TY - BOOK AU - Chen,Hsinchun ED - PAISI 2010 TI - Intelligence and security informatics: Pacific Asia Workshop, PAISI 2010, Hyderabad, India, June 21, 2010 ; proceedings T2 - Lecture notes in computer science, SN - 9783642136016 AV - QA76.9.A25 P35 2010 U1 - 005.8 22 PY - 2010/// CY - Berlin PB - Springer KW - Computer security KW - Congresses KW - Computer networks KW - Security measures KW - Access control KW - Internet KW - Computer Communication Networks KW - Computer Security KW - Sécurité informatique KW - Congrès KW - Réseaux d'ordinateurs KW - Sécurité KW - Mesures KW - Accès KW - Contrôle KW - aat KW - Informatique KW - eclas KW - fast KW - Computersicherheit KW - gnd KW - Datensicherung KW - Kryptoanalyse KW - Computerkriminalität KW - Ad-hoc-Netz KW - Congress KW - proceedings (reports) KW - Conference papers and proceedings KW - lcgft KW - Actes de congrès KW - rvmgf N1 - Includes bibliographical references and index; Terrorism informatics and crime analysis. Combined detection model for criminal network detection / Fatih Ozgul, Zeki Erdem, Chris Bowerman, and Julian Bondy -- An association model for implicit crime link analysis / Jau-Hwang Wang and Chien-Lung Lin -- Design and deployment of a national detecting stolen vehicles network system / Weiping Chang and Chingwei Su -- Fighting cybercrime : a KM perspective / Weiping Chang -- Transportation infrastructure security. Trajectory similarity of network constrained moving objects and applications to traffic security / Sajimon Abraham and Paulose Sojan Lal -- An emergent traffic messaging service using wireless technology / Patrick S. Chen, Yong-Kuei Liu, and Chia-Shih Hsu -- Information access and security. A model for detecting "global footprint anomalies" in a grid environment / Pramod S. Pawar and Srinath Srinivasa -- Secure anonymous routing for MANETs using distributed dynamic random path selection / Vakul Mohanty, Dhaval Moliya, Chittaranjan Hota, and Muttukrishnan Rajarajan -- MAD-IDS : novel intrusion detection system using mobile agents and data mining approaches / Imen Brahmi, Sadok Ben Yahia, and Pascal Poncelet -- Data encryption. Fuzzy biometric signcryption scheme with bilinear pairings in the standard model / Mingwu Zhang, Bo Yang, Tsuyoshi Takagi, Yanping Shen, and Wenzheng Zhang -- Key independent decryption of graphically encrypted images / Ram Ratan -- Towards confidentiality of ID-based signcryption schemes under without random oracle model / Mingwu Zhang, Pengcheng Li, Bo Yang, Hao Wang, and Tsuyoshi Takagi -- JPEG steganalysis using HBCL statistics and FR index / Veena H. Bhat, Krishna S., P. Deepa Shenoy, Venugopal K.R., and L.M. Patnaik -- Data and text mining. Text mining technique for Chinese written judgment of criminal case / Shihchieh Chou and Tai-Ping Hsing -- Exploration of document relation quality with consideration of term representation basis, term weighting and association measure / Nichnan Kittiphattanabawon, Thanaruk Theeramunkong, and Ekawit Nantajeewarawat -- Identifying controversial issues and their sub-topics in news articles / Yoonjung Choi, Yuchul Jung, and Sung-Hyon Myaeng -- Efficient privacy preserving K-means clustering / Maneesh Upmanyu, Anoop M. Namboodiri, Kannan Srinathan, and C.V. Jawahar -- A fuzzy threshold based modified clustering algorithm for natural data exploration / Binu Thomas and G. Raju N2 - This book constitutes the proceedings of the Pacific Asia Workshop on Intelligence and Security Informatics 2010, held in Hyderabad, India, in June 2010 UR - https://link.springer.com/10.1007/978-3-642-13601-6 ER -