Intelligence and security informatics: Pacific Asia workshop, PAISI 2009, Bangkok, Thailand, April 27, 2009 ; proceedings
Gespeichert in:
Format: | Tagungsbericht Buch |
---|---|
Sprache: | English |
Veröffentlicht: |
Berlin ; Heidelberg ; New York, NY
Springer
2009
|
Schriftenreihe: | Lecture notes in computer science
5477 |
Schlagworte: | |
Online-Zugang: | Inhaltsverzeichnis |
Beschreibung: | Literaturangaben |
Beschreibung: | X, 168 S. graph. Darst., Kt. 24 cm |
ISBN: | 9783642013928 3642013929 |
Internformat
MARC
LEADER | 00000nam a2200000 cb4500 | ||
---|---|---|---|
001 | BV035453723 | ||
003 | DE-604 | ||
005 | 20120820 | ||
007 | t| | ||
008 | 090427s2009 xx bd|| |||| 10||| eng d | ||
015 | |a 09,N15,0037 |2 dnb | ||
016 | 7 | |a 993396240 |2 DE-101 | |
020 | |a 9783642013928 |c kart. : EUR 45.96 (freier Pr.), sfr 71.50 (freier Pr.) |9 978-3-642-01392-8 | ||
020 | |a 3642013929 |9 3-642-01392-9 | ||
024 | 3 | |a 9783642013928 | |
028 | 5 | 2 | |a 12657988 |
035 | |a (OCoLC)319496965 | ||
035 | |a (DE-599)DNB993396240 | ||
040 | |a DE-604 |b ger |e rakddb | ||
041 | 0 | |a eng | |
049 | |a DE-91G |a DE-706 |a DE-11 |a DE-83 | ||
050 | 0 | |a QA76.76.E95 | |
082 | 0 | |a 364.168 |2 22/ger | |
082 | 0 | |a 005.8 |2 22//ger | |
082 | 0 | |a 005.8 |2 22/ger | |
084 | |a DAT 614f |2 stub | ||
084 | |a DAT 055f |2 stub | ||
084 | |a 004 |2 sdnb | ||
084 | |a DAT 461f |2 stub | ||
084 | |a 360 |2 sdnb | ||
084 | |a DAT 465f |2 stub | ||
245 | 1 | 0 | |a Intelligence and security informatics |b Pacific Asia workshop, PAISI 2009, Bangkok, Thailand, April 27, 2009 ; proceedings |c Hsinchun Chen ... (eds.) |
264 | 1 | |a Berlin ; Heidelberg ; New York, NY |b Springer |c 2009 | |
300 | |a X, 168 S. |b graph. Darst., Kt. |c 24 cm | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
490 | 1 | |a Lecture notes in computer science |v 5477 | |
500 | |a Literaturangaben | ||
650 | 4 | |a Data Mining - Wissensextraktion - Datensicherung - Zugriffskontrolle - Kongress - Bangkok <2009> | |
650 | 4 | |a Internet - Computerkriminalität - Kryptoanalyse - Kongress - Bangkok <2009> | |
650 | 4 | |a Internet - Computersicherheit - Datensicherung - Kryptoanalyse - Kongress - Bangkok <2009> | |
650 | 4 | |a World Wide Web 2.0 - Soziales Netzwerk - Soziale Software - Informationsmanagement - Kongress - Bangkok <2009> | |
650 | 4 | |a Unternehmen | |
650 | 4 | |a Business enterprises |x Computer networks |x Security measures |v Congresses | |
650 | 4 | |a Computer security |v Congresses | |
650 | 4 | |a Data mining |v Congresses | |
650 | 4 | |a Electronic surveillance |v Congresses | |
650 | 4 | |a Expert systems (Computer science) |v Congresses | |
650 | 4 | |a National security |v Congresses | |
650 | 0 | 7 | |a Informationsmanagement |0 (DE-588)4114012-6 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Soziales Netzwerk |0 (DE-588)4055762-5 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Data Mining |0 (DE-588)4428654-5 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Kryptoanalyse |0 (DE-588)4830502-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Internetkriminalität |0 (DE-588)7864395-8 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Computerkriminalität |0 (DE-588)4010452-7 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Ad-hoc-Netz |0 (DE-588)4674811-8 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Soziale Software |0 (DE-588)7550143-0 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Datensicherung |0 (DE-588)4011144-1 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Zugriffskontrolle |0 (DE-588)4293034-0 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a World Wide Web 2.0 |0 (DE-588)7548364-6 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Internet |0 (DE-588)4308416-3 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Wissensextraktion |0 (DE-588)4546354-2 |2 gnd |9 rswk-swf |
655 | 7 | |0 (DE-588)1071861417 |a Konferenzschrift |y 2009 |z Bangkok |2 gnd-content | |
689 | 0 | 0 | |a Internet |0 (DE-588)4308416-3 |D s |
689 | 0 | 1 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 0 | 2 | |a Datensicherung |0 (DE-588)4011144-1 |D s |
689 | 0 | 3 | |a Kryptoanalyse |0 (DE-588)4830502-9 |D s |
689 | 0 | |5 DE-604 | |
689 | 1 | 0 | |a Kryptoanalyse |0 (DE-588)4830502-9 |D s |
689 | 1 | 1 | |a Internetkriminalität |0 (DE-588)7864395-8 |D s |
689 | 1 | |5 DE-604 | |
689 | 2 | 0 | |a World Wide Web 2.0 |0 (DE-588)7548364-6 |D s |
689 | 2 | 1 | |a Soziales Netzwerk |0 (DE-588)4055762-5 |D s |
689 | 2 | 2 | |a Soziale Software |0 (DE-588)7550143-0 |D s |
689 | 2 | 3 | |a Informationsmanagement |0 (DE-588)4114012-6 |D s |
689 | 2 | |5 DE-604 | |
689 | 3 | 0 | |a Data Mining |0 (DE-588)4428654-5 |D s |
689 | 3 | 1 | |a Wissensextraktion |0 (DE-588)4546354-2 |D s |
689 | 3 | 2 | |a Datensicherung |0 (DE-588)4011144-1 |D s |
689 | 3 | 3 | |a Zugriffskontrolle |0 (DE-588)4293034-0 |D s |
689 | 3 | |5 DE-604 | |
689 | 4 | 0 | |a Computerkriminalität |0 (DE-588)4010452-7 |D s |
689 | 4 | 1 | |a Kryptoanalyse |0 (DE-588)4830502-9 |D s |
689 | 4 | 2 | |a Internet |0 (DE-588)4308416-3 |D s |
689 | 4 | 3 | |a Ad-hoc-Netz |0 (DE-588)4674811-8 |D s |
689 | 4 | |8 1\p |5 DE-604 | |
700 | 1 | |a Chen, Hsinchun |e Sonstige |4 oth | |
711 | 2 | |a PAISI |d 2009 |c Bangkok |j Sonstige |0 (DE-588)16178961-4 |4 oth | |
830 | 0 | |a Lecture notes in computer science |v 5477 |w (DE-604)BV000000607 |9 5477 | |
856 | 4 | 2 | |m DNB Datenaustausch |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=017373710&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
883 | 1 | |8 1\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk | |
943 | 1 | |a oai:aleph.bib-bvb.de:BVB01-017373710 |
Datensatz im Suchindex
_version_ | 1820875117641596928 |
---|---|
adam_text |
TABLE OF CONTENTS KEYNOTE BUILDING A GEOSOCIAL SEMANTIC WEB FOR MILITARY
STABILIZATION AND RECONSTRUCTION OPERATIONS 1 BHAVANI THURAISINGHAM,
MURAT KANTARCIOGLU, AND LATIFUR KHAN TERRORISM INFORMATICS AND CRIME
ANALYSIS CRIMINAL CROSS CORRELATION MINING AND VISUALIZATION 2 PETER
PHILLIPS AND ICKJAI LEE A CYBERCRIME FORENSIC METHOD FOR CHINESE WEB
INFORMATION AUTHORSHIP ANALYSIS 14 JIANBIN MA, GUIFA TENG, YUXIN ZHANG,
YUELI LI, AND YING LI PREDICTION OF UNSOLVED TERRORIST ATTACKS USING
GROUP DETECTION ALGORITHMS 25 FATIH OZGUL, ZEKI ERDEM, AND CHRIS
BOWERMAN ENTERPRISE RISK MANAGEMENT EXPLORING FRAUDULENT FINANCIAL
REPORTING WITH GHSOM 31 RUA-HUAN TSAIH, WAN-YING LIN, AND SHIN-YING
HUANG IDENTIFYING FIRM-SPECIFIC RISK STATEMENTS IN NEWS ARTICLES 42
HSIN-MIN LU, NINA WANHSIN HUANG, ZHU ZHANG, AND TSAI-JYH CHEN PREDICTING
FUTURE EARNINGS CHANGE USING NUMERIC AND TEXTUAL INFORMATION IN
FINANCIAL REPORTS 54 KUO-TAY CHEN, TSAI-JYH CHEN, AND JU-CHUN YEN
EMERGENCY RESPONSE AND SURVEILLANCE WHEN GENERALIZED VORONOI DIAGRAMS
MEET GEOWEB FOR EMERGENCY MANAGEMENT 64 CHRISTOPHER TORPELUND-BRUIN AND
ICKJAI LEE E 3 TP: A NOVEL TRAJECTORY PREDICTION ALGORITHM IN MOVING
OBJECTS DATABASE BIBLIOGRAFISCHE INFORMATIONEN
HTTP://D-NB.INFO/993396240 DIGITALISIERT DURCH X TABLE OF CONTENTS
INFORMATION ACCESS AND SECURITY A USER-CENTERED FRAMEWORK FOR ADAPTIVE
FINGERPRINT IDENTIFICATION . 89 PAUL W.E. KWAN, JUNBIN GAO, AND
GRAHAM LEEDHAM DESIGN OF A PASSPORT ANTI-FORGERY SYSTEM BASED ON DIGITAL
SIGNATURE SCHEMES 101 LEI SHI, SHENGHUI SU, AND ZHENGRONG XIANG A
CHRONOLOGICAL EVALUATION OF UNKNOWN MALCODE DETECTION 112 ROBERT
MOSKOVITCH, CLINT FEHER, AND YUVAL ELOVICI DATA AND TEXT MINING RELATION
DISCOVERY FROM THAI NEWS ARTICLES USING ASSOCIATION RULE MINING 118
NICHNAN KITTIPHATTANABAWON AND THANARUK THEERAMUNKONG DISCOVERING
COMPATIBLE TOP-K THEME PATTERNS FROM TEXT BASED ON USERS' PREFERENCES
130 YONGXIN TONG, SHILONG MA, DAN YU, YUANYUAN ZHANG, LI ZHAO, AND KE XU
JUICER: SCALABLE EXTRACTION FOR THREAD META-INFORMATION OF WEB FORUM 143
YAN GUO, YU WANG, GUODONG DING, DONGLIN CAO, GANG ZHANG, AND YILV A
FEATURE-BASED APPROACH FOR RELATION EXTRACTION FROM THAI NEWS DOCUMENTS
149 NATTAPONG TONGTEP AND THANARUK THEERAMUNKONG AN INCREMENTAL-LEARNING
METHOD FOR SUPERVISED ANOMALY DETECTION BY CASCADING SERVICE CLASSIFIER
AND ITI DECISION TREE METHODS 155 WEI-YI YU AND HAHN-MING LEE
QUANTIFYING NEWS REPORTS TO PROXY "OTHER INFORMATION" IN ERC MODELS 161
KUO-TAY |
any_adam_object | 1 |
building | Verbundindex |
bvnumber | BV035453723 |
callnumber-first | Q - Science |
callnumber-label | QA76 |
callnumber-raw | QA76.76.E95 |
callnumber-search | QA76.76.E95 |
callnumber-sort | QA 276.76 E95 |
callnumber-subject | QA - Mathematics |
classification_rvk | SS 4800 |
classification_tum | DAT 614f DAT 055f DAT 461f DAT 465f |
ctrlnum | (OCoLC)319496965 (DE-599)DNB993396240 |
dewey-full | 364.168 005.8 |
dewey-hundreds | 300 - Social sciences 000 - Computer science, information, general works |
dewey-ones | 364 - Criminology 005 - Computer programming, programs, data, security |
dewey-raw | 364.168 005.8 |
dewey-search | 364.168 005.8 |
dewey-sort | 3364.168 |
dewey-tens | 360 - Social problems and services; associations 000 - Computer science, information, general works |
discipline | Rechtswissenschaft Informatik Soziologie |
format | Conference Proceeding Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>00000nam a2200000 cb4500</leader><controlfield tag="001">BV035453723</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20120820</controlfield><controlfield tag="007">t|</controlfield><controlfield tag="008">090427s2009 xx bd|| |||| 10||| eng d</controlfield><datafield tag="015" ind1=" " ind2=" "><subfield code="a">09,N15,0037</subfield><subfield code="2">dnb</subfield></datafield><datafield tag="016" ind1="7" ind2=" "><subfield code="a">993396240</subfield><subfield code="2">DE-101</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783642013928</subfield><subfield code="c">kart. : EUR 45.96 (freier Pr.), sfr 71.50 (freier Pr.)</subfield><subfield code="9">978-3-642-01392-8</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">3642013929</subfield><subfield code="9">3-642-01392-9</subfield></datafield><datafield tag="024" ind1="3" ind2=" "><subfield code="a">9783642013928</subfield></datafield><datafield tag="028" ind1="5" ind2="2"><subfield code="a">12657988</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)319496965</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)DNB993396240</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rakddb</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91G</subfield><subfield code="a">DE-706</subfield><subfield code="a">DE-11</subfield><subfield code="a">DE-83</subfield></datafield><datafield tag="050" ind1=" " ind2="0"><subfield code="a">QA76.76.E95</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">364.168</subfield><subfield code="2">22/ger</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">22//ger</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">22/ger</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 614f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 055f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">004</subfield><subfield code="2">sdnb</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 461f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">360</subfield><subfield code="2">sdnb</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 465f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Intelligence and security informatics</subfield><subfield code="b">Pacific Asia workshop, PAISI 2009, Bangkok, Thailand, April 27, 2009 ; proceedings</subfield><subfield code="c">Hsinchun Chen ... (eds.)</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Berlin ; Heidelberg ; New York, NY</subfield><subfield code="b">Springer</subfield><subfield code="c">2009</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">X, 168 S.</subfield><subfield code="b">graph. Darst., Kt.</subfield><subfield code="c">24 cm</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">Lecture notes in computer science</subfield><subfield code="v">5477</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Literaturangaben</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data Mining - Wissensextraktion - Datensicherung - Zugriffskontrolle - Kongress - Bangkok <2009></subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Internet - Computerkriminalität - Kryptoanalyse - Kongress - Bangkok <2009></subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Internet - Computersicherheit - Datensicherung - Kryptoanalyse - Kongress - Bangkok <2009></subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">World Wide Web 2.0 - Soziales Netzwerk - Soziale Software - Informationsmanagement - Kongress - Bangkok <2009></subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Unternehmen</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Business enterprises</subfield><subfield code="x">Computer networks</subfield><subfield code="x">Security measures</subfield><subfield code="v">Congresses</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield><subfield code="v">Congresses</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data mining</subfield><subfield code="v">Congresses</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Electronic surveillance</subfield><subfield code="v">Congresses</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Expert systems (Computer science)</subfield><subfield code="v">Congresses</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">National security</subfield><subfield code="v">Congresses</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Informationsmanagement</subfield><subfield code="0">(DE-588)4114012-6</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Soziales Netzwerk</subfield><subfield code="0">(DE-588)4055762-5</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Data Mining</subfield><subfield code="0">(DE-588)4428654-5</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kryptoanalyse</subfield><subfield code="0">(DE-588)4830502-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Internetkriminalität</subfield><subfield code="0">(DE-588)7864395-8</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computerkriminalität</subfield><subfield code="0">(DE-588)4010452-7</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Ad-hoc-Netz</subfield><subfield code="0">(DE-588)4674811-8</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Soziale Software</subfield><subfield code="0">(DE-588)7550143-0</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Zugriffskontrolle</subfield><subfield code="0">(DE-588)4293034-0</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">World Wide Web 2.0</subfield><subfield code="0">(DE-588)7548364-6</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Internet</subfield><subfield code="0">(DE-588)4308416-3</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Wissensextraktion</subfield><subfield code="0">(DE-588)4546354-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)1071861417</subfield><subfield code="a">Konferenzschrift</subfield><subfield code="y">2009</subfield><subfield code="z">Bangkok</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Internet</subfield><subfield code="0">(DE-588)4308416-3</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="3"><subfield code="a">Kryptoanalyse</subfield><subfield code="0">(DE-588)4830502-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="1" ind2="0"><subfield code="a">Kryptoanalyse</subfield><subfield code="0">(DE-588)4830502-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="1"><subfield code="a">Internetkriminalität</subfield><subfield code="0">(DE-588)7864395-8</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="2" ind2="0"><subfield code="a">World Wide Web 2.0</subfield><subfield code="0">(DE-588)7548364-6</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="2" ind2="1"><subfield code="a">Soziales Netzwerk</subfield><subfield code="0">(DE-588)4055762-5</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="2" ind2="2"><subfield code="a">Soziale Software</subfield><subfield code="0">(DE-588)7550143-0</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="2" ind2="3"><subfield code="a">Informationsmanagement</subfield><subfield code="0">(DE-588)4114012-6</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="2" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="3" ind2="0"><subfield code="a">Data Mining</subfield><subfield code="0">(DE-588)4428654-5</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="3" ind2="1"><subfield code="a">Wissensextraktion</subfield><subfield code="0">(DE-588)4546354-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="3" ind2="2"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="3" ind2="3"><subfield code="a">Zugriffskontrolle</subfield><subfield code="0">(DE-588)4293034-0</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="3" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="4" ind2="0"><subfield code="a">Computerkriminalität</subfield><subfield code="0">(DE-588)4010452-7</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="4" ind2="1"><subfield code="a">Kryptoanalyse</subfield><subfield code="0">(DE-588)4830502-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="4" ind2="2"><subfield code="a">Internet</subfield><subfield code="0">(DE-588)4308416-3</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="4" ind2="3"><subfield code="a">Ad-hoc-Netz</subfield><subfield code="0">(DE-588)4674811-8</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="4" ind2=" "><subfield code="8">1\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Chen, Hsinchun</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="711" ind1="2" ind2=" "><subfield code="a">PAISI</subfield><subfield code="d">2009</subfield><subfield code="c">Bangkok</subfield><subfield code="j">Sonstige</subfield><subfield code="0">(DE-588)16178961-4</subfield><subfield code="4">oth</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">Lecture notes in computer science</subfield><subfield code="v">5477</subfield><subfield code="w">(DE-604)BV000000607</subfield><subfield code="9">5477</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">DNB Datenaustausch</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=017373710&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">1\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-017373710</subfield></datafield></record></collection> |
genre | (DE-588)1071861417 Konferenzschrift 2009 Bangkok gnd-content |
genre_facet | Konferenzschrift 2009 Bangkok |
id | DE-604.BV035453723 |
illustrated | Illustrated |
indexdate | 2025-01-10T15:10:32Z |
institution | BVB |
institution_GND | (DE-588)16178961-4 |
isbn | 9783642013928 3642013929 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-017373710 |
oclc_num | 319496965 |
open_access_boolean | |
owner | DE-91G DE-BY-TUM DE-706 DE-11 DE-83 |
owner_facet | DE-91G DE-BY-TUM DE-706 DE-11 DE-83 |
physical | X, 168 S. graph. Darst., Kt. 24 cm |
publishDate | 2009 |
publishDateSearch | 2009 |
publishDateSort | 2009 |
publisher | Springer |
record_format | marc |
series | Lecture notes in computer science |
series2 | Lecture notes in computer science |
spelling | Intelligence and security informatics Pacific Asia workshop, PAISI 2009, Bangkok, Thailand, April 27, 2009 ; proceedings Hsinchun Chen ... (eds.) Berlin ; Heidelberg ; New York, NY Springer 2009 X, 168 S. graph. Darst., Kt. 24 cm txt rdacontent n rdamedia nc rdacarrier Lecture notes in computer science 5477 Literaturangaben Data Mining - Wissensextraktion - Datensicherung - Zugriffskontrolle - Kongress - Bangkok <2009> Internet - Computerkriminalität - Kryptoanalyse - Kongress - Bangkok <2009> Internet - Computersicherheit - Datensicherung - Kryptoanalyse - Kongress - Bangkok <2009> World Wide Web 2.0 - Soziales Netzwerk - Soziale Software - Informationsmanagement - Kongress - Bangkok <2009> Unternehmen Business enterprises Computer networks Security measures Congresses Computer security Congresses Data mining Congresses Electronic surveillance Congresses Expert systems (Computer science) Congresses National security Congresses Informationsmanagement (DE-588)4114012-6 gnd rswk-swf Soziales Netzwerk (DE-588)4055762-5 gnd rswk-swf Data Mining (DE-588)4428654-5 gnd rswk-swf Kryptoanalyse (DE-588)4830502-9 gnd rswk-swf Internetkriminalität (DE-588)7864395-8 gnd rswk-swf Computersicherheit (DE-588)4274324-2 gnd rswk-swf Computerkriminalität (DE-588)4010452-7 gnd rswk-swf Ad-hoc-Netz (DE-588)4674811-8 gnd rswk-swf Soziale Software (DE-588)7550143-0 gnd rswk-swf Datensicherung (DE-588)4011144-1 gnd rswk-swf Zugriffskontrolle (DE-588)4293034-0 gnd rswk-swf World Wide Web 2.0 (DE-588)7548364-6 gnd rswk-swf Internet (DE-588)4308416-3 gnd rswk-swf Wissensextraktion (DE-588)4546354-2 gnd rswk-swf (DE-588)1071861417 Konferenzschrift 2009 Bangkok gnd-content Internet (DE-588)4308416-3 s Computersicherheit (DE-588)4274324-2 s Datensicherung (DE-588)4011144-1 s Kryptoanalyse (DE-588)4830502-9 s DE-604 Internetkriminalität (DE-588)7864395-8 s World Wide Web 2.0 (DE-588)7548364-6 s Soziales Netzwerk (DE-588)4055762-5 s Soziale Software (DE-588)7550143-0 s Informationsmanagement (DE-588)4114012-6 s Data Mining (DE-588)4428654-5 s Wissensextraktion (DE-588)4546354-2 s Zugriffskontrolle (DE-588)4293034-0 s Computerkriminalität (DE-588)4010452-7 s Ad-hoc-Netz (DE-588)4674811-8 s 1\p DE-604 Chen, Hsinchun Sonstige oth PAISI 2009 Bangkok Sonstige (DE-588)16178961-4 oth Lecture notes in computer science 5477 (DE-604)BV000000607 5477 DNB Datenaustausch application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=017373710&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis 1\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk |
spellingShingle | Intelligence and security informatics Pacific Asia workshop, PAISI 2009, Bangkok, Thailand, April 27, 2009 ; proceedings Lecture notes in computer science Data Mining - Wissensextraktion - Datensicherung - Zugriffskontrolle - Kongress - Bangkok <2009> Internet - Computerkriminalität - Kryptoanalyse - Kongress - Bangkok <2009> Internet - Computersicherheit - Datensicherung - Kryptoanalyse - Kongress - Bangkok <2009> World Wide Web 2.0 - Soziales Netzwerk - Soziale Software - Informationsmanagement - Kongress - Bangkok <2009> Unternehmen Business enterprises Computer networks Security measures Congresses Computer security Congresses Data mining Congresses Electronic surveillance Congresses Expert systems (Computer science) Congresses National security Congresses Informationsmanagement (DE-588)4114012-6 gnd Soziales Netzwerk (DE-588)4055762-5 gnd Data Mining (DE-588)4428654-5 gnd Kryptoanalyse (DE-588)4830502-9 gnd Internetkriminalität (DE-588)7864395-8 gnd Computersicherheit (DE-588)4274324-2 gnd Computerkriminalität (DE-588)4010452-7 gnd Ad-hoc-Netz (DE-588)4674811-8 gnd Soziale Software (DE-588)7550143-0 gnd Datensicherung (DE-588)4011144-1 gnd Zugriffskontrolle (DE-588)4293034-0 gnd World Wide Web 2.0 (DE-588)7548364-6 gnd Internet (DE-588)4308416-3 gnd Wissensextraktion (DE-588)4546354-2 gnd |
subject_GND | (DE-588)4114012-6 (DE-588)4055762-5 (DE-588)4428654-5 (DE-588)4830502-9 (DE-588)7864395-8 (DE-588)4274324-2 (DE-588)4010452-7 (DE-588)4674811-8 (DE-588)7550143-0 (DE-588)4011144-1 (DE-588)4293034-0 (DE-588)7548364-6 (DE-588)4308416-3 (DE-588)4546354-2 (DE-588)1071861417 |
title | Intelligence and security informatics Pacific Asia workshop, PAISI 2009, Bangkok, Thailand, April 27, 2009 ; proceedings |
title_auth | Intelligence and security informatics Pacific Asia workshop, PAISI 2009, Bangkok, Thailand, April 27, 2009 ; proceedings |
title_exact_search | Intelligence and security informatics Pacific Asia workshop, PAISI 2009, Bangkok, Thailand, April 27, 2009 ; proceedings |
title_full | Intelligence and security informatics Pacific Asia workshop, PAISI 2009, Bangkok, Thailand, April 27, 2009 ; proceedings Hsinchun Chen ... (eds.) |
title_fullStr | Intelligence and security informatics Pacific Asia workshop, PAISI 2009, Bangkok, Thailand, April 27, 2009 ; proceedings Hsinchun Chen ... (eds.) |
title_full_unstemmed | Intelligence and security informatics Pacific Asia workshop, PAISI 2009, Bangkok, Thailand, April 27, 2009 ; proceedings Hsinchun Chen ... (eds.) |
title_short | Intelligence and security informatics |
title_sort | intelligence and security informatics pacific asia workshop paisi 2009 bangkok thailand april 27 2009 proceedings |
title_sub | Pacific Asia workshop, PAISI 2009, Bangkok, Thailand, April 27, 2009 ; proceedings |
topic | Data Mining - Wissensextraktion - Datensicherung - Zugriffskontrolle - Kongress - Bangkok <2009> Internet - Computerkriminalität - Kryptoanalyse - Kongress - Bangkok <2009> Internet - Computersicherheit - Datensicherung - Kryptoanalyse - Kongress - Bangkok <2009> World Wide Web 2.0 - Soziales Netzwerk - Soziale Software - Informationsmanagement - Kongress - Bangkok <2009> Unternehmen Business enterprises Computer networks Security measures Congresses Computer security Congresses Data mining Congresses Electronic surveillance Congresses Expert systems (Computer science) Congresses National security Congresses Informationsmanagement (DE-588)4114012-6 gnd Soziales Netzwerk (DE-588)4055762-5 gnd Data Mining (DE-588)4428654-5 gnd Kryptoanalyse (DE-588)4830502-9 gnd Internetkriminalität (DE-588)7864395-8 gnd Computersicherheit (DE-588)4274324-2 gnd Computerkriminalität (DE-588)4010452-7 gnd Ad-hoc-Netz (DE-588)4674811-8 gnd Soziale Software (DE-588)7550143-0 gnd Datensicherung (DE-588)4011144-1 gnd Zugriffskontrolle (DE-588)4293034-0 gnd World Wide Web 2.0 (DE-588)7548364-6 gnd Internet (DE-588)4308416-3 gnd Wissensextraktion (DE-588)4546354-2 gnd |
topic_facet | Data Mining - Wissensextraktion - Datensicherung - Zugriffskontrolle - Kongress - Bangkok <2009> Internet - Computerkriminalität - Kryptoanalyse - Kongress - Bangkok <2009> Internet - Computersicherheit - Datensicherung - Kryptoanalyse - Kongress - Bangkok <2009> World Wide Web 2.0 - Soziales Netzwerk - Soziale Software - Informationsmanagement - Kongress - Bangkok <2009> Unternehmen Business enterprises Computer networks Security measures Congresses Computer security Congresses Data mining Congresses Electronic surveillance Congresses Expert systems (Computer science) Congresses National security Congresses Informationsmanagement Soziales Netzwerk Data Mining Kryptoanalyse Internetkriminalität Computersicherheit Computerkriminalität Ad-hoc-Netz Soziale Software Datensicherung Zugriffskontrolle World Wide Web 2.0 Internet Wissensextraktion Konferenzschrift 2009 Bangkok |
url | http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=017373710&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
volume_link | (DE-604)BV000000607 |
work_keys_str_mv | AT chenhsinchun intelligenceandsecurityinformaticspacificasiaworkshoppaisi2009bangkokthailandapril272009proceedings AT paisibangkok intelligenceandsecurityinformaticspacificasiaworkshoppaisi2009bangkokthailandapril272009proceedings |