Listing 1 - 10 of 31 | << page >> |
Sort by
|
Choose an application
This book constitutes the refereed proceedings of the Pacific Asia Workshop on Intelligence and Security Informatics, PAISI 2015, held in Ho Chi Minh City, Vietnam, in May 2015 in conjunction with PAKDD 2015, the 19th Pacific-Asia Conference on Knowledge Discovery and Data Mining. The 8 revised full papers presented were carefully reviewed and selected from numerous submissions. Topics of the workshop are information sharing and big data analytics, infrastructure protection and emergency responses, cybercrime and terrorism informatics and analytics, as well as enterprise risk management, IS security, and social media analytics. The papers present a significant view on regional data sets and case studies, including online social media and multimedia, fraud deception, and text mining.
Computer Science. --- Systems and Data Security. --- Information Storage and Retrieval. --- Computer Communication Networks. --- Data Mining and Knowledge Discovery. --- Computers and Society. --- Information Systems Applications (incl. Internet). --- Computer science. --- Data protection. --- Data mining. --- Information storage and retrieval systems. --- Informatique --- Réseaux d'ordinateurs --- Protection de l'information (Informatique) --- Exploration de données (Informatique) --- Systèmes d'information --- Engineering & Applied Sciences --- Computer Science --- Computer communication systems. --- Computer security. --- Information storage and retrieval. --- Computers and civilization. --- Civilization and computers --- Civilization --- Algorithmic knowledge discovery --- Factual data analysis --- KDD (Information retrieval) --- Knowledge discovery in data --- Knowledge discovery in databases --- Mining, Data --- Database searching --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Informatics --- Science --- Protection --- Security measures --- Distributed processing --- Information storage and retrieva. --- Automatic data storage --- Automatic information retrieval --- Automation in documentation --- Computer-based information systems --- Data processing systems --- Data storage and retrieval systems --- Discovery systems, Information --- Information discovery systems --- Information processing systems --- Information retrieval systems --- Machine data storage and retrieval --- Mechanized information storage and retrieval systems --- Electronic information resources --- Data libraries --- Digital libraries --- Information organization --- Information retrieval --- Computer security --- Data encryption (Computer science) --- Internet --- DARPA Internet --- Internet (Computer network) --- Wide area networks (Computer networks) --- World Wide Web --- Application software. --- Application computer programs --- Application computer software --- Applications software --- Apps (Computer software) --- Computer software
Choose an application
This book constitutes the refereed proceedings of the 11th Pacific Asia Workshop on Intelligence and Security Informatics, PAISI 2016, held in Auckland, New Zealand, in April 2016 in conjunction with PAKDD 2016, the 20th Pacific-Asia Conference on Knowledge Discovery and Data Mining. The 7 revised full papers presented together with 7 short papers were carefully reviewed and selected from 23 submissions. The papers cover network-based data analytics, data and text mining, and cyber security and infrastructure protection.
Computer Science --- Engineering & Applied Sciences --- Computer science. --- Computer security. --- Data mining. --- Information storage and retrieval. --- Artificial intelligence. --- Computers and civilization. --- Computer Science. --- Systems and Data Security. --- Information Storage and Retrieval. --- Data Mining and Knowledge Discovery. --- Computers and Society. --- Information Systems Applications (incl. Internet). --- Artificial Intelligence (incl. Robotics). --- Civilization and computers --- Civilization --- AI (Artificial intelligence) --- Artificial thinking --- Electronic brains --- Intellectronics --- Intelligence, Artificial --- Intelligent machines --- Machine intelligence --- Thinking, Artificial --- Bionics --- Cognitive science --- Digital computer simulation --- Electronic data processing --- Logic machines --- Machine theory --- Self-organizing systems --- Simulation methods --- Fifth generation computers --- Neural computers --- Algorithmic knowledge discovery --- Factual data analysis --- KDD (Information retrieval) --- Knowledge discovery in data --- Knowledge discovery in databases --- Mining, Data --- Database searching --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Informatics --- Science --- Protection --- Security measures --- Information storage and retrieva. --- Artificial Intelligence. --- Information storage and retrieval systems. --- Automatic data storage --- Automatic information retrieval --- Automation in documentation --- Computer-based information systems --- Data processing systems --- Data storage and retrieval systems --- Discovery systems, Information --- Information discovery systems --- Information processing systems --- Information retrieval systems --- Machine data storage and retrieval --- Mechanized information storage and retrieval systems --- Electronic information resources --- Data libraries --- Digital libraries --- Information organization --- Information retrieval --- Computer security --- Application software. --- Application computer programs --- Application computer software --- Applications software --- Apps (Computer software) --- Computer software
Choose an application
This book constitutes the refereed proceedings of the 12th Pacific Asia Workshop on Intelligence and Security Informatics, PAISI 2017, held in Jeju Island, South Korea, in May 2017 in conjunction with PAKDD 2017, the 21st Pacific-Asia Conference on Knowledge Discovery and Data Mining. The 8 revised full papers and one short paper were carefully reviewed and selected from 13 submissions. The papers cover topics such as information access and security, cybersecurity and infrastructure protection, data and text mining, and network based data analytics.
Computer science. --- Computer communication systems. --- Computer security. --- Artificial intelligence. --- Computers and civilization. --- Computers. --- Law and legislation. --- Computer Science. --- Systems and Data Security. --- Computers and Society. --- Legal Aspects of Computing. --- Computer Communication Networks. --- Information Systems Applications (incl. Internet). --- Artificial Intelligence (incl. Robotics). --- Automatic computers --- Automatic data processors --- Computer hardware --- Computing machines (Computers) --- Electronic brains --- Electronic calculating-machines --- Electronic computers --- Hardware, Computer --- AI (Artificial intelligence) --- Artificial thinking --- Intellectronics --- Intelligence, Artificial --- Intelligent machines --- Machine intelligence --- Thinking, Artificial --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Security of computer systems --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Informatics --- Civilization and computers --- Security measures --- Protection of computer systems --- Protection --- Cybernetics --- Machine theory --- Calculators --- Cyberspace --- Bionics --- Cognitive science --- Digital computer simulation --- Electronic data processing --- Logic machines --- Self-organizing systems --- Simulation methods --- Fifth generation computers --- Neural computers --- Data protection --- Security systems --- Hacking --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Network computers --- Science --- Civilization --- Distributed processing --- Artificial Intelligence. --- Law and legislation --- Data encryption (Computer science) --- Internet --- Computer security --- DARPA Internet --- Internet (Computer network) --- Wide area networks (Computer networks) --- World Wide Web --- Application software. --- Application computer programs --- Application computer software --- Applications software --- Apps (Computer software) --- Computer software
Choose an application
This book constitutes the refereed proceedings of the Pacific Asia Workshop on Intelligence and Security Informatics, PAISI 2015, held in Ho Chi Minh City, Vietnam, in May 2015 in conjunction with PAKDD 2015, the 19th Pacific-Asia Conference on Knowledge Discovery and Data Mining. The 8 revised full papers presented were carefully reviewed and selected from numerous submissions. Topics of the workshop are information sharing and big data analytics, infrastructure protection and emergency responses, cybercrime and terrorism informatics and analytics, as well as enterprise risk management, IS security, and social media analytics. The papers present a significant view on regional data sets and case studies, including online social media and multimedia, fraud deception, and text mining.
Information retrieval --- Programming --- Computer architecture. Operating systems --- Information systems --- Artificial intelligence. Robotics. Simulation. Graphics --- Computer. Automation --- datamining --- applicatiebeheer --- apps --- computers --- informatica --- maatschappij --- informatiesystemen --- computerbeveiliging --- computernetwerken --- architectuur (informatica) --- data acquisition
Choose an application
Intelligence and Security Informatics (ISI) is defined as the study of the development and use of advanced information systems and technologies for national, international, and societal security-related applications. With the rise of global terrorism, the field has been given an increasing amount of attention from academic researchers, law enforcement, intelligent experts, information technology consultants and practitioners. SECURITY INFORMATICS is global in scope and perspective. Leading experts will be invited as contributing authors from the US, UK, Denmark, Israel, Singapore, Hong Kong, Taiwan, Europe, etc. It is the first systematic, archival volume treatment of the field and will cover the very latest advances in ISI research and practice. It is organized in four major subject areas: (1) Information and Systems Security, (2) Information Sharing and Analysis in Security Informatics, (3) Infrastructure Protection and Emergency Responses, and (4) National Security and Terrorism Informatics.
Business enterprises --Computer networks --Security measures -- Congresses. --- Computer security -- Congresses. --- Data mining -- Congresses. --- Electronic surveillance -- Congresses. --- Expert systems (Computer science) -- Congresses. --- National security -- Congresses. --- Computer security --- Data protection --- Computer Science --- Engineering & Applied Sciences --- Computer security. --- Computer networks --- Security measures. --- Computer network security --- Network security, Computer --- Security of computer networks --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Security of computer systems --- Security measures --- Protection of computer systems --- Protection --- Computer science. --- Operations research. --- Decision making. --- Information technology. --- Business --- Computer organization. --- Data mining. --- Artificial intelligence. --- Computer Science. --- Systems and Data Security. --- IT in Business. --- Data Mining and Knowledge Discovery. --- Operation Research/Decision Theory. --- Computer Systems Organization and Communication Networks. --- Artificial Intelligence (incl. Robotics). --- Data processing. --- Security systems --- Hacking --- AI (Artificial intelligence) --- Artificial thinking --- Electronic brains --- Intellectronics --- Intelligence, Artificial --- Intelligent machines --- Machine intelligence --- Thinking, Artificial --- Bionics --- Cognitive science --- Digital computer simulation --- Electronic data processing --- Logic machines --- Machine theory --- Self-organizing systems --- Simulation methods --- Fifth generation computers --- Neural computers --- Algorithmic knowledge discovery --- Factual data analysis --- KDD (Information retrieval) --- Knowledge discovery in data --- Knowledge discovery in databases --- Mining, Data --- Database searching --- Organization, Computer --- IT (Information technology) --- Technology --- Telematics --- Information superhighway --- Knowledge management --- Deciding --- Decision (Psychology) --- Decision analysis --- Decision processes --- Making decisions --- Management --- Management decisions --- Choice (Psychology) --- Problem solving --- Operational analysis --- Operational research --- Industrial engineering --- Management science --- Research --- System theory --- Informatics --- Science --- Decision making --- Computer network architectures. --- Operations Research/Decision Theory. --- Artificial Intelligence. --- Architectures, Computer network --- Network architectures, Computer --- Computer architecture --- Business—Data processing.
Choose an application
This book constitutes the refereed proceedings of the Pacific Asia Workshop on Intelligence and Security Informatics, PAISI 2013, held in Beijing, China, in August 2013 in conjunction with the International Joint Conference on Artificial Intelligence (IJCAI 2013). The 4 revised full papers presented together with 7 short papers were carefully reviewed and selected from numerous submissions. The papers are organized in topical sections on information sharing and data/text mining; terrorism informatics; network-based data analytics; and information access and security.
Engineering & Applied Sciences --- Computer Science --- Computer science. --- Computer communication systems. --- Computer security. --- Data mining. --- Information storage and retrieval. --- Computers and civilization. --- Computer Science. --- Systems and Data Security. --- Information Storage and Retrieval. --- Computer Communication Networks. --- Data Mining and Knowledge Discovery. --- Computers and Society. --- Data protection. --- Informatics --- Science --- Data governance --- Data regulation --- Personal data protection --- Protection, Data --- Electronic data processing --- Information storage and retrieva. --- Algorithmic knowledge discovery --- Factual data analysis --- KDD (Information retrieval) --- Knowledge discovery in data --- Knowledge discovery in databases --- Mining, Data --- Database searching --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Protection --- Security measures --- Information storage and retrieval systems. --- Automatic data storage --- Automatic information retrieval --- Automation in documentation --- Computer-based information systems --- Data processing systems --- Data storage and retrieval systems --- Discovery systems, Information --- Information discovery systems --- Information processing systems --- Information retrieval systems --- Machine data storage and retrieval --- Mechanized information storage and retrieval systems --- Electronic information resources --- Data libraries --- Digital libraries --- Information organization --- Information retrieval --- Civilization and computers --- Civilization --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Network computers --- Distributed processing
Choose an application
This book constitutes the refereed proceedings of the Pacific Asia Workshop on Intelligence and Security Informatics, PAISI 2014, held in Tainan, Taiwan, in May 2014 in conjunction with PAKDD 2014, the 18th Pacific-Asia Conference on Knowledge Discovery and Data Mining. The 7 revised full papers presented together with one short paper were carefully reviewed and selected from 10 submissions. The papers are organized in topical sections on regional data sets and case studies, cybercrime, information security engineering and text mining.
Computer security --- Computer security. --- Information storage and retrieva. --- Computer Communication Networks. --- Data mining. --- Computer science. --- Systems and Data Security. --- Information Storage and Retrieval. --- Data Mining and Knowledge Discovery. --- Computers and Society. --- Information Systems Applications (incl. Internet). --- Information storage and retrieval. --- Informatics --- Science --- Algorithmic knowledge discovery --- Factual data analysis --- KDD (Information retrieval) --- Knowledge discovery in data --- Knowledge discovery in databases --- Mining, Data --- Database searching --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Protection --- Security measures --- Information storage and retrieval systems. --- Automatic data storage --- Automatic information retrieval --- Automation in documentation --- Computer-based information systems --- Data processing systems --- Data storage and retrieval systems --- Discovery systems, Information --- Information discovery systems --- Information processing systems --- Information retrieval systems --- Machine data storage and retrieval --- Mechanized information storage and retrieval systems --- Electronic information resources --- Data libraries --- Digital libraries --- Information organization --- Information retrieval --- Computer communication systems. --- Computers and civilization. --- Application software. --- Application computer programs --- Application computer software --- Applications software --- Apps (Computer software) --- Computer software --- Civilization and computers --- Civilization --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Distributed processing
Choose an application
Computer architecture. Operating systems --- Information systems --- Computer. Automation --- informatica --- maatschappij --- database management --- informatica management --- computercriminaliteit --- computernetwerken
Choose an application
This book constitutes the refereed proceedings of the Pacific Asia Workshop on Intelligence and Security Informatics, PAISI 2014, held in Tainan, Taiwan, in May 2014 in conjunction with PAKDD 2014, the 18th Pacific-Asia Conference on Knowledge Discovery and Data Mining. The 7 revised full papers presented together with one short paper were carefully reviewed and selected from 10 submissions. The papers are organized in topical sections on regional data sets and case studies, cybercrime, information security engineering and text mining.
Information retrieval --- Computer science --- Computer architecture. Operating systems --- Information systems --- Computer. Automation --- IR (information retrieval) --- text mining --- computers --- informatica --- maatschappij --- informatiesystemen --- database management --- computerbeveiliging --- computernetwerken --- computerkunde --- data acquisition
Choose an application
This book constitutes the refereed proceedings of the Pacific Asia Workshop on Intelligence and Security Informatics, PAISI 2013, held in Beijing, China, in August 2013 in conjunction with the International Joint Conference on Artificial Intelligence (IJCAI 2013). The 4 revised full papers presented together with 7 short papers were carefully reviewed and selected from numerous submissions. The papers are organized in topical sections on information sharing and data/text mining; terrorism informatics; network-based data analytics; and information access and security.
Information retrieval --- Computer science --- Computer architecture. Operating systems --- Information systems --- Computer. Automation --- IR (information retrieval) --- text mining --- computers --- informatica --- maatschappij --- informatiesystemen --- database management --- computerbeveiliging --- KI (kunstmatige intelligentie) --- computernetwerken --- computerkunde --- data acquisition
Listing 1 - 10 of 31 | << page >> |
Sort by
|