
| Wireless Forensic: A New Radio Frequency Based Locating System | p. 272 |
| Applying Public-Key Watermarking Techniques in Forensic Imaging to Preserve the Authenticity of the Evidence | p. 278 |
| Forensic Principles and Tools | |
| Computer Forensics and Culture | p. 288 |
| E-Commerce Security: The Categorical Role of Computers in Forensic Online Crime | p. 298 |
| Forensic Artifacts of Microsoft Windows Vista System | p. 304 |
| Social Web and Social Information Management | |
| How Useful Are Tags? - An Empirical Analysis of Collaborative Tagging for Web Page Recommendation | p. 320 |
| A Generative Model for Statistical Determination of Information Content from Conversation Threads | p. 331 |
| Using "Cited by" Information to Find the Context of Research Papers | p. 343 |
| Online Communities: A Social Computing Perspective | p. 355 |
| User-Centered Interface Design of Social Websites | p. 366 |
| Discovering Trends in Collaborative Tagging Systems | p. 377 |
| Socio-contextual Filters for Discovering Similar Knowledge-Gathering Tasks in Generic Information Systems | p. 384 |
| Exploring Social Dynamics in Online Bookmarking Systems | p. 390 |
| Social Networks and Agent-Based Modeling | |
| Dispositional Factors in the Use of Social Networking Sites: Findings and Implications for Social Computing Research | p. 392 |
| Agent-Based Social Simulation and Modeling in Social Computing | p. 401 |
| Transforming Raw-Email Data into Social-Network Information | p. 413 |
| Using Social Networks to Organize Researcher Community | p. 421 |
| Online Gaming Perpetrators Model | p. 428 |
| Proposal for a Multiagent Architecture for Self-Organizing Systems (MA-SOS) | p. 434 |
| Social Opinions, E-Commerce, Security and Privacy Considerations | |
| Applying Text Mining to Assist People Who Inquire HIV/AIDS Information from Internet | p. 440 |
| Polarity Classification of Public Health Opinions in Chinese | p. 449 |
| Parallel Crawling and Capturing for On-Line Auction | p. 455 |
| A New Credit Card Payment Scheme Using Mobile Phones Based on Visual Cryptography | p. 467 |
| Detecting Hidden Hierarchy in Terrorist Networks: Some Case Studies | p. 477 |
| Keyphrase Extraction from Chinese News Web Pages Based on Semantic Relations | p. 490 |
| Automatic Recognition of News Web Pages | p. 496 |
| Understanding Users' Attitudes Towards Using a VoIP Survey | p. 502 |
| Privacy-Preserving Collaborative E-Voting | p. 508 |
| Privacy-Aware Access Control through Negotiation in Daily Life Service | p. 514 |
| Author Index | p. 521 |
| Table of Contents provided by Blackwell. All Rights Reserved. |
An electronic version of this book is available through VitalSource.
This book is viewable on PC, Mac, iPhone, iPad, iPod Touch, and most smartphones.
By purchasing, you will be able to view this book online, as well as download it, for the chosen number of days.
Digital License
You are licensing a digital product for a set duration. Durations are set forth in the product description, with "Lifetime" typically meaning five (5) years of online access and permanent download to a supported device. All licenses are non-transferable.
More details can be found here.
A downloadable version of this book is available through the eCampus Reader or compatible Adobe readers.
Applications are available on iOS, Android, PC, Mac, and Windows Mobile platforms.
Please view the compatibility matrix prior to purchase.
