Security and Cryptology
© 2010
Intelligence and Security Informatics
Pacific Asia Workshop, PAISI 2010, Hyderabad, India, June 21, 2010 Proceedings
Editors: Chen, H., Chau, M., Li, S.-h., Urs, S., Srinivasa, S., Wang, G.A. (Eds.)
Free Preview- Up-to-date results
- Fast track conference proceedings
- State-of-the-art report
Buy this book
- Table of contents (18 chapters)
-
-
Combined Detection Model for Criminal Network Detection
Pages 1-14
-
An Association Model for Implicit Crime Link Analysis
Pages 15-21
-
Design and Deployment of a National Detecting Stolen Vehicles Network System
Pages 22-27
-
Fighting Cybercrime: A KM Perspective
Pages 28-30
-
Trajectory Similarity of Network Constrained Moving Objects and Applications to Traffic Security
Pages 31-43
-
Table of contents (18 chapters)
Recommended for you

Bibliographic Information
- Bibliographic Information
-
- Book Title
- Intelligence and Security Informatics
- Book Subtitle
- Pacific Asia Workshop, PAISI 2010, Hyderabad, India, June 21, 2010 Proceedings
- Editors
-
- Hsinchun Chen
- Michael Chau
- Shu-hsing Li
- Shalini Urs
- Srinath Srinivasa
- G. Alan Wang
- Series Title
- Security and Cryptology
- Series Volume
- 6122
- Copyright
- 2010
- Publisher
- Springer-Verlag Berlin Heidelberg
- Copyright Holder
- Springer-Verlag Berlin Heidelberg
- eBook ISBN
- 978-3-642-13601-6
- DOI
- 10.1007/978-3-642-13601-6
- Softcover ISBN
- 978-3-642-13600-9
- Edition Number
- 1
- Number of Pages
- 183
- Number of Illustrations
- 50 b/w illustrations
- Topics