000 03915nam a22005415i 4500
003 DE-He213
005 20231104114207.0
007 cr nn 008mamaa
008 150508s2015 gw | s |||| 0|eng d
020 _a9783319184555
_z978-3-319-18455-5
024 7 _a10.1007/978-3-319-18455-5
_2doi
050 4 _aQA76.9.A25
072 7 _aUR
_2bicssc
072 7 _aCOM053000
_2bisacsh
072 7 _aUR
_2thema
072 7 _aUTN
_2thema005.8
_223
245 1 0 _aIntelligence and Security Informatics :
_bPacific Asia Workshop, PAISI 2015, Ho Chi Minh City, Vietnam, May 19, 2015. Proceedings /
_cedited by Michael Chau, G. Alan Wang, Hsinchun Chen.
264 1 _aCham :
_bSpringer International Publishing :
_bImprint: Springer,
_c2015.
300 _a1 online resource
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
490 0 _aSecurity and Cryptology ;
_v9074
505 0 _aMedia Revealr: A Social Multimedia Monitoring and Intelligence System for Web Multimedia Verification -- Geotagging Social Media Content with a Refined Language Modelling Approach -- Predicting Vehicle Recalls with User-Generated Contents: A Text Mining Approach -- GCM: A Greedy-based Cross-Matching Algorithm for Identifying Users across Multiple Online Social Networks -- P2P Lending Fraud Detection: A Big Data Approach -- Drug Anti-forgery and Tracing System Based on Lightweight Asymmetric Identities -- Chinese Word POS Tagging with Markov Logic -- In Search of Plagiarism Behaviors: An Empirical Study of Online Reviews.
520 _aThis book constitutes the refereed proceedings of the Pacific Asia Workshop on Intelligence and Security Informatics, PAISI 2015, held in Ho Chi Minh City, Vietnam, in May 2015 in conjunction with PAKDD 2015, the 19th Pacific-Asia Conference on Knowledge Discovery and Data Mining. The 8 revised full papers presented were carefully reviewed and selected from numerous submissions. Topics of the workshop are information sharing and big data analytics, infrastructure protection and emergency responses, cybercrime and terrorism informatics and analytics, as well as enterprise risk management, IS security, and social media analytics. The papers present a significant view on regional data sets and case studies, including online social media and multimedia, fraud deception, and text mining.
650 0 _aComputer security.
650 0 _aInformation storage and retrieva.
650 0 _aComputer Communication Networks.
650 0 _aData mining.
650 0 _aComputer science.
650 1 4 _aSystems and Data Security.
_0http://scigraph.springernature.com/things/product-market-codes/I28060
650 2 4 _aInformation Storage and Retrieval.
_0http://scigraph.springernature.com/things/product-market-codes/I18032
650 2 4 _aComputer Communication Networks.
_0http://scigraph.springernature.com/things/product-market-codes/I13022
650 2 4 _aData Mining and Knowledge Discovery.
_0http://scigraph.springernature.com/things/product-market-codes/I18030
650 2 4 _aComputers and Society.
_0http://scigraph.springernature.com/things/product-market-codes/I24040
650 2 4 _aInformation Systems Applications (incl. Internet).
_0http://scigraph.springernature.com/things/product-market-codes/I18040
700 1 _aChau, Michael.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
700 1 _aWang, G. Alan.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
700 1 _aChen, Hsinchun.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
710 2 _aSpringerLink (Online service)
856 4 0 _uhttps://doi.org/10.1007/978-3-319-18455-5
_3Springer eBooks
_zOnline access link to the resource
912 _aZDB-2-SCS
912 _aZDB-2-LNC
999 _c200433709
_d51921
942 _2lcc
_cEBK
041 _aeng