Eintrag weiter verarbeiten

Intelligence and Security Informatics: Pacific Asia Workshop, PAISI 2010, Hyderabad, India, June 21, 2010. Proceedings

Gespeichert in:

Personen und Körperschaften: Chen, Hsinchun (VerfasserIn), Chau, Michael (Sonstige), Li, Shu-hsing (Sonstige), Srinivasa, Srinath (Sonstige), Urs, Shalini (Sonstige), Wang, G. Alan (Sonstige)
Titel: Intelligence and Security Informatics: Pacific Asia Workshop, PAISI 2010, Hyderabad, India, June 21, 2010. Proceedings/ edited by Hsinchun Chen, Michael Chau, Shu-hsing Li, Shalini Urs, Srinath Srinivasa, G. Alan Wang
Format: E-Book Konferenzbericht
Sprache: Englisch
veröffentlicht:
Berlin, Heidelberg Springer Berlin Heidelberg 2010
Gesamtaufnahme: SpringerLink
Lecture notes in computer science ; 6122
Schlagwörter:
Buchausg. u.d.T.: Intelligence and security informatics, Berlin : Springer, 2010, X, 172 S.
Quelle: Verbunddaten SWB
Zugangsinformationen: Elektronischer Volltext - Campuslizenz
LEADER 07705cam a22015492 4500
001 0-1649785666
003 DE-627
005 20240122105313.0
007 cr uuu---uuuuu
008 100702s2010 gw |||||o 00| ||eng c
020 |a 9783642136016  |9 978-3-642-13601-6 
024 7 |a 10.1007/978-3-642-13601-6  |2 doi 
035 |a (DE-627)1649785666 
035 |a (DE-576)325492735 
035 |a (DE-599)BSZ325492735 
035 |a (OCoLC)692304679 
035 |a (OCoLC)731124923 
035 |a (DE-He213)978-3-642-13601-6 
035 |a (EBP)040519759 
040 |a DE-627  |b ger  |c DE-627  |e rakwb 
041 |a eng 
044 |c XA-DE 
050 0 |a QA76.9.A25 
072 7 |a URY  |2 bicssc 
072 7 |a COM053000  |2 bisacsh 
072 7 |a GPJ  |2 bicssc 
084 |a SS 4800  |2 rvk  |0 (DE-625)rvk/143528: 
084 |a 54.72  |2 bkl 
084 |a 54.38  |2 bkl 
100 1 |a Chen, Hsinchun  |4 aut 
245 1 0 |a Intelligence and Security Informatics  |b Pacific Asia Workshop, PAISI 2010, Hyderabad, India, June 21, 2010. Proceedings  |c edited by Hsinchun Chen, Michael Chau, Shu-hsing Li, Shalini Urs, Srinath Srinivasa, G. Alan Wang 
264 1 |a Berlin, Heidelberg  |b Springer Berlin Heidelberg  |c 2010 
300 |a Online-Ressource (183p. 50 illus, digital) 
336 |a Text  |b txt  |2 rdacontent 
337 |a Computermedien  |b c  |2 rdamedia 
338 |a Online-Ressource  |b cr  |2 rdacarrier 
490 1 |a Lecture Notes in Computer Science  |v 6122 
490 0 |a SpringerLink  |a Bücher 
520 |a Terrorism Informatics and Crime Analysis -- Combined Detection Model for Criminal Network Detection -- An Association Model for Implicit Crime Link Analysis -- Design and Deployment of a National Detecting Stolen Vehicles Network System -- Fighting Cybercrime: A KM Perspective -- Transportation Infrastructure Security -- Trajectory Similarity of Network Constrained Moving Objects and Applications to Traffic Security -- An Emergent Traffic Messaging Service Using Wireless Technology -- Information Access and Security -- A Model for Detecting “Global Footprint Anomalies” in a Grid Environment -- Secure Anonymous Routing for MANETs Using Distributed Dynamic Random Path Selection -- MAD-IDS: Novel Intrusion Detection System Using Mobile Agents and Data Mining Approaches -- Data Encryption -- Fuzzy Biometric Signcryption Scheme with Bilinear Pairings in the Standard Model -- Key Independent Decryption of Graphically Encrypted Images -- Towards Confidentiality of ID-Based Signcryption Schemes under without Random Oracle Model -- JPEG Steganalysis Using HBCL Statistics and FR Index -- Data and Text Mining -- Text Mining Technique for Chinese Written Judgment of Criminal Case -- Exploration of Document Relation Quality with Consideration of Term Representation Basis, Term Weighting and Association Measure -- Identifying Controversial Issues and Their Sub-topics in News Articles -- Efficient Privacy Preserving K-Means Clustering -- A Fuzzy Threshold Based Modified Clustering Algorithm for Natural Data Exploration. 
650 0 |a Computer science 
650 0 |a Computer Communication Networks 
650 0 |a Information systems 
650 0 |a Computer Science 
650 0 |a Data encryption (Computer science) 
650 0 |a Database management 
650 0 |a Data mining 
650 0 |a Information storage and retrieval systems 
650 0 |a Cryptography. 
650 0 |a Application software. 
650 0 |a Computer networks . 
655 7 |a Konferenzschrift  |y 2010  |z Hyderabad, Andhra Pradesh  |0 (DE-588)1071861417  |0 (DE-627)826484824  |0 (DE-576)433375485  |2 gnd-content 
689 0 0 |D s  |0 (DE-588)4308416-3  |0 (DE-627)123816106  |0 (DE-576)211106267  |a Internet  |2 gnd 
689 0 1 |D s  |0 (DE-588)4274324-2  |0 (DE-627)104467525  |0 (DE-576)21070585X  |a Computersicherheit  |2 gnd 
689 0 2 |D s  |0 (DE-588)4011144-1  |0 (DE-627)106354191  |0 (DE-576)208892001  |a Datensicherung  |2 gnd 
689 0 3 |D s  |0 (DE-588)4830502-9  |0 (DE-627)489246060  |0 (DE-576)21698677X  |a Kryptoanalyse  |2 gnd 
689 0 |5 DE-101 
689 1 0 |D s  |0 (DE-588)7864395-8  |0 (DE-627)700634487  |0 (DE-576)363213635  |a Internetkriminalität  |2 gnd 
689 1 1 |D s  |0 (DE-588)4830502-9  |0 (DE-627)489246060  |0 (DE-576)21698677X  |a Kryptoanalyse  |2 gnd 
689 1 2 |D s  |0 (DE-588)4674811-8  |0 (DE-627)342826840  |0 (DE-576)214923150  |a Ad-hoc-Netz  |2 gnd 
689 1 |5 DE-101 
700 1 |a Chau, Michael  |4 oth 
700 1 |a Li, Shu-hsing  |4 oth 
700 1 |a Srinivasa, Srinath  |d 1973-  |0 (DE-588)123479797  |0 (DE-627)082579253  |0 (DE-576)293726345  |4 oth 
700 1 |a Urs, Shalini  |4 oth 
700 1 |a Wang, G. Alan  |4 oth 
776 1 |z 9783642136009 
776 0 8 |i Buchausg. u.d.T.  |t Intelligence and security informatics  |d Berlin : Springer, 2010  |h X, 172 S.  |w (DE-627)626834600  |w (DE-576)32434841X  |z 3642136001  |z 9783642136009 
830 0 |a Lecture notes in computer science  |v 6122  |9 6122  |w (DE-627)316228877  |w (DE-576)093890923  |w (DE-600)2018930-8  |x 1611-3349  |7 ns 
856 4 0 |u https://doi.org/10.1007/978-3-642-13601-6  |m X:SPRINGER  |x Verlag  |z lizenzpflichtig  |3 Volltext 
856 4 2 |u https://swbplus.bsz-bw.de/bsz325492735cov.jpg  |m V:DE-576  |m X:springer  |q image/jpeg  |v 20151016105937  |3 Cover 
912 |a ZDB-2-SCS 
912 |a ZDB-2-LNC  |b 2010 
912 |a ZDB-2-SEB 
912 |a ZDB-2-SCS  |b 2010 
912 |a ZDB-2-SXCS  |b 2010 
912 |a ZDB-2-SEB  |b 2010 
936 r v |a SS 4800  |b Lecture notes in computer science  |k Informatik  |k Enzyklopädien und Handbücher. Kongressberichte Schriftenreihe. Tafeln und Formelsammlungen  |k Schriftenreihen (indiv. Sign.)  |k Lecture notes in computer science  |0 (DE-627)1271461242  |0 (DE-625)rvk/143528:  |0 (DE-576)201461242 
936 b k |a 54.72  |j Künstliche Intelligenz  |q SEPA  |0 (DE-627)10641240X 
936 b k |a 54.38  |j Computersicherheit  |q SEPA  |0 (DE-627)106418866 
951 |a BO 
950 |a Cyber Security 
950 |a Datenverarbeitungssystem 
950 |a Sicherheit 
950 |a Computer 
950 |a Cybersicherheit 
950 |a Cybersecurity 
950 |a IT-Sicherheit 
950 |a Informationssicherheit 
950 |a Datensicherung 
950 |a Softwareschutz 
950 |a Datensicherheit 
950 |a Datenverarbeitung 
950 |a Computersicherheit 
950 |a Надёжность сохранения данных 
950 |a Datenautobahn 
950 |a ARPANet 
950 |a Rechnernetz 
950 |a TCP/IP 
950 |a 网际网络 
950 |a 互联网 
950 |a 網際網絡 
950 |a 互聯網 
950 |a Интернет 
950 |a Mobile Ad-hoc Network 
950 |a MANET 
950 |a Ad-hoc-Netzwerk 
950 |a Vermaschtes Netz 
950 |a Funknetz 
950 |a Drahtloses vermaschtes Netz 
950 |a Cryptoanalysis 
950 |a Angriff 
950 |a Attacke 
950 |a Kryptoanalytische Attacke 
950 |a Kryptoanalytischer Angriff 
950 |a Cryptanalysis 
950 |a Kryptologie 
950 |a Dechiffrierung 
950 |a Computerkriminalität 
950 |a Internet 
950 |a Netzkriminalität 
950 |a Kriminalität 
950 |a Cyberterrorismus 
856 4 0 |u http://dx.doi.org/10.1007/978-3-642-13601-6  |9 DE-14 
852 |a DE-14  |z 2011-07-20T14:58:50Z  |x epn:333456469X 
856 4 0 |u http://dx.doi.org/10.1007/978-3-642-13601-6  |9 DE-15 
852 |a DE-15  |z 2011-05-16T16:36:19Z  |x epn:3334564770 
976 |h Elektronischer Volltext - Campuslizenz 
856 4 0 |u http://dx.doi.org/10.1007/978-3-642-13601-6  |z Zum Online-Dokument  |9 DE-Zi4 
852 |a DE-Zi4  |z 2011-01-26T14:34:14Z  |x epn:3334564886 
856 4 0 |u http://dx.doi.org/10.1007/978-3-642-13601-6  |9 DE-520 
852 |a DE-520  |z 2012-11-21T16:10:20Z  |x epn:3334564967 
980 |a 1649785666  |b 0  |k 1649785666  |o 325492735 
openURL url_ver=Z39.88-2004&ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fvufind.svn.sourceforge.net%3Agenerator&rft.title=Intelligence+and+Security+Informatics%3A+Pacific+Asia+Workshop%2C+PAISI+2010%2C+Hyderabad%2C+India%2C+June+21%2C+2010.+Proceedings&rft.date=2010&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=book&rft.btitle=Intelligence+and+Security+Informatics%3A+Pacific+Asia+Workshop%2C+PAISI+2010%2C+Hyderabad%2C+India%2C+June+21%2C+2010.+Proceedings&rft.series=Lecture+notes+in+computer+science%2C+6122&rft.au=Chen%2C+Hsinchun&rft.pub=Springer+Berlin+Heidelberg&rft.edition=&rft.isbn=364213601X
SOLR
_version_ 1789362948200726528
access_facet Electronic Resources
author Chen, Hsinchun
author2 Chau, Michael, Li, Shu-hsing, Srinivasa, Srinath, Urs, Shalini, Wang, G. Alan
author2_role oth, oth, oth, oth, oth
author2_variant m c mc, s h l shl, s s ss, s u su, g a w ga gaw
author_facet Chen, Hsinchun, Chau, Michael, Li, Shu-hsing, Srinivasa, Srinath, Urs, Shalini, Wang, G. Alan
author_role aut
author_sort Chen, Hsinchun
author_variant h c hc
callnumber-first Q - Science
callnumber-label QA76
callnumber-raw QA76.9.A25
callnumber-search QA76.9.A25
callnumber-sort QA 276.9 A25
callnumber-subject QA - Mathematics
collection ZDB-2-SCS, ZDB-2-LNC, ZDB-2-SEB, ZDB-2-SXCS
contents Terrorism Informatics and Crime Analysis -- Combined Detection Model for Criminal Network Detection -- An Association Model for Implicit Crime Link Analysis -- Design and Deployment of a National Detecting Stolen Vehicles Network System -- Fighting Cybercrime: A KM Perspective -- Transportation Infrastructure Security -- Trajectory Similarity of Network Constrained Moving Objects and Applications to Traffic Security -- An Emergent Traffic Messaging Service Using Wireless Technology -- Information Access and Security -- A Model for Detecting “Global Footprint Anomalies” in a Grid Environment -- Secure Anonymous Routing for MANETs Using Distributed Dynamic Random Path Selection -- MAD-IDS: Novel Intrusion Detection System Using Mobile Agents and Data Mining Approaches -- Data Encryption -- Fuzzy Biometric Signcryption Scheme with Bilinear Pairings in the Standard Model -- Key Independent Decryption of Graphically Encrypted Images -- Towards Confidentiality of ID-Based Signcryption Schemes under without Random Oracle Model -- JPEG Steganalysis Using HBCL Statistics and FR Index -- Data and Text Mining -- Text Mining Technique for Chinese Written Judgment of Criminal Case -- Exploration of Document Relation Quality with Consideration of Term Representation Basis, Term Weighting and Association Measure -- Identifying Controversial Issues and Their Sub-topics in News Articles -- Efficient Privacy Preserving K-Means Clustering -- A Fuzzy Threshold Based Modified Clustering Algorithm for Natural Data Exploration.
ctrlnum (DE-627)1649785666, (DE-576)325492735, (DE-599)BSZ325492735, (OCoLC)692304679, (OCoLC)731124923, (DE-He213)978-3-642-13601-6, (EBP)040519759
de15_date 2011-05-16T16:36:19Z
doi_str_mv 10.1007/978-3-642-13601-6
era_facet 2010
facet_912a ZDB-2-SCS, ZDB-2-LNC, ZDB-2-SEB, ZDB-2-SXCS
facet_avail Online
facet_local_del330 Internet, Computersicherheit, Datensicherung, Kryptoanalyse, Internetkriminalität, Ad-hoc-Netz
finc_class_facet Informatik, Allgemeines, Mathematik
finc_id_str 0000886110
fincclass_txtF_mv science-computerscience
format eBook, ConferenceProceedings
format_access_txtF_mv Book, E-Book
format_de105 Ebook
format_de14 Book, E-Book
format_de15 Book, E-Book
format_del152 Buch
format_detail_txtF_mv text-online-monograph-independent-conference
format_dezi4 e-Book
format_finc Book, E-Book
format_legacy ElectronicBook
format_legacy_nrw Book, E-Book
format_nrw Book, E-Book
format_strict_txtF_mv E-Book
genre Konferenzschrift 2010 Hyderabad, Andhra Pradesh (DE-588)1071861417 (DE-627)826484824 (DE-576)433375485 gnd-content
genre_facet Konferenzschrift
geogr_code not assigned
geogr_code_person not assigned
geographic_facet Hyderabad, Andhra Pradesh
hierarchy_parent_id 0-316228877
hierarchy_parent_title Lecture notes in computer science
hierarchy_sequence 6122
hierarchy_top_id 0-316228877
hierarchy_top_title Lecture notes in computer science
id 0-1649785666
illustrated Not Illustrated
imprint Berlin, Heidelberg, Springer Berlin Heidelberg, 2010
imprint_str_mv Berlin, Heidelberg: Springer Berlin Heidelberg, 2010
institution DE-14, DE-Zi4, DE-520, DE-15
is_hierarchy_id 0-1649785666
is_hierarchy_title Intelligence and Security Informatics: Pacific Asia Workshop, PAISI 2010, Hyderabad, India, June 21, 2010. Proceedings
isbn 9783642136016
isbn_isn_mv 9783642136009, 3642136001
issn_isn_mv 1611-3349
kxp_id_str 1649785666
language English
last_indexed 2024-01-28T19:18:05.891Z
local_heading_facet_dezwi2 Computer science, Computer Communication Networks, Information systems, Computer Science, Data encryption (Computer science), Database management, Data mining, Information storage and retrieval systems, Cryptography., Application software., Computer networks ., Internet, Computersicherheit, Datensicherung, Kryptoanalyse, Internetkriminalität, Ad-hoc-Netz
marc024a_ct_mv 10.1007/978-3-642-13601-6
match_str chen2010intelligenceandsecurityinformaticspacificasiaworkshoppaisi2010hyderabadindiajune212010proceedings
mega_collection Verbunddaten SWB
multipart_link 093890923
multipart_part (093890923)6122
names_id_str_mv (DE-588)123479797, (DE-627)082579253, (DE-576)293726345
oclc_num 692304679, 731124923
physical Online-Ressource (183p. 50 illus, digital)
publishDate 2010
publishDateSort 2010
publishPlace Berlin, Heidelberg
publisher Springer Berlin Heidelberg
record_format marcfinc
record_id 325492735
recordtype marcfinc
rsn_id_str_mv (DE-15)2461850
rvk_facet SS 4800
rvk_label Informatik, Enzyklopädien und Handbücher. Kongressberichte Schriftenreihe. Tafeln und Formelsammlungen, Schriftenreihen (indiv. Sign.), Lecture notes in computer science
rvk_path SS, SQ - SU, SS 4000 - SS 5999, SS 4800
rvk_path_str_mv SS, SQ - SU, SS 4000 - SS 5999, SS 4800
series Lecture notes in computer science, 6122
series2 Lecture Notes in Computer Science ; 6122, SpringerLink ; Bücher
source_id 0
spelling Chen, Hsinchun aut, Intelligence and Security Informatics Pacific Asia Workshop, PAISI 2010, Hyderabad, India, June 21, 2010. Proceedings edited by Hsinchun Chen, Michael Chau, Shu-hsing Li, Shalini Urs, Srinath Srinivasa, G. Alan Wang, Berlin, Heidelberg Springer Berlin Heidelberg 2010, Online-Ressource (183p. 50 illus, digital), Text txt rdacontent, Computermedien c rdamedia, Online-Ressource cr rdacarrier, Lecture Notes in Computer Science 6122, SpringerLink Bücher, Terrorism Informatics and Crime Analysis -- Combined Detection Model for Criminal Network Detection -- An Association Model for Implicit Crime Link Analysis -- Design and Deployment of a National Detecting Stolen Vehicles Network System -- Fighting Cybercrime: A KM Perspective -- Transportation Infrastructure Security -- Trajectory Similarity of Network Constrained Moving Objects and Applications to Traffic Security -- An Emergent Traffic Messaging Service Using Wireless Technology -- Information Access and Security -- A Model for Detecting “Global Footprint Anomalies” in a Grid Environment -- Secure Anonymous Routing for MANETs Using Distributed Dynamic Random Path Selection -- MAD-IDS: Novel Intrusion Detection System Using Mobile Agents and Data Mining Approaches -- Data Encryption -- Fuzzy Biometric Signcryption Scheme with Bilinear Pairings in the Standard Model -- Key Independent Decryption of Graphically Encrypted Images -- Towards Confidentiality of ID-Based Signcryption Schemes under without Random Oracle Model -- JPEG Steganalysis Using HBCL Statistics and FR Index -- Data and Text Mining -- Text Mining Technique for Chinese Written Judgment of Criminal Case -- Exploration of Document Relation Quality with Consideration of Term Representation Basis, Term Weighting and Association Measure -- Identifying Controversial Issues and Their Sub-topics in News Articles -- Efficient Privacy Preserving K-Means Clustering -- A Fuzzy Threshold Based Modified Clustering Algorithm for Natural Data Exploration., Computer science, Computer Communication Networks, Information systems, Computer Science, Data encryption (Computer science), Database management, Data mining, Information storage and retrieval systems, Cryptography., Application software., Computer networks ., Konferenzschrift 2010 Hyderabad, Andhra Pradesh (DE-588)1071861417 (DE-627)826484824 (DE-576)433375485 gnd-content, s (DE-588)4308416-3 (DE-627)123816106 (DE-576)211106267 Internet gnd, s (DE-588)4274324-2 (DE-627)104467525 (DE-576)21070585X Computersicherheit gnd, s (DE-588)4011144-1 (DE-627)106354191 (DE-576)208892001 Datensicherung gnd, s (DE-588)4830502-9 (DE-627)489246060 (DE-576)21698677X Kryptoanalyse gnd, DE-101, s (DE-588)7864395-8 (DE-627)700634487 (DE-576)363213635 Internetkriminalität gnd, s (DE-588)4674811-8 (DE-627)342826840 (DE-576)214923150 Ad-hoc-Netz gnd, Chau, Michael oth, Li, Shu-hsing oth, Srinivasa, Srinath 1973- (DE-588)123479797 (DE-627)082579253 (DE-576)293726345 oth, Urs, Shalini oth, Wang, G. Alan oth, 9783642136009, Buchausg. u.d.T. Intelligence and security informatics Berlin : Springer, 2010 X, 172 S. (DE-627)626834600 (DE-576)32434841X 3642136001 9783642136009, Lecture notes in computer science 6122 6122 (DE-627)316228877 (DE-576)093890923 (DE-600)2018930-8 1611-3349 ns, https://doi.org/10.1007/978-3-642-13601-6 X:SPRINGER Verlag lizenzpflichtig Volltext, https://swbplus.bsz-bw.de/bsz325492735cov.jpg V:DE-576 X:springer image/jpeg 20151016105937 Cover, http://dx.doi.org/10.1007/978-3-642-13601-6 DE-14, DE-14 2011-07-20T14:58:50Z epn:333456469X, http://dx.doi.org/10.1007/978-3-642-13601-6 DE-15, DE-15 2011-05-16T16:36:19Z epn:3334564770, http://dx.doi.org/10.1007/978-3-642-13601-6 Zum Online-Dokument DE-Zi4, DE-Zi4 2011-01-26T14:34:14Z epn:3334564886, http://dx.doi.org/10.1007/978-3-642-13601-6 DE-520, DE-520 2012-11-21T16:10:20Z epn:3334564967
spellingShingle Chen, Hsinchun, Intelligence and Security Informatics: Pacific Asia Workshop, PAISI 2010, Hyderabad, India, June 21, 2010. Proceedings, Lecture notes in computer science, 6122, Terrorism Informatics and Crime Analysis -- Combined Detection Model for Criminal Network Detection -- An Association Model for Implicit Crime Link Analysis -- Design and Deployment of a National Detecting Stolen Vehicles Network System -- Fighting Cybercrime: A KM Perspective -- Transportation Infrastructure Security -- Trajectory Similarity of Network Constrained Moving Objects and Applications to Traffic Security -- An Emergent Traffic Messaging Service Using Wireless Technology -- Information Access and Security -- A Model for Detecting “Global Footprint Anomalies” in a Grid Environment -- Secure Anonymous Routing for MANETs Using Distributed Dynamic Random Path Selection -- MAD-IDS: Novel Intrusion Detection System Using Mobile Agents and Data Mining Approaches -- Data Encryption -- Fuzzy Biometric Signcryption Scheme with Bilinear Pairings in the Standard Model -- Key Independent Decryption of Graphically Encrypted Images -- Towards Confidentiality of ID-Based Signcryption Schemes under without Random Oracle Model -- JPEG Steganalysis Using HBCL Statistics and FR Index -- Data and Text Mining -- Text Mining Technique for Chinese Written Judgment of Criminal Case -- Exploration of Document Relation Quality with Consideration of Term Representation Basis, Term Weighting and Association Measure -- Identifying Controversial Issues and Their Sub-topics in News Articles -- Efficient Privacy Preserving K-Means Clustering -- A Fuzzy Threshold Based Modified Clustering Algorithm for Natural Data Exploration., Computer science, Computer Communication Networks, Information systems, Computer Science, Data encryption (Computer science), Database management, Data mining, Information storage and retrieval systems, Cryptography., Application software., Computer networks ., Konferenzschrift 2010 Hyderabad, Andhra Pradesh, Internet, Computersicherheit, Datensicherung, Kryptoanalyse, Internetkriminalität, Ad-hoc-Netz
swb_id_str 325492735
title Intelligence and Security Informatics: Pacific Asia Workshop, PAISI 2010, Hyderabad, India, June 21, 2010. Proceedings
title_auth Intelligence and Security Informatics Pacific Asia Workshop, PAISI 2010, Hyderabad, India, June 21, 2010. Proceedings
title_full Intelligence and Security Informatics Pacific Asia Workshop, PAISI 2010, Hyderabad, India, June 21, 2010. Proceedings edited by Hsinchun Chen, Michael Chau, Shu-hsing Li, Shalini Urs, Srinath Srinivasa, G. Alan Wang
title_fullStr Intelligence and Security Informatics Pacific Asia Workshop, PAISI 2010, Hyderabad, India, June 21, 2010. Proceedings edited by Hsinchun Chen, Michael Chau, Shu-hsing Li, Shalini Urs, Srinath Srinivasa, G. Alan Wang
title_full_unstemmed Intelligence and Security Informatics Pacific Asia Workshop, PAISI 2010, Hyderabad, India, June 21, 2010. Proceedings edited by Hsinchun Chen, Michael Chau, Shu-hsing Li, Shalini Urs, Srinath Srinivasa, G. Alan Wang
title_in_hierarchy 6122. Intelligence and Security Informatics: Pacific Asia Workshop, PAISI 2010, Hyderabad, India, June 21, 2010. Proceedings (2010)
title_short Intelligence and Security Informatics
title_sort intelligence and security informatics pacific asia workshop paisi 2010 hyderabad india june 21 2010 proceedings
title_sub Pacific Asia Workshop, PAISI 2010, Hyderabad, India, June 21, 2010. Proceedings
title_unstemmed Intelligence and Security Informatics: Pacific Asia Workshop, PAISI 2010, Hyderabad, India, June 21, 2010. Proceedings
topic Computer science, Computer Communication Networks, Information systems, Computer Science, Data encryption (Computer science), Database management, Data mining, Information storage and retrieval systems, Cryptography., Application software., Computer networks ., Konferenzschrift 2010 Hyderabad, Andhra Pradesh, Internet, Computersicherheit, Datensicherung, Kryptoanalyse, Internetkriminalität, Ad-hoc-Netz
topic_facet Computer science, Computer Communication Networks, Information systems, Computer Science, Data encryption (Computer science), Database management, Data mining, Information storage and retrieval systems, Cryptography., Application software., Computer networks ., Konferenzschrift, Internet, Computersicherheit, Datensicherung, Kryptoanalyse, Internetkriminalität, Ad-hoc-Netz
url https://doi.org/10.1007/978-3-642-13601-6, https://swbplus.bsz-bw.de/bsz325492735cov.jpg, http://dx.doi.org/10.1007/978-3-642-13601-6