Editors:
Part of the book series: Lecture Notes in Computer Science (LNCS, volume 3975)
Part of the book sub series: Information Systems and Applications, incl. Internet/Web, and HCI (LNISA)
Conference series link(s): ISI: International Conference on Intelligence and Security Informatics
Conference proceedings info: ISI 2006.
Buy it now
Buying options
Tax calculation will be finalised at checkout
Other ways to access
This is a preview of subscription content, log in via an institution to check for access.
Table of contents (125 papers)
-
Front Matter
-
Long Papers
-
Intelligence Analysis and Knowledge Discovery
-
Access Control, Privacy, and Cyber Trust
-
Surveillance and Emergency Response
-
About this book
Editors and Affiliations
-
School of Information and Computer Science, University of California, Irvine
Sharad Mehrotra
-
MIS Department, University of Arizona, Tucson, USA
Daniel D. Zeng
-
Department of Management Information Systems, Eller College of Management, The University of Arizona, USA
Hsinchun Chen
-
University of Texas at Dallas,
Bhavani Thuraisingham
-
Chinese Academy of Sciences, Beijing, China
Fei-Yue Wang
Bibliographic Information
Book Title: Intelligence and Security Informatics
Book Subtitle: IEEE International Conference on Intelligence and Security Informatics, ISI 2006, San Diego, CA, USA, May 23-24, 2006.
Editors: Sharad Mehrotra, Daniel D. Zeng, Hsinchun Chen, Bhavani Thuraisingham, Fei-Yue Wang
Series Title: Lecture Notes in Computer Science
DOI: https://doi.org/10.1007/11760146
Publisher: Springer Berlin, Heidelberg
eBook Packages: Computer Science, Computer Science (R0)
Copyright Information: Springer-Verlag Berlin Heidelberg 2006
Softcover ISBN: 978-3-540-34478-0Published: 11 May 2006
eBook ISBN: 978-3-540-34479-7Published: 10 May 2006
Series ISSN: 0302-9743
Series E-ISSN: 1611-3349
Edition Number: 1
Number of Pages: XXII, 778
Topics: Cryptology, Information Systems Applications (incl. Internet), Information Storage and Retrieval, Computer Communication Networks, Computers and Society, Legal Aspects of Computing