did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

We're the #1 textbook rental company. Let us show you why.

9783540333616

Intelligence and Security Informatics : International Workshop, WISI 2006, Singapore, April 9, 2006, Proceedings

by ; ; ; ;
  • ISBN13:

    9783540333616

  • ISBN10:

    3540333614

  • Format: Paperback
  • Copyright: 2006-04-15
  • Publisher: Springer Verlag

Note: Supplemental materials are not guaranteed with Rental or Used book purchases.

Purchase Benefits

List Price: $89.99 Save up to $71.43
  • Buy Used
    $67.49
    Add to Cart Free Shipping Icon Free Shipping

    USUALLY SHIPS IN 2-4 BUSINESS DAYS

Supplemental Materials

What is included with this book?

Summary

This book constitutes the refereed proceedings of the International Workshop on Intelligence and Security Informatics, WISI 2006, held in Singapore in conjunction with the 10th Pacific-Asia Conference on Knowledge Discovery and Data Mining (PAKDD 2006).The 32 revised full papers presented together with the abstract of the keynote talk were carefully reviewed and selected from numerous submissions. The papers are organized in topical sections on Web and text mining for terrorism informatics, cybercrime analysis, network security, and crime data mining.

Table of Contents

Data mining for security applicationsp. 1
Unraveling international terrorist groups' exploitation of the Web : technical sophistication, media richness, and web interactivityp. 4
Multi-lingual detection of terrorist content on the Webp. 16
INEXT : an investigative search tool for knowledge extractionp. 31
Cybercrime in Taiwan - an analysis of suspect recordsp. 38
Analysis of computer crime characteristics in Taiwanp. 49
A cross datasets referring outlier detection model applied to suspicious financial transaction discriminationp. 58
Detecting novel network attacks with a data fieldp. 66
Improving authentication accuracy of unfamiliar passwords with pauses and cues for keystroke dynamics-based authenticationp. 73
Illegal intrusion detection based on hidden information databasep. 79
Defender personality traitsp. 85
Mining criminal databases to finding investigation clues - by example of stolen automobiles databasep. 91
Country corruption analysis with self organizing maps and support vector machinesp. 103
Temporal representation in spike detection of sparse personal identity streamsp. 115
Mining positive associations of urban criminal activities using hierarchical crime hot spotsp. 127
VCCM mining : mining virtual community core members based on gene expression programmingp. 133
Integration of a cryptographic file system and access controlp. 139
Applications of homomorphic functions to software obfuscationp. 152
Security model for informational privacyp. 154
A viable system for tracing illegal users of videop. 156
Privacy and security enhanced offline oblivious transfer for massive data distributionp. 159
The effectiveness of artificial rhythms and cues in keystroke dynamics based user authenticationp. 161
Cascade damage estimation model for Internet attacksp. 163
A new secure key exchange protocol between STB and smart card in DTV broadcastingp. 165
A fuzzy anomaly detection systemp. 167
Hidden Markov model based intrusion detectionp. 169
One-class strategies for security information detectionp. 171
Design of an emergency prediction and prevention platform for societal security decision support using neural networksp. 173
A novel identity authentication technique without trustworthy third-party based on fingerprint verificationp. 175
Cyberspace community analysis and simulation using complex dynamic social networksp. 177
Analysis of infectious disease data based on evolutionary computationp. 179
Rule+exception learning-based class specification and labeling in intelligence and security analysisp. 181
A computational framework for decision analysis and support in ISI : artificial societies, computational experiments, and parallel systemsp. 183
Table of Contents provided by Blackwell. All Rights Reserved.

Supplemental Materials

What is included with this book?

The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.

The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.

Rewards Program