


default search action
PAISI 2012: Kuala Lumpur, Malaysia
- Michael Chau, G. Alan Wang, Wei Thoo Yue, Hsinchun Chen:
Intelligence and Security Informatics - Pacific Asia Workshop, PAISI 2012, Kuala Lumpur, Malaysia, May 29, 2012. Proceedings. Lecture Notes in Computer Science 7299, Springer 2012, ISBN 978-3-642-30427-9
Keynote Paper
- Bhavani Thuraisingham, Vaibhav Khadilkar, Jyothsna Rachapalli, Tyrone Cadenhead, Murat Kantarcioglu, Kevin W. Hamlen, Latifur Khan
, Mohammad Farhan Husain:
Cloud-Centric Assured Information Sharing. 1-26
Terrorism Informatics and Crime Analysis
- Zahri Yunos, Rabiah Ahmad, Syahrir Mat Ali, Solahuddin Shamsuddin:
Illicit Activities and Terrorism in Cyberspace: An Exploratory Study in the Southeast Asian Region. 27-35 - Weiping Chang, Yungchang Ku, Sinru Wu, Chaochang Chiu:
CybercrimeIR - A Technological Perspective to Fight Cybercrime. 36-44
Social Media
- Xin Xia
, Xiaohu Yang, Chao Wu, Shanping Li, Linfeng Bao:
Information Credibility on Twitter in Emergency Situation. 45-59 - Chao Li, Jun Luo, Joshua Zhexue Huang, Jianping Fan:
Multi-Layer Network for Influence Propagation over Microblog. 60-72 - Tim M. H. Li
, Michael Chau
, Paul W. C. Wong, Paul Siu Fai Yip:
A Hybrid System for Online Detection of Emotional Distress. 73-80
Intrusion Detection
- Viet H. Huynh
, An N. T. Le:
Process Mining and Security: Visualization in Database Intrusion Detection. 81-95 - Mustafa Amir Faisal, Zeyar Aung
, John R. Williams, Abel Sanchez:
Securing Advanced Metering Infrastructure Using Intrusion Detection System with Data Stream Mining. 96-111
Data and Text Mining
- Dan Bogdanov
, Roman Jagomägis, Sven Laur:
A Universal Toolkit for Cryptographically Secure Privacy-Preserving Data Mining. 112-126 - Jakub Valcík, Jan Sedmidubský
, Michal Balazia
, Pavel Zezula:
Identifying Walk Cycles for Human Recognition. 127-135 - Yajuan Ling, Jing Yang, Liang He:
Chinese Organization Name Recognition Based on Multiple Features. 136-144 - Ameera Jadalla, Ashraf Elnagar
:
A Plagiarism Detection System for Arabic Text-Based Documents. 145-153
Information Access and Security
- Weiwei Sun, Bo Yang, Qiong Huang, Sha Ma, Ximing Li
:
Multi-Committer Threshold Commitment Scheme from Lattice. 162-175 - Zhenhua Chen, Chunying Wu, Daoshun Wang, Shundong Li:
Conjunctive Keywords Searchable Encryption with Efficient Pairing, Constant Ciphertext and Short Trapdoor. 176-189 - Jia Yu, Shuguang Wang, Huawei Zhao, Minglei Shu, Jia-liang Lv, Qiang Guo:
A Simultaneous Members Enrollment and Revocation Protocol for Secret Sharing Schemes. 190-197 - Biao Jiang, Eul Gyu Im
, Yunmo Koo:
SaaS-Driven Botnets. 198-206

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.