Online Library TheLib.net » Intelligence and Security Informatics: Pacific Asia Workshop, PAISI 2012, Kuala Lumpur, Malaysia, May 29, 2012. Proceedings

This book constitutes the refereed proceedings of the Pacific Asia Workshop on Intelligence and Security Informatics, PAISI 2012, held in Kuala Lumpur, Malaysia, in May 2012 - held in conjunction with the Pacific Asia Conference on Knowledge Discovery and Data Mining (PAKDD 2012). The 8 revised full papers and the 8 revised short papers presented together with 1 keynote lecture were carefully reviewed and selected from numerous submissions. The papers are organized in topical sections on terrorism informatics and crime analysis, social media, intrusion detection, data and text mining, as well as information access and security.




This book constitutes the refereed proceedings of the Pacific Asia Workshop on Intelligence and Security Informatics, PAISI 2012, held in Kuala Lumpur, Malaysia, in May 2012 - held in conjunction with the Pacific Asia Conference on Knowledge Discovery and Data Mining (PAKDD 2012). The 8 revised full papers and the 8 revised short papers presented together with 1 keynote lecture were carefully reviewed and selected from numerous submissions. The papers are organized in topical sections on terrorism informatics and crime analysis, social media, intrusion detection, data and text mining, as well as information access and security.


This book constitutes the refereed proceedings of the Pacific Asia Workshop on Intelligence and Security Informatics, PAISI 2012, held in Kuala Lumpur, Malaysia, in May 2012 - held in conjunction with the Pacific Asia Conference on Knowledge Discovery and Data Mining (PAKDD 2012). The 8 revised full papers and the 8 revised short papers presented together with 1 keynote lecture were carefully reviewed and selected from numerous submissions. The papers are organized in topical sections on terrorism informatics and crime analysis, social media, intrusion detection, data and text mining, as well as information access and security.
Content:
Front Matter....Pages -
Cloud-Centric Assured Information Sharing....Pages 1-26
Illicit Activities and Terrorism in Cyberspace: An Exploratory Study in the Southeast Asian Region....Pages 27-35
CybercrimeIR – A Technological Perspective to Fight Cybercrime....Pages 36-44
Information Credibility on Twitter in Emergency Situation....Pages 45-59
Multi-Layer Network for Influence Propagation over Microblog....Pages 60-72
A Hybrid System for Online Detection of Emotional Distress....Pages 73-80
Process Mining and Security: Visualization in Database Intrusion Detection....Pages 81-95
Securing Advanced Metering Infrastructure Using Intrusion Detection System with Data Stream Mining....Pages 96-111
A Universal Toolkit for Cryptographically Secure Privacy-Preserving Data Mining....Pages 112-126
Identifying Walk Cycles for Human Recognition....Pages 127-135
Chinese Organization Name Recognition Based on Multiple Features....Pages 136-144
A Plagiarism Detection System for Arabic Text-Based Documents....Pages 145-153
Examining Text Categorization Methods for Incidents Analysis....Pages 154-161
Multi-Committer Threshold Commitment Scheme from Lattice....Pages 162-175
Conjunctive Keywords Searchable Encryption with Efficient Pairing, Constant Ciphertext and Short Trapdoor....Pages 176-189
A Simultaneous Members Enrollment and Revocation Protocol for Secret Sharing Schemes....Pages 190-197
SaaS-Driven Botnets....Pages 198-206
Back Matter....Pages -


This book constitutes the refereed proceedings of the Pacific Asia Workshop on Intelligence and Security Informatics, PAISI 2012, held in Kuala Lumpur, Malaysia, in May 2012 - held in conjunction with the Pacific Asia Conference on Knowledge Discovery and Data Mining (PAKDD 2012). The 8 revised full papers and the 8 revised short papers presented together with 1 keynote lecture were carefully reviewed and selected from numerous submissions. The papers are organized in topical sections on terrorism informatics and crime analysis, social media, intrusion detection, data and text mining, as well as information access and security.
Content:
Front Matter....Pages -
Cloud-Centric Assured Information Sharing....Pages 1-26
Illicit Activities and Terrorism in Cyberspace: An Exploratory Study in the Southeast Asian Region....Pages 27-35
CybercrimeIR – A Technological Perspective to Fight Cybercrime....Pages 36-44
Information Credibility on Twitter in Emergency Situation....Pages 45-59
Multi-Layer Network for Influence Propagation over Microblog....Pages 60-72
A Hybrid System for Online Detection of Emotional Distress....Pages 73-80
Process Mining and Security: Visualization in Database Intrusion Detection....Pages 81-95
Securing Advanced Metering Infrastructure Using Intrusion Detection System with Data Stream Mining....Pages 96-111
A Universal Toolkit for Cryptographically Secure Privacy-Preserving Data Mining....Pages 112-126
Identifying Walk Cycles for Human Recognition....Pages 127-135
Chinese Organization Name Recognition Based on Multiple Features....Pages 136-144
A Plagiarism Detection System for Arabic Text-Based Documents....Pages 145-153
Examining Text Categorization Methods for Incidents Analysis....Pages 154-161
Multi-Committer Threshold Commitment Scheme from Lattice....Pages 162-175
Conjunctive Keywords Searchable Encryption with Efficient Pairing, Constant Ciphertext and Short Trapdoor....Pages 176-189
A Simultaneous Members Enrollment and Revocation Protocol for Secret Sharing Schemes....Pages 190-197
SaaS-Driven Botnets....Pages 198-206
Back Matter....Pages -
....
Download the book Intelligence and Security Informatics: Pacific Asia Workshop, PAISI 2012, Kuala Lumpur, Malaysia, May 29, 2012. Proceedings for free or read online
Read Download
Continue reading on any device:
QR code
Last viewed books
Related books
Comments (0)
reload, if the code cannot be seen