Intelligence and Security Informatics: Pacific Asia Workshop, PAISI 2010, Hyderabad, India, June 21, 2010 Proceedings / Edition 1

Intelligence and Security Informatics: Pacific Asia Workshop, PAISI 2010, Hyderabad, India, June 21, 2010 Proceedings / Edition 1

by Hsinchun Chen
     
 

ISBN-10: 3642136001

ISBN-13: 9783642136009

Pub. Date: 06/04/2010

Publisher: Springer Berlin Heidelberg

This book constitutes the proceedings of the Pacific Asia Workshop on Intelligence and Security Informatics 2010, held in Hyderabad, India, in June 2010.  See more details below

Overview

This book constitutes the proceedings of the Pacific Asia Workshop on Intelligence and Security Informatics 2010, held in Hyderabad, India, in June 2010.

Product Details

ISBN-13:
9783642136009
Publisher:
Springer Berlin Heidelberg
Publication date:
06/04/2010
Series:
Lecture Notes in Computer Science / Security and Cryptology Series, #6122
Edition description:
2010
Pages:
183
Product dimensions:
6.10(w) x 9.20(h) x 0.40(d)

Table of Contents

Terrorism Informatics and Crime Analysis

Combined Detection Model for Criminal Network Detection Fatih Ozgul Zeki Erdem Chris Bowerman Julian Bondy 1

An Association Model for Implicit Crime Link Analysis Jau-Hwang Wang Chien-Lung Lin 15

Design and Deployment of a National Detecting Stolen Vehicles Network System Weiping Chang Chingwei Su 22

Fighting Cybercrime: A KM Perspective Weiping Chang 28

Transportation Infrastructure Security

Trajectory Similarity of Network Constrained Moving Objects and Applications to Traffic Security Sajimon Abraham Paulose Sojan Lal 31

An Emergent Traffic Messaging Service Using Wireless Technology Patrick S. Chen Yong-Kuei Liu Chia-Shih Hsu 44

Information Access and Security

A Model for Detecting "Global Footprint Anomalies" in a Grid Environment Pramod S. Pawar Srinath Srinivasa 52

Secure Anonymous Routing for MANETs Using Distributed Dynamic Random Path Selection Vakul Mohanty Dhaval Moliya Chittaranjan Hota Muttukrishnan Rajarajan 65

MAD-IDS: Novel Intrusion Detection System Using Mobile Agents and Data Mining Approaches Imen Brahmi Sadok Ben Yahia Pascal Poncelet 73

Data Encryption

Fuzzy Biometric Signcryption Scheme with Bilinear Pairings in the Standard Model Mingwu Zhang Bo Yang Tsuyoshi Takagi Yanping Shen Wenzheng Zhang 77

Key Independent Decryption of Graphically Encrypted Images Ram Ratan 88

Towards Confidentiality of ID-Based Signcryption Schemes under Without Random Oracle Model Mingwu Zhang Pengcheng Li Bo Yang Hao Wang Tsuyoshi Takagi 98

JPEG Steganalysis Using HBCL Statistics and FR Index Veena H. Bhat Krishna S. P. Deepa Shenoy Venugopal K.R. L.M. Patnaik 105

Data and Text Mining

Text Mining Technique for Chinese Written Judgment of Criminal Case Shihchieh Chou Tai-Ping Hsing 113

Exploration of Document Relation Quality with Consideration of Term Representation Basis, Term Weighting and Association Measure Nichnan Kittiphattanabawon Thanaruk Theeramunkong Ekawit Nantajeewarawat 126

Identifying Controversial Issues and Their Sub-topics in News Articles Yoonjung Choi Yuchul Jung Sung-Hyon Myaeng 140

Efficient Privacy Preserving K-Means Clustering Maneesh Upmanyu Anoop M. Namboodiri Kannan Srinathan C. V. Jawahar 154

A Fuzzy Threshold Based Modified Clustering Algorithm for Natural Data Exploration Binu Thomas G. Raju 167

Author Index 173

Read More

Customer Reviews

Average Review:

Write a Review

and post it to your social network

     

Most Helpful Customer Reviews

See all customer reviews >