Intelligence and Security Informatics : Pacific Asia Workshop, PAISI 2013, Beijing, China, August 3, 2013, proceedings /

This book constitutes the refereed proceedings of the Pacific Asia Workshop on Intelligence and Security Informatics, PAISI 2013, held in Beijing, China, in August 2013 in conjunction with the International Joint Conference on Artificial Intelligence (IJCAI 2013). The 4 revised full papers presented...

Full description

Saved in:
Bibliographic Details
Corporate Authors: PAISI (Workshop) Beijing, China); SpringerLink (Online service)
Group Author: Wang, G. Alan
Published: Springer
Publisher Address: Berlin :
Publication Dates: 2013
Literature type: eBook
Language: English
Series: Lecture notes in computer science ; 8039
LNCS sublibrary. SL 4, Security and cryptology
Subjects:
Online Access: http://dx.doi.org/10.1007/978-3-642-39693-9
Summary: This book constitutes the refereed proceedings of the Pacific Asia Workshop on Intelligence and Security Informatics, PAISI 2013, held in Beijing, China, in August 2013 in conjunction with the International Joint Conference on Artificial Intelligence (IJCAI 2013). The 4 revised full papers presented together with 7 short papers were carefully reviewed and selected from numerous submissions. The papers are organized in topical sections on information sharing and data/text mining; terrorism informatics; network-based data analytics; and information access and security.
Item Description: International conference proceedings.
Includes author index.
Carrier Form: 1 online resource (x, 115 pages) : illustrations.
Bibliography: Includes author index.
ISBN: 9783642396939 (electronic bk.)
3642396933 (electronic bk.)
3642396925 (print)
9783642396922 (print)
Index Number: QA76
CLC: TP182-532
TP309-532
Contents: Information Sharing and Data/Text Mining --
Belief Manipulation: A Formal Model of Deceit in Message Passing Systems /
Region of Interest Discovery in Location-Based Social Networking Services with Protected Locations /
Label Micro-blog Topics Using the Bayesian Inference Method /
Terrorism Informatics --
Collective Intelligence for Suicide Surveillance in Web Forums /
Computing Optimal Attack Strategies Using Unconstrained Influence Diagrams /
Network-Based Data Analytics --
Identifying Peer Influence in Online Social Networks Using Transfer Entropy /
Modeling Relationship Strength for Link Prediction /
What Is the Uniqueness of Growth Pattern in Human Flesh Search Organization? /
Information Access and Security --
Energy Saving Replay Attack Prevention in Clustered Wireless Sensor Networks /
Detecting Web Attacks Based on Domain Statistics /
A Novel Key Scheme Based on QR Decomposition for Wireless Sensor Networks /