Intelligence and Security Informatics
Editat de Michael Chau, G. Alan Wang, Hsinchun Chenen Limba Engleză Paperback – 29 mar 2016
The7 revised full papers presented together with 7 short papers were carefullyreviewed and selected from 23 submissions. The papers cover network-based dataanalytics, data and text mining, and cyber security and infrastructureprotection.
| Toate formatele și edițiile | Preț | Express |
|---|---|---|
| Paperback (3) | 257.50 lei 6-8 săpt. | |
| Springer – 16 apr 2015 | 257.50 lei 6-8 săpt. | |
| Springer International Publishing – 14 apr 2017 | 313.24 lei 6-8 săpt. | |
| Springer – 29 mar 2016 | 316.88 lei 6-8 săpt. |
Preț: 316.88 lei
Preț vechi: 396.10 lei
-20% Nou
Puncte Express: 475
Preț estimativ în valută:
56.07€ • 65.32$ • 48.96£
56.07€ • 65.32$ • 48.96£
Carte tipărită la comandă
Livrare economică 17-31 ianuarie 26
Preluare comenzi: 021 569.72.76
Specificații
ISBN-13: 9783319318622
ISBN-10: 3319318624
Pagini: 216
Ilustrații: XII, 203 p. 52 illus.
Dimensiuni: 155 x 235 x 12 mm
Greutate: 0.34 kg
Ediția:1st edition 2016
Editura: Springer
Locul publicării:Cham, Switzerland
ISBN-10: 3319318624
Pagini: 216
Ilustrații: XII, 203 p. 52 illus.
Dimensiuni: 155 x 235 x 12 mm
Greutate: 0.34 kg
Ediția:1st edition 2016
Editura: Springer
Locul publicării:Cham, Switzerland
Cuprins
The Use of Reference Graphs in the Entity Resolutionof Criminal Networks.- Heterogeneous Information Networks Bi-clustering withSimilarity Regularization.- A Profile-Based Authorship Attribution Approach toForensic Identification in Chinese Online Messages.- Multilevel SyntacticParsing Based on Recursive Restricted Boltzmann Machines and Learning to Rank.-Stratified Over-sampling Bagging Method for Random Forests on Imbalanced Data.-Revisiting Attribute Independence Assumption in Probabilistic UnsupervisedAnomaly Detection.- Incremental Privacy-Preserving Association Rule MiningUsing Negative Border.- Differentially Private Multi-task Learning.- IntelligentRecognition of Spontaneous Expression Using Motion Magnification ofSpatio-Temporal Data.- Cyber security and Infrastructure Protection k-NN Classificationof Malware in HTTPS Traffic Using the Metric Space Approach.- A SyntacticApproach for Detecting Viral Polymorphic Malware Variants.- Small StateAcquisition of Offensive Cyber warfare Capabilities: Towards Building anAnalytical Framework.- Data-Driven Stealthy Injection Attacks on Smart Gridwith Incomplete Measurements.- Information Security in Software Engineering,Analysis of Developers Communications about Security in Social Q&A Website.
Caracteristici
Includes supplementary material: sn.pub/extras
Textul de pe ultima copertă
This book constitutes the refereed proceedings of the Pacific Asia Workshop on Intelligence and Security Informatics, PAISI 2015, held in Ho Chi Minh City, Vietnam, in May 2015 in conjunction with PAKDD 2015, the 19th Pacific-Asia Conference on Knowledge Discovery and Data Mining.
The 8 revised full papers presented were carefully reviewed and selected from numerous submissions. Topics of the workshop are information sharing and big data analytics, infrastructure protection and emergency responses, cybercrime and terrorism informatics and analytics, as well as enterprise risk management, IS security, and social media analytics. The papers present a significant view on regional data sets and case studies, including online social media and multimedia, fraud deception, and text mining.
The 8 revised full papers presented were carefully reviewed and selected from numerous submissions. Topics of the workshop are information sharing and big data analytics, infrastructure protection and emergency responses, cybercrime and terrorism informatics and analytics, as well as enterprise risk management, IS security, and social media analytics. The papers present a significant view on regional data sets and case studies, including online social media and multimedia, fraud deception, and text mining.