000 | 03915nam a22005415i 4500 | ||
---|---|---|---|
003 | DE-He213 | ||
005 | 20231104114207.0 | ||
007 | cr nn 008mamaa | ||
008 | 150508s2015 gw | s |||| 0|eng d | ||
020 |
_a9783319184555 _z978-3-319-18455-5 |
||
024 | 7 |
_a10.1007/978-3-319-18455-5 _2doi |
|
050 | 4 | _aQA76.9.A25 | |
072 | 7 |
_aUR _2bicssc |
|
072 | 7 |
_aCOM053000 _2bisacsh |
|
072 | 7 |
_aUR _2thema |
|
072 | 7 |
_aUTN _2thema005.8 _223 |
|
245 | 1 | 0 |
_aIntelligence and Security Informatics : _bPacific Asia Workshop, PAISI 2015, Ho Chi Minh City, Vietnam, May 19, 2015. Proceedings / _cedited by Michael Chau, G. Alan Wang, Hsinchun Chen. |
264 | 1 |
_aCham : _bSpringer International Publishing : _bImprint: Springer, _c2015. |
|
300 | _a1 online resource | ||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
490 | 0 |
_aSecurity and Cryptology ; _v9074 |
|
505 | 0 | _aMedia Revealr: A Social Multimedia Monitoring and Intelligence System for Web Multimedia Verification -- Geotagging Social Media Content with a Refined Language Modelling Approach -- Predicting Vehicle Recalls with User-Generated Contents: A Text Mining Approach -- GCM: A Greedy-based Cross-Matching Algorithm for Identifying Users across Multiple Online Social Networks -- P2P Lending Fraud Detection: A Big Data Approach -- Drug Anti-forgery and Tracing System Based on Lightweight Asymmetric Identities -- Chinese Word POS Tagging with Markov Logic -- In Search of Plagiarism Behaviors: An Empirical Study of Online Reviews. | |
520 | _aThis book constitutes the refereed proceedings of the Pacific Asia Workshop on Intelligence and Security Informatics, PAISI 2015, held in Ho Chi Minh City, Vietnam, in May 2015 in conjunction with PAKDD 2015, the 19th Pacific-Asia Conference on Knowledge Discovery and Data Mining. The 8 revised full papers presented were carefully reviewed and selected from numerous submissions. Topics of the workshop are information sharing and big data analytics, infrastructure protection and emergency responses, cybercrime and terrorism informatics and analytics, as well as enterprise risk management, IS security, and social media analytics. The papers present a significant view on regional data sets and case studies, including online social media and multimedia, fraud deception, and text mining. | ||
650 | 0 | _aComputer security. | |
650 | 0 | _aInformation storage and retrieva. | |
650 | 0 | _aComputer Communication Networks. | |
650 | 0 | _aData mining. | |
650 | 0 | _aComputer science. | |
650 | 1 | 4 |
_aSystems and Data Security. _0http://scigraph.springernature.com/things/product-market-codes/I28060 |
650 | 2 | 4 |
_aInformation Storage and Retrieval. _0http://scigraph.springernature.com/things/product-market-codes/I18032 |
650 | 2 | 4 |
_aComputer Communication Networks. _0http://scigraph.springernature.com/things/product-market-codes/I13022 |
650 | 2 | 4 |
_aData Mining and Knowledge Discovery. _0http://scigraph.springernature.com/things/product-market-codes/I18030 |
650 | 2 | 4 |
_aComputers and Society. _0http://scigraph.springernature.com/things/product-market-codes/I24040 |
650 | 2 | 4 |
_aInformation Systems Applications (incl. Internet). _0http://scigraph.springernature.com/things/product-market-codes/I18040 |
700 | 1 |
_aChau, Michael. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt |
|
700 | 1 |
_aWang, G. Alan. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt |
|
700 | 1 |
_aChen, Hsinchun. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt |
|
710 | 2 | _aSpringerLink (Online service) | |
856 | 4 | 0 |
_uhttps://doi.org/10.1007/978-3-319-18455-5 _3Springer eBooks _zOnline access link to the resource |
912 | _aZDB-2-SCS | ||
912 | _aZDB-2-LNC | ||
999 |
_c200433709 _d51921 |
||
942 |
_2lcc _cEBK |
||
041 | _aeng |