Intelligence and Security Informatics

Pacific Asia Workshop, PAISI 2012, Kuala Lumpur, Malaysia, May 29, 2012. Proceedings

  • Michael Chau
  • G. Alan Wang
  • Wei Thoo Yue
  • Hsinchun Chen

Part of the Lecture Notes in Computer Science book series (LNCS, volume 7299)

Table of contents

  1. Front Matter
  2. Keynote Paper

    1. Bhavani Thuraisingham, Vaibhav Khadilkar, Jyothsna Rachapalli, Tyrone Cadenhead, Murat Kantarcioglu, Kevin Hamlen et al.
      Pages 1-26
  3. Terrorism Informatics and Crime Analysis

    1. Zahri Yunos, Rabiah Ahmad, Syahrir Mat Ali, Solahuddin Shamsuddin
      Pages 27-35
    2. Weiping Chang, Yungchang Ku, Sinru Wu, Chaochang Chiu
      Pages 36-44
  4. Social Media

    1. Xin Xia, Xiaohu Yang, Chao Wu, Shanping Li, Linfeng Bao
      Pages 45-59
    2. Chao Li, Jun Luo, Joshua Zhexue Huang, Jianping Fan
      Pages 60-72
    3. Tim M. H. Li, Michael Chau, Paul W. C. Wong, Paul S. F. Yip
      Pages 73-80
  5. Intrusion Detection

    1. Mustafa Amir Faisal, Zeyar Aung, John R. Williams, Abel Sanchez
      Pages 96-111
  6. Data and Text Mining

    1. Dan Bogdanov, Roman Jagomägis, Sven Laur
      Pages 112-126
    2. Jakub Valcik, Jan Sedmidubsky, Michal Balazia, Pavel Zezula
      Pages 127-135
    3. Yajuan Ling, Jing Yang, Liang He
      Pages 136-144
    4. Ameera Jadalla, Ashraf Elnagar
      Pages 145-153
    5. Nurfadhlina Mohd Sharef, Khairul Azhar Kasmiran
      Pages 154-161
  7. Information Access and Security

    1. Weiwei Sun, Bo Yang, Qiong Huang, Sha Ma, Ximing Li
      Pages 162-175
    2. Jia Yu, Shuguang Wang, Huawei Zhao, Minglei Shu, Jialiang Lv, Qiang Guo
      Pages 190-197
    3. Biao Jiang, Eul Gyu Im, Yunmo Koo
      Pages 198-206
  8. Back Matter

About these proceedings

Introduction

This book constitutes the refereed proceedings of the Pacific Asia Workshop on Intelligence and Security Informatics, PAISI 2012, held in Kuala Lumpur, Malaysia, in May 2012 - held in conjunction with the Pacific Asia Conference on Knowledge Discovery and Data Mining (PAKDD 2012). The 8 revised full papers and the 8 revised short papers presented together with 1 keynote lecture were carefully reviewed and selected from numerous submissions. The papers are organized in topical sections on terrorism informatics and crime analysis, social media, intrusion detection, data and text mining, as well as information access and security.

Keywords

cloud computing cyber terrorism fingerprinting techniques plagiarism detection textual analysis

Editors and affiliations

  • Michael Chau
    • 1
  • G. Alan Wang
    • 2
  • Wei Thoo Yue
    • 3
  • Hsinchun Chen
    • 4
  1. 1.The University of Hong KongPokfulamHong Kong
  2. 2.Virginia TechBlacksburgUSA
  3. 3.City University of Hong KongHong Kong
  4. 4.Artificial Intelligence LabUniversity of ArizonaTucsonUSA

Bibliographic information

  • DOI https://doi.org/10.1007/978-3-642-30428-6
  • Copyright Information Springer-Verlag Berlin Heidelberg 2012
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science
  • Print ISBN 978-3-642-30427-9
  • Online ISBN 978-3-642-30428-6
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • About this book
Industry Sectors
Pharma
Biotechnology
Electronics
Telecommunications
Energy, Utilities & Environment