|
|
|
|
LEADER |
07705cam a22015492 4500 |
001 |
0-1649785666 |
003 |
DE-627 |
005 |
20240122105313.0 |
007 |
cr uuu---uuuuu |
008 |
100702s2010 gw |||||o 00| ||eng c |
020 |
|
|
|a 9783642136016
|9 978-3-642-13601-6
|
024 |
7 |
|
|a 10.1007/978-3-642-13601-6
|2 doi
|
035 |
|
|
|a (DE-627)1649785666
|
035 |
|
|
|a (DE-576)325492735
|
035 |
|
|
|a (DE-599)BSZ325492735
|
035 |
|
|
|a (OCoLC)692304679
|
035 |
|
|
|a (OCoLC)731124923
|
035 |
|
|
|a (DE-He213)978-3-642-13601-6
|
035 |
|
|
|a (EBP)040519759
|
040 |
|
|
|a DE-627
|b ger
|c DE-627
|e rakwb
|
041 |
|
|
|a eng
|
044 |
|
|
|c XA-DE
|
050 |
|
0 |
|a QA76.9.A25
|
072 |
|
7 |
|a URY
|2 bicssc
|
072 |
|
7 |
|a COM053000
|2 bisacsh
|
072 |
|
7 |
|a GPJ
|2 bicssc
|
084 |
|
|
|a SS 4800
|2 rvk
|0 (DE-625)rvk/143528:
|
084 |
|
|
|a 54.72
|2 bkl
|
084 |
|
|
|a 54.38
|2 bkl
|
100 |
1 |
|
|a Chen, Hsinchun
|4 aut
|
245 |
1 |
0 |
|a Intelligence and Security Informatics
|b Pacific Asia Workshop, PAISI 2010, Hyderabad, India, June 21, 2010. Proceedings
|c edited by Hsinchun Chen, Michael Chau, Shu-hsing Li, Shalini Urs, Srinath Srinivasa, G. Alan Wang
|
264 |
|
1 |
|a Berlin, Heidelberg
|b Springer Berlin Heidelberg
|c 2010
|
300 |
|
|
|a Online-Ressource (183p. 50 illus, digital)
|
336 |
|
|
|a Text
|b txt
|2 rdacontent
|
337 |
|
|
|a Computermedien
|b c
|2 rdamedia
|
338 |
|
|
|a Online-Ressource
|b cr
|2 rdacarrier
|
490 |
1 |
|
|a Lecture Notes in Computer Science
|v 6122
|
490 |
0 |
|
|a SpringerLink
|a Bücher
|
520 |
|
|
|a Terrorism Informatics and Crime Analysis -- Combined Detection Model for Criminal Network Detection -- An Association Model for Implicit Crime Link Analysis -- Design and Deployment of a National Detecting Stolen Vehicles Network System -- Fighting Cybercrime: A KM Perspective -- Transportation Infrastructure Security -- Trajectory Similarity of Network Constrained Moving Objects and Applications to Traffic Security -- An Emergent Traffic Messaging Service Using Wireless Technology -- Information Access and Security -- A Model for Detecting “Global Footprint Anomalies” in a Grid Environment -- Secure Anonymous Routing for MANETs Using Distributed Dynamic Random Path Selection -- MAD-IDS: Novel Intrusion Detection System Using Mobile Agents and Data Mining Approaches -- Data Encryption -- Fuzzy Biometric Signcryption Scheme with Bilinear Pairings in the Standard Model -- Key Independent Decryption of Graphically Encrypted Images -- Towards Confidentiality of ID-Based Signcryption Schemes under without Random Oracle Model -- JPEG Steganalysis Using HBCL Statistics and FR Index -- Data and Text Mining -- Text Mining Technique for Chinese Written Judgment of Criminal Case -- Exploration of Document Relation Quality with Consideration of Term Representation Basis, Term Weighting and Association Measure -- Identifying Controversial Issues and Their Sub-topics in News Articles -- Efficient Privacy Preserving K-Means Clustering -- A Fuzzy Threshold Based Modified Clustering Algorithm for Natural Data Exploration.
|
650 |
|
0 |
|a Computer science
|
650 |
|
0 |
|a Computer Communication Networks
|
650 |
|
0 |
|a Information systems
|
650 |
|
0 |
|a Computer Science
|
650 |
|
0 |
|a Data encryption (Computer science)
|
650 |
|
0 |
|a Database management
|
650 |
|
0 |
|a Data mining
|
650 |
|
0 |
|a Information storage and retrieval systems
|
650 |
|
0 |
|a Cryptography.
|
650 |
|
0 |
|a Application software.
|
650 |
|
0 |
|a Computer networks .
|
655 |
|
7 |
|a Konferenzschrift
|y 2010
|z Hyderabad, Andhra Pradesh
|0 (DE-588)1071861417
|0 (DE-627)826484824
|0 (DE-576)433375485
|2 gnd-content
|
689 |
0 |
0 |
|D s
|0 (DE-588)4308416-3
|0 (DE-627)123816106
|0 (DE-576)211106267
|a Internet
|2 gnd
|
689 |
0 |
1 |
|D s
|0 (DE-588)4274324-2
|0 (DE-627)104467525
|0 (DE-576)21070585X
|a Computersicherheit
|2 gnd
|
689 |
0 |
2 |
|D s
|0 (DE-588)4011144-1
|0 (DE-627)106354191
|0 (DE-576)208892001
|a Datensicherung
|2 gnd
|
689 |
0 |
3 |
|D s
|0 (DE-588)4830502-9
|0 (DE-627)489246060
|0 (DE-576)21698677X
|a Kryptoanalyse
|2 gnd
|
689 |
0 |
|
|5 DE-101
|
689 |
1 |
0 |
|D s
|0 (DE-588)7864395-8
|0 (DE-627)700634487
|0 (DE-576)363213635
|a Internetkriminalität
|2 gnd
|
689 |
1 |
1 |
|D s
|0 (DE-588)4830502-9
|0 (DE-627)489246060
|0 (DE-576)21698677X
|a Kryptoanalyse
|2 gnd
|
689 |
1 |
2 |
|D s
|0 (DE-588)4674811-8
|0 (DE-627)342826840
|0 (DE-576)214923150
|a Ad-hoc-Netz
|2 gnd
|
689 |
1 |
|
|5 DE-101
|
700 |
1 |
|
|a Chau, Michael
|4 oth
|
700 |
1 |
|
|a Li, Shu-hsing
|4 oth
|
700 |
1 |
|
|a Srinivasa, Srinath
|d 1973-
|0 (DE-588)123479797
|0 (DE-627)082579253
|0 (DE-576)293726345
|4 oth
|
700 |
1 |
|
|a Urs, Shalini
|4 oth
|
700 |
1 |
|
|a Wang, G. Alan
|4 oth
|
776 |
1 |
|
|z 9783642136009
|
776 |
0 |
8 |
|i Buchausg. u.d.T.
|t Intelligence and security informatics
|d Berlin : Springer, 2010
|h X, 172 S.
|w (DE-627)626834600
|w (DE-576)32434841X
|z 3642136001
|z 9783642136009
|
830 |
|
0 |
|a Lecture notes in computer science
|v 6122
|9 6122
|w (DE-627)316228877
|w (DE-576)093890923
|w (DE-600)2018930-8
|x 1611-3349
|7 ns
|
856 |
4 |
0 |
|u https://doi.org/10.1007/978-3-642-13601-6
|m X:SPRINGER
|x Verlag
|z lizenzpflichtig
|3 Volltext
|
856 |
4 |
2 |
|u https://swbplus.bsz-bw.de/bsz325492735cov.jpg
|m V:DE-576
|m X:springer
|q image/jpeg
|v 20151016105937
|3 Cover
|
912 |
|
|
|a ZDB-2-SCS
|
912 |
|
|
|a ZDB-2-LNC
|b 2010
|
912 |
|
|
|a ZDB-2-SEB
|
912 |
|
|
|a ZDB-2-SCS
|b 2010
|
912 |
|
|
|a ZDB-2-SXCS
|b 2010
|
912 |
|
|
|a ZDB-2-SEB
|b 2010
|
936 |
r |
v |
|a SS 4800
|b Lecture notes in computer science
|k Informatik
|k Enzyklopädien und Handbücher. Kongressberichte Schriftenreihe. Tafeln und Formelsammlungen
|k Schriftenreihen (indiv. Sign.)
|k Lecture notes in computer science
|0 (DE-627)1271461242
|0 (DE-625)rvk/143528:
|0 (DE-576)201461242
|
936 |
b |
k |
|a 54.72
|j Künstliche Intelligenz
|q SEPA
|0 (DE-627)10641240X
|
936 |
b |
k |
|a 54.38
|j Computersicherheit
|q SEPA
|0 (DE-627)106418866
|
951 |
|
|
|a BO
|
950 |
|
|
|a Cyber Security
|
950 |
|
|
|a Datenverarbeitungssystem
|
950 |
|
|
|a Sicherheit
|
950 |
|
|
|a Computer
|
950 |
|
|
|a Cybersicherheit
|
950 |
|
|
|a Cybersecurity
|
950 |
|
|
|a IT-Sicherheit
|
950 |
|
|
|a Informationssicherheit
|
950 |
|
|
|a Datensicherung
|
950 |
|
|
|a Softwareschutz
|
950 |
|
|
|a Datensicherheit
|
950 |
|
|
|a Datenverarbeitung
|
950 |
|
|
|a Computersicherheit
|
950 |
|
|
|a Надёжность сохранения данных
|
950 |
|
|
|a Datenautobahn
|
950 |
|
|
|a ARPANet
|
950 |
|
|
|a Rechnernetz
|
950 |
|
|
|a TCP/IP
|
950 |
|
|
|a 网际网络
|
950 |
|
|
|a 互联网
|
950 |
|
|
|a 網際網絡
|
950 |
|
|
|a 互聯網
|
950 |
|
|
|a Интернет
|
950 |
|
|
|a Mobile Ad-hoc Network
|
950 |
|
|
|a MANET
|
950 |
|
|
|a Ad-hoc-Netzwerk
|
950 |
|
|
|a Vermaschtes Netz
|
950 |
|
|
|a Funknetz
|
950 |
|
|
|a Drahtloses vermaschtes Netz
|
950 |
|
|
|a Cryptoanalysis
|
950 |
|
|
|a Angriff
|
950 |
|
|
|a Attacke
|
950 |
|
|
|a Kryptoanalytische Attacke
|
950 |
|
|
|a Kryptoanalytischer Angriff
|
950 |
|
|
|a Cryptanalysis
|
950 |
|
|
|a Kryptologie
|
950 |
|
|
|a Dechiffrierung
|
950 |
|
|
|a Computerkriminalität
|
950 |
|
|
|a Internet
|
950 |
|
|
|a Netzkriminalität
|
950 |
|
|
|a Kriminalität
|
950 |
|
|
|a Cyberterrorismus
|
856 |
4 |
0 |
|u http://dx.doi.org/10.1007/978-3-642-13601-6
|9 DE-14
|
852 |
|
|
|a DE-14
|z 2011-07-20T14:58:50Z
|x epn:333456469X
|
856 |
4 |
0 |
|u http://dx.doi.org/10.1007/978-3-642-13601-6
|9 DE-15
|
852 |
|
|
|a DE-15
|z 2011-05-16T16:36:19Z
|x epn:3334564770
|
976 |
|
|
|h Elektronischer Volltext - Campuslizenz
|
856 |
4 |
0 |
|u http://dx.doi.org/10.1007/978-3-642-13601-6
|z Zum Online-Dokument
|9 DE-Zi4
|
852 |
|
|
|a DE-Zi4
|z 2011-01-26T14:34:14Z
|x epn:3334564886
|
856 |
4 |
0 |
|u http://dx.doi.org/10.1007/978-3-642-13601-6
|9 DE-520
|
852 |
|
|
|a DE-520
|z 2012-11-21T16:10:20Z
|x epn:3334564967
|
980 |
|
|
|a 1649785666
|b 0
|k 1649785666
|o 325492735
|
SOLR
_version_ |
1789362948200726528 |
access_facet |
Electronic Resources |
author |
Chen, Hsinchun |
author2 |
Chau, Michael, Li, Shu-hsing, Srinivasa, Srinath, Urs, Shalini, Wang, G. Alan |
author2_role |
oth, oth, oth, oth, oth |
author2_variant |
m c mc, s h l shl, s s ss, s u su, g a w ga gaw |
author_facet |
Chen, Hsinchun, Chau, Michael, Li, Shu-hsing, Srinivasa, Srinath, Urs, Shalini, Wang, G. Alan |
author_role |
aut |
author_sort |
Chen, Hsinchun |
author_variant |
h c hc |
callnumber-first |
Q - Science |
callnumber-label |
QA76 |
callnumber-raw |
QA76.9.A25 |
callnumber-search |
QA76.9.A25 |
callnumber-sort |
QA 276.9 A25 |
callnumber-subject |
QA - Mathematics |
collection |
ZDB-2-SCS, ZDB-2-LNC, ZDB-2-SEB, ZDB-2-SXCS |
contents |
Terrorism Informatics and Crime Analysis -- Combined Detection Model for Criminal Network Detection -- An Association Model for Implicit Crime Link Analysis -- Design and Deployment of a National Detecting Stolen Vehicles Network System -- Fighting Cybercrime: A KM Perspective -- Transportation Infrastructure Security -- Trajectory Similarity of Network Constrained Moving Objects and Applications to Traffic Security -- An Emergent Traffic Messaging Service Using Wireless Technology -- Information Access and Security -- A Model for Detecting “Global Footprint Anomalies” in a Grid Environment -- Secure Anonymous Routing for MANETs Using Distributed Dynamic Random Path Selection -- MAD-IDS: Novel Intrusion Detection System Using Mobile Agents and Data Mining Approaches -- Data Encryption -- Fuzzy Biometric Signcryption Scheme with Bilinear Pairings in the Standard Model -- Key Independent Decryption of Graphically Encrypted Images -- Towards Confidentiality of ID-Based Signcryption Schemes under without Random Oracle Model -- JPEG Steganalysis Using HBCL Statistics and FR Index -- Data and Text Mining -- Text Mining Technique for Chinese Written Judgment of Criminal Case -- Exploration of Document Relation Quality with Consideration of Term Representation Basis, Term Weighting and Association Measure -- Identifying Controversial Issues and Their Sub-topics in News Articles -- Efficient Privacy Preserving K-Means Clustering -- A Fuzzy Threshold Based Modified Clustering Algorithm for Natural Data Exploration. |
ctrlnum |
(DE-627)1649785666, (DE-576)325492735, (DE-599)BSZ325492735, (OCoLC)692304679, (OCoLC)731124923, (DE-He213)978-3-642-13601-6, (EBP)040519759 |
de15_date |
2011-05-16T16:36:19Z |
doi_str_mv |
10.1007/978-3-642-13601-6 |
era_facet |
2010 |
facet_912a |
ZDB-2-SCS, ZDB-2-LNC, ZDB-2-SEB, ZDB-2-SXCS |
facet_avail |
Online |
facet_local_del330 |
Internet, Computersicherheit, Datensicherung, Kryptoanalyse, Internetkriminalität, Ad-hoc-Netz |
finc_class_facet |
Informatik, Allgemeines, Mathematik |
finc_id_str |
0000886110 |
fincclass_txtF_mv |
science-computerscience |
format |
eBook, ConferenceProceedings |
format_access_txtF_mv |
Book, E-Book |
format_de105 |
Ebook |
format_de14 |
Book, E-Book |
format_de15 |
Book, E-Book |
format_del152 |
Buch |
format_detail_txtF_mv |
text-online-monograph-independent-conference |
format_dezi4 |
e-Book |
format_finc |
Book, E-Book |
format_legacy |
ElectronicBook |
format_legacy_nrw |
Book, E-Book |
format_nrw |
Book, E-Book |
format_strict_txtF_mv |
E-Book |
genre |
Konferenzschrift 2010 Hyderabad, Andhra Pradesh (DE-588)1071861417 (DE-627)826484824 (DE-576)433375485 gnd-content |
genre_facet |
Konferenzschrift |
geogr_code |
not assigned |
geogr_code_person |
not assigned |
geographic_facet |
Hyderabad, Andhra Pradesh |
hierarchy_parent_id |
0-316228877 |
hierarchy_parent_title |
Lecture notes in computer science |
hierarchy_sequence |
6122 |
hierarchy_top_id |
0-316228877 |
hierarchy_top_title |
Lecture notes in computer science |
id |
0-1649785666 |
illustrated |
Not Illustrated |
imprint |
Berlin, Heidelberg, Springer Berlin Heidelberg, 2010 |
imprint_str_mv |
Berlin, Heidelberg: Springer Berlin Heidelberg, 2010 |
institution |
DE-14, DE-Zi4, DE-520, DE-15 |
is_hierarchy_id |
0-1649785666 |
is_hierarchy_title |
Intelligence and Security Informatics: Pacific Asia Workshop, PAISI 2010, Hyderabad, India, June 21, 2010. Proceedings |
isbn |
9783642136016 |
isbn_isn_mv |
9783642136009, 3642136001 |
issn_isn_mv |
1611-3349 |
kxp_id_str |
1649785666 |
language |
English |
last_indexed |
2024-01-28T19:18:05.891Z |
local_heading_facet_dezwi2 |
Computer science, Computer Communication Networks, Information systems, Computer Science, Data encryption (Computer science), Database management, Data mining, Information storage and retrieval systems, Cryptography., Application software., Computer networks ., Internet, Computersicherheit, Datensicherung, Kryptoanalyse, Internetkriminalität, Ad-hoc-Netz |
marc024a_ct_mv |
10.1007/978-3-642-13601-6 |
match_str |
chen2010intelligenceandsecurityinformaticspacificasiaworkshoppaisi2010hyderabadindiajune212010proceedings |
mega_collection |
Verbunddaten SWB |
multipart_link |
093890923 |
multipart_part |
(093890923)6122 |
names_id_str_mv |
(DE-588)123479797, (DE-627)082579253, (DE-576)293726345 |
oclc_num |
692304679, 731124923 |
physical |
Online-Ressource (183p. 50 illus, digital) |
publishDate |
2010 |
publishDateSort |
2010 |
publishPlace |
Berlin, Heidelberg |
publisher |
Springer Berlin Heidelberg |
record_format |
marcfinc |
record_id |
325492735 |
recordtype |
marcfinc |
rsn_id_str_mv |
(DE-15)2461850 |
rvk_facet |
SS 4800 |
rvk_label |
Informatik, Enzyklopädien und Handbücher. Kongressberichte Schriftenreihe. Tafeln und Formelsammlungen, Schriftenreihen (indiv. Sign.), Lecture notes in computer science |
rvk_path |
SS, SQ - SU, SS 4000 - SS 5999, SS 4800 |
rvk_path_str_mv |
SS, SQ - SU, SS 4000 - SS 5999, SS 4800 |
series |
Lecture notes in computer science, 6122 |
series2 |
Lecture Notes in Computer Science ; 6122, SpringerLink ; Bücher |
source_id |
0 |
spelling |
Chen, Hsinchun aut, Intelligence and Security Informatics Pacific Asia Workshop, PAISI 2010, Hyderabad, India, June 21, 2010. Proceedings edited by Hsinchun Chen, Michael Chau, Shu-hsing Li, Shalini Urs, Srinath Srinivasa, G. Alan Wang, Berlin, Heidelberg Springer Berlin Heidelberg 2010, Online-Ressource (183p. 50 illus, digital), Text txt rdacontent, Computermedien c rdamedia, Online-Ressource cr rdacarrier, Lecture Notes in Computer Science 6122, SpringerLink Bücher, Terrorism Informatics and Crime Analysis -- Combined Detection Model for Criminal Network Detection -- An Association Model for Implicit Crime Link Analysis -- Design and Deployment of a National Detecting Stolen Vehicles Network System -- Fighting Cybercrime: A KM Perspective -- Transportation Infrastructure Security -- Trajectory Similarity of Network Constrained Moving Objects and Applications to Traffic Security -- An Emergent Traffic Messaging Service Using Wireless Technology -- Information Access and Security -- A Model for Detecting “Global Footprint Anomalies” in a Grid Environment -- Secure Anonymous Routing for MANETs Using Distributed Dynamic Random Path Selection -- MAD-IDS: Novel Intrusion Detection System Using Mobile Agents and Data Mining Approaches -- Data Encryption -- Fuzzy Biometric Signcryption Scheme with Bilinear Pairings in the Standard Model -- Key Independent Decryption of Graphically Encrypted Images -- Towards Confidentiality of ID-Based Signcryption Schemes under without Random Oracle Model -- JPEG Steganalysis Using HBCL Statistics and FR Index -- Data and Text Mining -- Text Mining Technique for Chinese Written Judgment of Criminal Case -- Exploration of Document Relation Quality with Consideration of Term Representation Basis, Term Weighting and Association Measure -- Identifying Controversial Issues and Their Sub-topics in News Articles -- Efficient Privacy Preserving K-Means Clustering -- A Fuzzy Threshold Based Modified Clustering Algorithm for Natural Data Exploration., Computer science, Computer Communication Networks, Information systems, Computer Science, Data encryption (Computer science), Database management, Data mining, Information storage and retrieval systems, Cryptography., Application software., Computer networks ., Konferenzschrift 2010 Hyderabad, Andhra Pradesh (DE-588)1071861417 (DE-627)826484824 (DE-576)433375485 gnd-content, s (DE-588)4308416-3 (DE-627)123816106 (DE-576)211106267 Internet gnd, s (DE-588)4274324-2 (DE-627)104467525 (DE-576)21070585X Computersicherheit gnd, s (DE-588)4011144-1 (DE-627)106354191 (DE-576)208892001 Datensicherung gnd, s (DE-588)4830502-9 (DE-627)489246060 (DE-576)21698677X Kryptoanalyse gnd, DE-101, s (DE-588)7864395-8 (DE-627)700634487 (DE-576)363213635 Internetkriminalität gnd, s (DE-588)4674811-8 (DE-627)342826840 (DE-576)214923150 Ad-hoc-Netz gnd, Chau, Michael oth, Li, Shu-hsing oth, Srinivasa, Srinath 1973- (DE-588)123479797 (DE-627)082579253 (DE-576)293726345 oth, Urs, Shalini oth, Wang, G. Alan oth, 9783642136009, Buchausg. u.d.T. Intelligence and security informatics Berlin : Springer, 2010 X, 172 S. (DE-627)626834600 (DE-576)32434841X 3642136001 9783642136009, Lecture notes in computer science 6122 6122 (DE-627)316228877 (DE-576)093890923 (DE-600)2018930-8 1611-3349 ns, https://doi.org/10.1007/978-3-642-13601-6 X:SPRINGER Verlag lizenzpflichtig Volltext, https://swbplus.bsz-bw.de/bsz325492735cov.jpg V:DE-576 X:springer image/jpeg 20151016105937 Cover, http://dx.doi.org/10.1007/978-3-642-13601-6 DE-14, DE-14 2011-07-20T14:58:50Z epn:333456469X, http://dx.doi.org/10.1007/978-3-642-13601-6 DE-15, DE-15 2011-05-16T16:36:19Z epn:3334564770, http://dx.doi.org/10.1007/978-3-642-13601-6 Zum Online-Dokument DE-Zi4, DE-Zi4 2011-01-26T14:34:14Z epn:3334564886, http://dx.doi.org/10.1007/978-3-642-13601-6 DE-520, DE-520 2012-11-21T16:10:20Z epn:3334564967 |
spellingShingle |
Chen, Hsinchun, Intelligence and Security Informatics: Pacific Asia Workshop, PAISI 2010, Hyderabad, India, June 21, 2010. Proceedings, Lecture notes in computer science, 6122, Terrorism Informatics and Crime Analysis -- Combined Detection Model for Criminal Network Detection -- An Association Model for Implicit Crime Link Analysis -- Design and Deployment of a National Detecting Stolen Vehicles Network System -- Fighting Cybercrime: A KM Perspective -- Transportation Infrastructure Security -- Trajectory Similarity of Network Constrained Moving Objects and Applications to Traffic Security -- An Emergent Traffic Messaging Service Using Wireless Technology -- Information Access and Security -- A Model for Detecting “Global Footprint Anomalies” in a Grid Environment -- Secure Anonymous Routing for MANETs Using Distributed Dynamic Random Path Selection -- MAD-IDS: Novel Intrusion Detection System Using Mobile Agents and Data Mining Approaches -- Data Encryption -- Fuzzy Biometric Signcryption Scheme with Bilinear Pairings in the Standard Model -- Key Independent Decryption of Graphically Encrypted Images -- Towards Confidentiality of ID-Based Signcryption Schemes under without Random Oracle Model -- JPEG Steganalysis Using HBCL Statistics and FR Index -- Data and Text Mining -- Text Mining Technique for Chinese Written Judgment of Criminal Case -- Exploration of Document Relation Quality with Consideration of Term Representation Basis, Term Weighting and Association Measure -- Identifying Controversial Issues and Their Sub-topics in News Articles -- Efficient Privacy Preserving K-Means Clustering -- A Fuzzy Threshold Based Modified Clustering Algorithm for Natural Data Exploration., Computer science, Computer Communication Networks, Information systems, Computer Science, Data encryption (Computer science), Database management, Data mining, Information storage and retrieval systems, Cryptography., Application software., Computer networks ., Konferenzschrift 2010 Hyderabad, Andhra Pradesh, Internet, Computersicherheit, Datensicherung, Kryptoanalyse, Internetkriminalität, Ad-hoc-Netz |
swb_id_str |
325492735 |
title |
Intelligence and Security Informatics: Pacific Asia Workshop, PAISI 2010, Hyderabad, India, June 21, 2010. Proceedings |
title_auth |
Intelligence and Security Informatics Pacific Asia Workshop, PAISI 2010, Hyderabad, India, June 21, 2010. Proceedings |
title_full |
Intelligence and Security Informatics Pacific Asia Workshop, PAISI 2010, Hyderabad, India, June 21, 2010. Proceedings edited by Hsinchun Chen, Michael Chau, Shu-hsing Li, Shalini Urs, Srinath Srinivasa, G. Alan Wang |
title_fullStr |
Intelligence and Security Informatics Pacific Asia Workshop, PAISI 2010, Hyderabad, India, June 21, 2010. Proceedings edited by Hsinchun Chen, Michael Chau, Shu-hsing Li, Shalini Urs, Srinath Srinivasa, G. Alan Wang |
title_full_unstemmed |
Intelligence and Security Informatics Pacific Asia Workshop, PAISI 2010, Hyderabad, India, June 21, 2010. Proceedings edited by Hsinchun Chen, Michael Chau, Shu-hsing Li, Shalini Urs, Srinath Srinivasa, G. Alan Wang |
title_in_hierarchy |
6122. Intelligence and Security Informatics: Pacific Asia Workshop, PAISI 2010, Hyderabad, India, June 21, 2010. Proceedings (2010) |
title_short |
Intelligence and Security Informatics |
title_sort |
intelligence and security informatics pacific asia workshop paisi 2010 hyderabad india june 21 2010 proceedings |
title_sub |
Pacific Asia Workshop, PAISI 2010, Hyderabad, India, June 21, 2010. Proceedings |
title_unstemmed |
Intelligence and Security Informatics: Pacific Asia Workshop, PAISI 2010, Hyderabad, India, June 21, 2010. Proceedings |
topic |
Computer science, Computer Communication Networks, Information systems, Computer Science, Data encryption (Computer science), Database management, Data mining, Information storage and retrieval systems, Cryptography., Application software., Computer networks ., Konferenzschrift 2010 Hyderabad, Andhra Pradesh, Internet, Computersicherheit, Datensicherung, Kryptoanalyse, Internetkriminalität, Ad-hoc-Netz |
topic_facet |
Computer science, Computer Communication Networks, Information systems, Computer Science, Data encryption (Computer science), Database management, Data mining, Information storage and retrieval systems, Cryptography., Application software., Computer networks ., Konferenzschrift, Internet, Computersicherheit, Datensicherung, Kryptoanalyse, Internetkriminalität, Ad-hoc-Netz |
url |
https://doi.org/10.1007/978-3-642-13601-6, https://swbplus.bsz-bw.de/bsz325492735cov.jpg, http://dx.doi.org/10.1007/978-3-642-13601-6 |