did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

We're the #1 textbook rental company. Let us show you why.

9783540691365

Intelligence and Security Informatics: IEEE ISI 2008 International Workshops : PAISI, PACCF, and SOCO 2008, Taipei, Taiwan, June 17, 2008, Proceedings

by ; ; ; ;
  • ISBN13:

    9783540691365

  • ISBN10:

    3540691367

  • Format: Paperback
  • Copyright: 2008-08-03
  • Publisher: Springer Verlag
  • Purchase Benefits
List Price: $119.00 Save up to $100.44
  • Digital
    $40.22
    Add to Cart

    DURATION
    PRICE

Supplemental Materials

What is included with this book?

Summary

This book constitutes the refereed proceedings of the three international workshops PAISI 2008, PACCF 2008, and SOCO 2008, held as satellite events of the IEEE International Conference on Intelligence and Security Informatics, ISI 2008, in Taipei, Taiwan, in June 2008.The 55 revised full papers presented were carefully reviewed and selected from the presentations at the workshops. The 21 papers of the Pacific Asia Workshop on Intelligence and Security Informatics (PAISI 2008) cover topics such as information retrieval and event detection, internet security and cybercrime, currency and data protection, cryptography, image and video analysis, privacy issues, social networks, modeling and visualization, and network intrusion detection. The Pacific Asia Workshop on Cybercrime and Computer Forensics (PACCF 2008) furnishes 10 papers about forensic information management, forensic technologies, and forensic principles and tools. The 24 papers of the Workshop on Social Computing (SOCO 2008) are organized in topical sections on social web and social information management, social networks and agent-based modeling, as well as social opinions, e-commerce, security and privacy considerations.

Table of Contents

Information Retrieval and Event Detection
Chinese Word Segmentation for Terrorism-Related Contentsp. 1
A Term Association Inference Model for Single Documents: A Stepping Stone for Investigation through Information Extractionp. 14
Internet Security and Cybercrime
Method for Evaluating the Security Risk of a Website Against Phishing Attacksp. 21
CyberIR - A Technological Approach to Fight Cybercrimep. 32
Currency and Data Protection
The Banknote Anti-forgery System Based on Digital Signature Algorithmsp. 44
Sequence Matching for Suspicious Activity Detection in Anti-Money Launderingp. 50
Data Protection in Memory Using Byte Reorderingp. 62
Cryptography
Highly Efficient Password-Based Three-Party Key Exchange in Random Oracle Modelp. 69
A Pairwise Key Pre-distribution Scheme for Wireless Sensor Networkp. 77
Image and Video Analysis
Attacks on SVD-Based Watermarking Schemesp. 83
Trigger Based Security Alarming Scheme for Moving Objects on Road Networksp. 92
Reducing False Alarm of Video-Based Smoke Detection by Support Vector Machinep. 102
Privacy Issues
Privacy-Preserving Collaborative Social Networksp. 114
Efficient Secret Authenticatable Anonymous Signcryption Scheme with Identity Privacyp. 126
How to Publicly Verifiably Expand a Member without Changing Old Shares in a Secret Sharing Schemep. 138
Social Networks
Comparing Two Models for Terrorist Group Detection: GDM or OGDM?p. 149
Applying Case-Based Reasoning and Expert Systems to Coastal Patrol Crime Investigation in Taiwanp. 161
Modeling and Visualization
Integrating Data Sources and Network Analysis Tools to Support the Fight Against Organized Crimep. 171
Visual Analytics for Supporting Entity Relationship Discovery on Text Datap. 183
Network Intrusion Detection
Feature Weighting and Selection for a Real-Time Network Intrusion Detection System Based on GA with KNNp. 195
Locality-Based Server Profiling for Intrusion Detectionp. 205
Forensic Information Management
A Simple WordNet-Ontology Based Email Retrieval System for Digital Forensicsp. 217
Preservation of Evidence in Case of Online Gaming Crimep. 229
Dataset Analysis of Proxy Logs Detecting to Curb Propagations in Network Attacksp. 245
Identifying Chinese E-Mail Documents' Authorship for the Purpose of Computer Forensicp. 251
Forensic Technologies
A Collaborative Forensics Framework for VoIP Services in Multi-network Environmentsp. 260
Wireless Forensic: A New Radio Frequency Based Locating Systemp. 272
Applying Public-Key Watermarking Techniques in Forensic Imaging to Preserve the Authenticity of the Evidencep. 278
Forensic Principles and Tools
Computer Forensics and Culturep. 288
E-Commerce Security: The Categorical Role of Computers in Forensic Online Crimep. 298
Forensic Artifacts of Microsoft Windows Vista Systemp. 304
Social Web and Social Information Management
How Useful Are Tags? - An Empirical Analysis of Collaborative Tagging for Web Page Recommendationp. 320
A Generative Model for Statistical Determination of Information Content from Conversation Threadsp. 331
Using "Cited by" Information to Find the Context of Research Papersp. 343
Online Communities: A Social Computing Perspectivep. 355
User-Centered Interface Design of Social Websitesp. 366
Discovering Trends in Collaborative Tagging Systemsp. 377
Socio-contextual Filters for Discovering Similar Knowledge-Gathering Tasks in Generic Information Systemsp. 384
Exploring Social Dynamics in Online Bookmarking Systemsp. 390
Social Networks and Agent-Based Modeling
Dispositional Factors in the Use of Social Networking Sites: Findings and Implications for Social Computing Researchp. 392
Agent-Based Social Simulation and Modeling in Social Computingp. 401
Transforming Raw-Email Data into Social-Network Informationp. 413
Using Social Networks to Organize Researcher Communityp. 421
Online Gaming Perpetrators Modelp. 428
Proposal for a Multiagent Architecture for Self-Organizing Systems (MA-SOS)p. 434
Social Opinions, E-Commerce, Security and Privacy Considerations
Applying Text Mining to Assist People Who Inquire HIV/AIDS Information from Internetp. 440
Polarity Classification of Public Health Opinions in Chinesep. 449
Parallel Crawling and Capturing for On-Line Auctionp. 455
A New Credit Card Payment Scheme Using Mobile Phones Based on Visual Cryptographyp. 467
Detecting Hidden Hierarchy in Terrorist Networks: Some Case Studiesp. 477
Keyphrase Extraction from Chinese News Web Pages Based on Semantic Relationsp. 490
Automatic Recognition of News Web Pagesp. 496
Understanding Users' Attitudes Towards Using a VoIP Surveyp. 502
Privacy-Preserving Collaborative E-Votingp. 508
Privacy-Aware Access Control through Negotiation in Daily Life Servicep. 514
Author Indexp. 521
Table of Contents provided by Blackwell. All Rights Reserved.

Supplemental Materials

What is included with this book?

The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.

The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.

Rewards Program