Intelligence and Security Informatics: IEEE ISI 2008 International Workshops : PAISI, PACCF, and SOCO 2008, Taipei, Taiwan, June 17, 2008, Proceedings

by ; ; ; ;
Format: Paperback
Pub. Date: 2008-08-03
Publisher(s): Springer Verlag
List Price: $127.32

Rent Textbook

Select for Price
There was a problem. Please try again later.

Digital

Rent Digital Options
Online:30 Days access
Downloadable:30 Days
$19.80
Online:60 Days access
Downloadable:60 Days
$26.40
Online:90 Days access
Downloadable:90 Days
$33.00
Online:120 Days access
Downloadable:120 Days
$39.60
Online:180 Days access
Downloadable:180 Days
$42.90
Online:1825 Days access
Downloadable:Lifetime Access
$65.99
*To support the delivery of the digital material to you, a non-refundable digital delivery fee of $3.99 will be charged on each digital item.
$42.90*

New Textbook

We're Sorry
Sold Out

Used Textbook

We're Sorry
Sold Out

How Marketplace Works:

  • This item is offered by an independent seller and not shipped from our warehouse
  • Item details like edition and cover design may differ from our description; see seller's comments before ordering.
  • Sellers much confirm and ship within two business days; otherwise, the order will be cancelled and refunded.
  • Marketplace purchases cannot be returned to eCampus.com. Contact the seller directly for inquiries; if no response within two days, contact customer service.
  • Additional shipping costs apply to Marketplace purchases. Review shipping costs at checkout.

Summary

This book constitutes the refereed proceedings of the three international workshops PAISI 2008, PACCF 2008, and SOCO 2008, held as satellite events of the IEEE International Conference on Intelligence and Security Informatics, ISI 2008, in Taipei, Taiwan, in June 2008.The 55 revised full papers presented were carefully reviewed and selected from the presentations at the workshops. The 21 papers of the Pacific Asia Workshop on Intelligence and Security Informatics (PAISI 2008) cover topics such as information retrieval and event detection, internet security and cybercrime, currency and data protection, cryptography, image and video analysis, privacy issues, social networks, modeling and visualization, and network intrusion detection. The Pacific Asia Workshop on Cybercrime and Computer Forensics (PACCF 2008) furnishes 10 papers about forensic information management, forensic technologies, and forensic principles and tools. The 24 papers of the Workshop on Social Computing (SOCO 2008) are organized in topical sections on social web and social information management, social networks and agent-based modeling, as well as social opinions, e-commerce, security and privacy considerations.

Table of Contents

Information Retrieval and Event Detection
Chinese Word Segmentation for Terrorism-Related Contentsp. 1
A Term Association Inference Model for Single Documents: A Stepping Stone for Investigation through Information Extractionp. 14
Internet Security and Cybercrime
Method for Evaluating the Security Risk of a Website Against Phishing Attacksp. 21
CyberIR - A Technological Approach to Fight Cybercrimep. 32
Currency and Data Protection
The Banknote Anti-forgery System Based on Digital Signature Algorithmsp. 44
Sequence Matching for Suspicious Activity Detection in Anti-Money Launderingp. 50
Data Protection in Memory Using Byte Reorderingp. 62
Cryptography
Highly Efficient Password-Based Three-Party Key Exchange in Random Oracle Modelp. 69
A Pairwise Key Pre-distribution Scheme for Wireless Sensor Networkp. 77
Image and Video Analysis
Attacks on SVD-Based Watermarking Schemesp. 83
Trigger Based Security Alarming Scheme for Moving Objects on Road Networksp. 92
Reducing False Alarm of Video-Based Smoke Detection by Support Vector Machinep. 102
Privacy Issues
Privacy-Preserving Collaborative Social Networksp. 114
Efficient Secret Authenticatable Anonymous Signcryption Scheme with Identity Privacyp. 126
How to Publicly Verifiably Expand a Member without Changing Old Shares in a Secret Sharing Schemep. 138
Social Networks
Comparing Two Models for Terrorist Group Detection: GDM or OGDM?p. 149
Applying Case-Based Reasoning and Expert Systems to Coastal Patrol Crime Investigation in Taiwanp. 161
Modeling and Visualization
Integrating Data Sources and Network Analysis Tools to Support the Fight Against Organized Crimep. 171
Visual Analytics for Supporting Entity Relationship Discovery on Text Datap. 183
Network Intrusion Detection
Feature Weighting and Selection for a Real-Time Network Intrusion Detection System Based on GA with KNNp. 195
Locality-Based Server Profiling for Intrusion Detectionp. 205
Forensic Information Management
A Simple WordNet-Ontology Based Email Retrieval System for Digital Forensicsp. 217
Preservation of Evidence in Case of Online Gaming Crimep. 229
Dataset Analysis of Proxy Logs Detecting to Curb Propagations in Network Attacksp. 245
Identifying Chinese E-Mail Documents' Authorship for the Purpose of Computer Forensicp. 251
Forensic Technologies
A Collaborative Forensics Framework for VoIP Services in Multi-network Environmentsp. 260
Wireless Forensic: A New Radio Frequency Based Locating Systemp. 272
Applying Public-Key Watermarking Techniques in Forensic Imaging to Preserve the Authenticity of the Evidencep. 278
Forensic Principles and Tools
Computer Forensics and Culturep. 288
E-Commerce Security: The Categorical Role of Computers in Forensic Online Crimep. 298
Forensic Artifacts of Microsoft Windows Vista Systemp. 304
Social Web and Social Information Management
How Useful Are Tags? - An Empirical Analysis of Collaborative Tagging for Web Page Recommendationp. 320
A Generative Model for Statistical Determination of Information Content from Conversation Threadsp. 331
Using "Cited by" Information to Find the Context of Research Papersp. 343
Online Communities: A Social Computing Perspectivep. 355
User-Centered Interface Design of Social Websitesp. 366
Discovering Trends in Collaborative Tagging Systemsp. 377
Socio-contextual Filters for Discovering Similar Knowledge-Gathering Tasks in Generic Information Systemsp. 384
Exploring Social Dynamics in Online Bookmarking Systemsp. 390
Social Networks and Agent-Based Modeling
Dispositional Factors in the Use of Social Networking Sites: Findings and Implications for Social Computing Researchp. 392
Agent-Based Social Simulation and Modeling in Social Computingp. 401
Transforming Raw-Email Data into Social-Network Informationp. 413
Using Social Networks to Organize Researcher Communityp. 421
Online Gaming Perpetrators Modelp. 428
Proposal for a Multiagent Architecture for Self-Organizing Systems (MA-SOS)p. 434
Social Opinions, E-Commerce, Security and Privacy Considerations
Applying Text Mining to Assist People Who Inquire HIV/AIDS Information from Internetp. 440
Polarity Classification of Public Health Opinions in Chinesep. 449
Parallel Crawling and Capturing for On-Line Auctionp. 455
A New Credit Card Payment Scheme Using Mobile Phones Based on Visual Cryptographyp. 467
Detecting Hidden Hierarchy in Terrorist Networks: Some Case Studiesp. 477
Keyphrase Extraction from Chinese News Web Pages Based on Semantic Relationsp. 490
Automatic Recognition of News Web Pagesp. 496
Understanding Users' Attitudes Towards Using a VoIP Surveyp. 502
Privacy-Preserving Collaborative E-Votingp. 508
Privacy-Aware Access Control through Negotiation in Daily Life Servicep. 514
Author Indexp. 521
Table of Contents provided by Blackwell. All Rights Reserved.

An electronic version of this book is available through VitalSource.

This book is viewable on PC, Mac, iPhone, iPad, iPod Touch, and most smartphones.

By purchasing, you will be able to view this book online, as well as download it, for the chosen number of days.

Digital License

You are licensing a digital product for a set duration. Durations are set forth in the product description, with "Lifetime" typically meaning five (5) years of online access and permanent download to a supported device. All licenses are non-transferable.

More details can be found here.

A downloadable version of this book is available through the eCampus Reader or compatible Adobe readers.

Applications are available on iOS, Android, PC, Mac, and Windows Mobile platforms.

Please view the compatibility matrix prior to purchase.