Check nearby libraries
Buy this book
Intelligence and Security Informatics: Second Symposium on Intelligence and Security Informatics, ISI 2004, Tucson, AZ, USA, June 10-11, 2004. Proceedings
Author: Hsinchun Chen, Reagan Moore, Daniel D. Zeng, John Leavitt
Published by Springer Berlin Heidelberg
ISBN: 978-3-540-22125-8
DOI: 10.1007/b98042
Table of Contents:
- Aligning Simulation Models of Smallpox Outbreaks
- Data Analytics for Bioterrorism Surveillance
- West Nile Virus and Botulism Portal: A Case Study in Infectious Disease Informatics
- A Novel Policy and Information Flow Security Model for Active Network
- A Novel Autonomous Trust Management Model for Mobile Agents
- Privacy-Preserving Inter-database Operations
- Finding Unusual Correlation Using Matrix Decompositions
- Generating Concept Hierarchies from Text for Intelligence Analysis
- Interactive Query Languages for Intelligence Tasks
- Terrorism Knowledge Discovery Project: A Knowledge Discovery Approach to Addressing the Threats of Terrorism
- The Architecture of the Cornell Knowledge Broker
- Computer-Based Training for Deception Detection: What Users Want?
- Identifying Multi-ID Users in Open Forums
- Self-efficacy, Training Effectiveness, and Deception Detection: A Longitudinal Study of Lie Detection Training
- Composite Role-Based Monitoring (CRBM) for Countering Insider Threats
- Critical Infrastructure Integration Modeling and Simulation
- Mining Normal and Intrusive Activity Patterns for Computer Intrusion Detection
- The Optimal Deployment of Filters to Limit Forged Address Attacks in Communication Networks
- A Tool for Internet Chatroom Surveillance
- ChatTrack: Chat Room Topic Detection Using Classification
Check nearby libraries
Buy this book
Previews available in: English
Subjects
Expert systems (Computer science), Congresses, National security, Computer security, Data mining, Exploration de donnees, Monitoring, Systemes experts (Informatique), Securite informatique, Computersicherheit, Kriminalpolitik, Congres, Systeme expert, Datensicherung, Innere Sicherheit, Intelligentes Netz, Exploration de donnees (Informatique), Datenbankverwaltung, Securite nationale, Information Systems, (incl. Internet), Computers and Society, Information storage and retrieval systems, Information Systems Applications, Legal Aspects of Computing, Computer science, Management of Computing and Information Systems, Computers_xLaw and legislation, Information Storage and Retrieval, Operating systems (Computers), Operating Systems, Computers, Terrorism, preventionShowing 2 featured editions. View all 2 editions?
Edition | Availability |
---|---|
1
Intelligence and Security Informatics: Techniques and Applications
Dec 08, 2010, Springer
paperback
3642088708 9783642088704
|
zzzz
Libraries near you:
WorldCat
|
2
Intelligence and Security Informatics: Second Symposium on Intelligence and Security Informatics, ISI 2004, Tucson, AZ, USA, June 10-11, 2004, Proceedings (Lecture Notes in Computer Science)
July 27, 2004, Springer
Paperback
in English
- 1 edition
3540221255 9783540221258
|
aaaa
Libraries near you:
WorldCat
|
Book Details
First Sentence
"Numerical simulation models can be used to estimate the impact of large-scale biological attacks and to design or select appropriate response strategies."
Classifications
The Physical Object
ID Numbers
Community Reviews (0)
Feedback?History
- Created April 30, 2008
- 17 revisions
Wikipedia citation
×CloseCopy and paste this code into your Wikipedia page. Need help?
August 11, 2024 | Edited by MARC Bot | import existing book |
October 16, 2023 | Edited by ImportBot | import existing book |
March 7, 2023 | Edited by MARC Bot | import existing book |
December 8, 2020 | Edited by MARC Bot | import existing book |
April 30, 2008 | Created by an anonymous user | Imported from amazon.com record |