Intelligence and Security Informatics Techniques and Applications /

Detalles Bibliográficos
Autor Corporativo: SpringerLink (Online service)
Otros Autores: Chen, Hsinchun. (Editor ), Yang, Christopher C. (Editor )
Formato: eBook
Lenguaje:English
Publicado: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2008.
Edición:1st ed. 2008.
Colección:Studies in Computational Intelligence, 135
Materias:
Acceso en línea:https://doi.org/10.1007/978-3-540-69209-6
LEADER 02954nam a22004215i 4500
001 978-3-540-69209-6
005 20191022043000.0
007 cr nn 008mamaa
008 100301s2008 gw | s |||| 0|eng d
020 |a 9783540692096 
024 7 |a 10.1007/978-3-540-69209-6  |2 doi 
040 |a Sistema de Bibliotecas del Tecnológico de Costa Rica 
245 1 0 |a Intelligence and Security Informatics  |b Techniques and Applications /  |c edited by Hsinchun Chen, Christopher C. Yang. 
250 |a 1st ed. 2008. 
260 # # |a Berlin, Heidelberg :  |b Springer Berlin Heidelberg :  |b Imprint: Springer,  |c 2008. 
300 |a XIII, 460 p.  |b online resource. 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
490 1 |a Studies in Computational Intelligence,  |v 135 
505 0 |a Terrorism Informatics and Data Mining -- Assured Information Sharing: Technologies, Challenges and Directions -- Automating Event Extraction for the Security Domain -- Knowledge Discovery and Information Visualization for Terrorist Social Networks -- Understanding the Nexus of Terrorist Web Sites -- Multi-lingual Detection of Web Terrorist Content -- Modeling Anticipatory Event Transitions -- Exploring Gray Web Forums: Analysis and Investigation of Forum-Based Communities in Taiwan -- Intelligence and Crime Analysis -- Identifying Interesting Networks of Criminal Activity -- Name Matching in Law Enforcement Database -- Discovering Investigation Clues through Mining Criminal Databases -- Automated Filtering on Data Streaming for Intelligence Analysis -- Personal Information Management for Intelligence Tasks -- A Data Miner’s Approach to Country Corruption Analysis -- Access Control, Infrastructure Protection and Privacy -- Protecting Private Information in Online Social Networks -- Protection of Database Security Via Collaborative Inference Detection -- Suspect Vehicle Identification for Border Safety -- Optimization Problems for Port-of-Entry Detection Systems -- Modeling and Validation of Aviation Security -- Surveillance and Emergency Response -- Anomaly Detection in Moving Object -- Intelligent Face Recognition -- Video Analysis of Vehicles and Persons for Surveillance -- Video-Based Deception Detection. 
650 0 |a Applied mathematics. 
650 0 |a Engineering mathematics. 
650 0 |a Data encryption (Computer science). 
650 0 |a Artificial intelligence. 
650 0 |a E-commerce. 
650 0 |a Information technology. 
650 0 |a Business—Data processing. 
650 1 4 |a Mathematical and Computational Engineering. 
650 2 4 |a Cryptology. 
650 2 4 |a Artificial Intelligence. 
650 2 4 |a e-Commerce/e-business. 
650 2 4 |a IT in Business. 
700 1 |a Chen, Hsinchun.  |e editor. 
700 1 |a Yang, Christopher C.  |e editor. 
710 2 |a SpringerLink (Online service) 
773 0 |t Springer eBooks 
856 4 0 |u https://doi.org/10.1007/978-3-540-69209-6