Logo - springer
Slogan - springer

Computer Science - Security and Cryptology | Intelligence and Security Informatics - Pacific Asia Workshop, PAISI 2007, Chengdu, China, April

Intelligence and Security Informatics

Pacific Asia Workshop, PAISI 2007, Chengdu, China, April 11-12, 2007, Proceedings

Yang, C.C., Zeng, D., Chau, M., Chang, K., Yang, Q., Cheng, X., Wang, J., Wang, F.-Y., Chen, H. (Eds.)

2007, XII, 330 p. Also available online.

Available Formats:

Springer eBooks may be purchased by end-customers only and are sold without copy protection (DRM free). Instead, all eBooks include personalized watermarks. This means you can read the Springer eBooks across numerous devices such as Laptops, eReaders, and tablets.

You can pay for Springer eBooks with Visa, Mastercard, American Express or Paypal.

After the purchase you can directly download the eBook file or read it online in our Springer eBook Reader. Furthermore your eBook will be stored in your MySpringer account. So you can always re-download your eBooks.


(net) price for USA

ISBN 978-3-540-71549-8

digitally watermarked, no DRM

Included Format: PDF

download immediately after purchase

learn more about Springer eBooks

add to marked items


Softcover (also known as softback) version.

You can pay for Springer Books with Visa, Mastercard, American Express or Paypal.

Standard shipping is free of charge for individual customers.


(net) price for USA

ISBN 978-3-540-71548-1

free shipping for individuals worldwide

usually dispatched within 3 to 5 business days

add to marked items

This book constitutes the refereed proceedings of the Pacific Asia Workshop on Intelligence and Security Informatics, PAISI 2007, held in Chengdu, China in April 2007.

The 18 revised full papers, 14 revised short papers, and extended abstracts of 10 poster papers presented were carefully reviewed and selected from 159 submissions. The papers are organized in topical sections on crime analysis, emergency response and surveillance, intrusion detection, network security, data and text mining, cybercrime and information access and security, intrusion detection, network security, terrorism informatics and crime analysis, network security and intrusion detection.

Content Level » Research

Keywords » Distributed Denial of Service - IT - Internet - access control - computer crime - crime analysis - emergency response - homeland security - information security - intelligence informatics - intrusion detection - monitor - privacy - security - trust

Related subjects » Communication Networks - Database Management & Information Retrieval - General Issues - Security and Cryptology

Table of contents 

Keynote.- Exploring Extremism and Terrorism on the Web: The Dark Web Project.- Long Papers.- Analyzing and Visualizing Gray Web Forum Structure.- An Empirical Analysis of Online Gaming Crime Characteristics from 2002 to 2004.- Detecting Cyber Security Threats in Weblogs Using Probabilistic Models.- What-if Emergency Management System: A Generalized Voronoi Diagram Approach.- Agent Based Framework for Emergency Rescue and Assistance Planning.- Object Tracking with Self-updating Tracking Window.- A Case-Based Evolutionary Group Decision Support Method for Emergency Response.- Lightweight Anomaly Intrusion Detection in Wireless Sensor Networks.- ASITL: Adaptive Secure Interoperation Using Trust-Level.- A RT0-Based Compliance Checker Model for Automated Trust Negotiation.- TCM-KNN Algorithm for Supervised Network Intrusion Detection.- Research on Hidden Markov Model for System Call Anomaly Detection.- Towards Identifying True Threat from Network Security Data.- Security Assessment for Application Network Services Using Fault Injection.- A Secure Data Transmission Protocol for Mobile Ad Hoc Networks.- Defending DDoS Attacks Using Hidden Markov Models and Cooperative Reinforcement Learning.- A Novel Relational Database Watermarking Algorithm.- Short Papers.- Anticipatory Event Detection for Bursty Events.- Community Detection in Scale-Free Networks Based on Hypergraph Model.- The Treelike Assembly Classifier for Pedestrian Detection.- A Proposed Data Mining Approach for Internet Auction Fraud Detection.- Trends in Computer Crime and Cybercrime Research During the Period 1974-2006: A Bibliometric Approach.- The Study of Government Website Information Disclosure in Taiwan.- Informed Recognition in Software Watermarking.- An Inference Control Algorithm for RDF(S) Repository.- PPIDS: Privacy Preserving Intrusion Detection System.- Evaluating the Disaster Defense Ability of Information Systems.- Airline Safety Evaluation Based on Fuzzy TOPSIS.- A Framework for Proving the Security of Data Transmission Protocols in Sensor Network.- Port and Address Hopping for Active Cyber-Defense.- A Hybrid Model for Worm Simulations in a Large Network.- Posters.- A Web Portal for Terrorism Activities in China.- An Overview of Telemarketing Fraud Problems and Countermeasures in Taiwan.- Mining the Core Member of Terrorist Crime Group Based on Social Network Analysis.- Providing Personalized Services for HWME System by Item-Based Collaborative Filtering.- An Intelligent Agent-Oriented System for Integrating Network Security Devices and Handling Large Amount of Security Events.- Link Analysis-Based Detection of Anomalous Communication Patterns.- Social Modeling and Reasoning for Security Informatics.- Detecting Botnets by Analyzing DNS Traffic.- HMM-Based Approach for Evaluating Risk Propagation.- A Symptom-Based Taxonomy for an Early Detection of Network Attacks.

Popular Content within this publication 



Read this Book on Springerlink

Services for this book

New Book Alert

Get alerted on new Springer publications in the subject area of Data Encryption.