default search action
PAISI 2010: Hyderabad, India
- Hsinchun Chen, Michael Chau, Shu-Hsing Li, Shalini R. Urs, Srinath Srinivasa, G. Alan Wang:
Intelligence and Security Informatics, Pacific Asia Workshop, PAISI 2010, Hyderabad, India, June 21, 2010. Proceedings. Lecture Notes in Computer Science 6122, Springer 2010, ISBN 978-3-642-13600-9
Terrorism Informatics and Crime Analysis
- Fatih Özgül, Zeki Erdem, Chris Bowerman, Julian Bondy:
Combined Detection Model for Criminal Network Detection. 1-14 - Jau-Hwang Wang, Chien-Lung Lin:
An Association Model for Implicit Crime Link Analysis. 15-21 - Weiping Chang, Chingwei Su:
Design and Deployment of a National Detecting Stolen Vehicles Network System. 22-27 - Weiping Chang:
Fighting Cybercrime: A KM Perspective. 28-30
Transportation Infrastructure Security
- Sajimon Abraham, Paulose Sojan Lal:
Trajectory Similarity of Network Constrained Moving Objects and Applications to Traffic Security. 31-43 - Patrick S. Chen, Yong-Kuei Liu, Chia-Shih Hsu:
An Emergent Traffic Messaging Service Using Wireless Technology. 44-51
Information Access and Security
- Pramod S. Pawar, Srinath Srinivasa:
A Model for Detecting "Global Footprint Anomalies" in a Grid Environment. 52-64 - Vakul Mohanty, Dhaval Moliya, Chittaranjan Hota, Muttukrishnan Rajarajan:
Secure Anonymous Routing for MANETs Using Distributed Dynamic Random Path Selection. 65-72 - Imen Brahmi, Sadok Ben Yahia, Pascal Poncelet:
MAD-IDS: Novel Intrusion Detection System Using Mobile Agents and Data Mining Approaches. 73-76
Data Encryption
- Mingwu Zhang, Bo Yang, Tsuyoshi Takagi, Yanping Shen, Wenzheng Zhang:
Fuzzy Biometric Signcryption Scheme with Bilinear Pairings in the Standard Model. 77-87 - Ram Ratan:
Key Independent Decryption of Graphically Encrypted Images. 88-97 - Mingwu Zhang, Pengcheng Li, Bo Yang, Hao Wang, Tsuyoshi Takagi:
Towards Confidentiality of ID-Based Signcryption Schemes under without Random Oracle Model. 98-104 - Veena H. Bhat, S. Krishna, P. Deepa Shenoy, K. R. Venugopal, Lalit M. Patnaik:
JPEG Steganalysis Using HBCL Statistics and FR Index. 105-112
Data and Text Mining
- Shihchieh Chou, Tai-Ping Hsing:
Text Mining Technique for Chinese Written Judgment of Criminal Case. 113-125 - Nichnan Kittiphattanabawon, Thanaruk Theeramunkong, Ekawit Nantajeewarawat:
Exploration of Document Relation Quality with Consideration of Term Representation Basis, Term Weighting and Association Measure. 126-139 - Yoonjung Choi, Yuchul Jung, Sung-Hyon Myaeng:
Identifying Controversial Issues and Their Sub-topics in News Articles. 140-153 - Maneesh Upmanyu, Anoop M. Namboodiri, Kannan Srinathan, C. V. Jawahar:
Efficient Privacy Preserving K-Means Clustering. 154-166 - Binu Thomas, G. Raju:
A Fuzzy Threshold Based Modified Clustering Algorithm for Natural Data Exploration. 167-172
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.