PAISI 2007:
Chengdu,
China
Christopher C. Yang, Daniel Dajun Zeng, Michael Chau, Kuiyu Chang, Qing Yang, Xueqi Cheng, Jue Wang, Fei-Yue Wang, Hsinchun Chen (Eds.):
Intelligence and Security Informatics, Pacific Asia Workshop, PAISI 2007, Chengdu, China, April 11-12, 2007, Proceedings.
Lecture Notes in Computer Science 4430 Springer 2007, ISBN 978-3-540-71548-1 BibTeX
Keynote
Long Papers
Crime Analysis
Emergency Response and Surveillance
- Ickjai Lee, Reece Pershouse, Peter Phillips, Chris Christensen:
What-if Emergency Management System: A Generalized Voronoi Diagram Approach.
58-69
Electronic Edition (link) BibTeX
- Yujun Zheng, Jinquan Wang, Jinyun Xue:
Agent Based Framework for Emergency Rescue and Assistance Planning.
70-81
Electronic Edition (link) BibTeX
- Huimin Qian, Yaobin Mao, Jason Geng, Zhiquan Wang:
Object Tracking with Self-updating Tracking Window.
82-93
Electronic Edition (link) BibTeX
- Jidi Zhao, Tao Jin, Huizhang Shen:
A Case-Based Evolutionary Group Decision Support Method for Emergency Response.
94-104
Electronic Edition (link) BibTeX
Intrusion Detection
Network Security
- Zhitang Li, Jie Lei, Li Wang, Dong Li, Yang-ming Ma:
Towards Identifying True Threat from Network Security Data.
160-171
Electronic Edition (link) BibTeX
- Hyungwoo Kang, Dong Hoon Lee:
Security Assessment for Application Network Services Using Fault Injection.
172-183
Electronic Edition (link) BibTeX
- Shejie Lu, Jun Li, Zhiyuan Liu, Guohua Cui:
A Secure Data Transmission Protocol for Mobile Ad Hoc Networks.
184-195
Electronic Edition (link) BibTeX
- Xin Xu, Yongqiang Sun, Zunguo Huang:
Defending DDoS Attacks Using Hidden Markov Models and Cooperative Reinforcement Learning.
196-207
Electronic Edition (link) BibTeX
- Yu Fu, Cong Jin, Chuanxiang Ma:
A Novel Relational Database Watermarking Algorithm.
208-219
Electronic Edition (link) BibTeX
Short Papers
Data and Text Mining
- Kuiyu Chang, Qi He, Ridzwan Aminuddin, Ridzwan Suri, Ee-Peng Lim:
Anticipatory Event Detection for Bursty Events.
220-225
Electronic Edition (link) BibTeX
- Rong Qian, Wei Zhang, Bingru Yang:
Community Detection in Scale-Free Networks Based on Hypergraph Model.
226-231
Electronic Edition (link) BibTeX
- C. X. Wei, Xianbin Cao, Yan Wu Xu, Hong Qiao, Fei-Yue Wang:
The Treelike Assembly Classifier for Pedestrian Detection.
232-237
Electronic Edition (link) BibTeX
Cybercrime and Information Access and Security
- Yungchang Ku, Yuchi Chen, Chaochang Chiu:
A Proposed Data Mining Approach for Internet Auction Fraud Detection.
238-243
Electronic Edition (link) BibTeX
- Chichao Lu, WenYuan Jen, Weiping Chang:
Trends in Computer Crime and Cybercrime Research During the Period 1974-2006: A Bibliometric Approach.
244-250
Electronic Edition (link) BibTeX
- Yuan-Fa Chen, Sandy Yu-Lan Yeh, Kuo-Ching Wu:
The Study of Government Website Information Disclosure in Taiwan.
251-256
Electronic Edition (link) BibTeX
- William Zhu:
Informed Recognition in Software Watermarking.
257-261
Electronic Edition (link) BibTeX
- Jianjiang Lu, Jinpeng Wang, Yafei Zhang, Bo Zhou, Yanhui Li, Zhuang Miao:
An Inference Control Algorithm for RDF(S) Repository.
262-268
Electronic Edition (link) BibTeX
Intrusion Detection
Network Security
Posters
Terrorism Informatics and Crime Analysis
- Daniel Dajun Zeng, Li Zhang, Donghua Wei, Fei-Yue Wang:
A Web Portal for Terrorism Activities in China.
307-308
Electronic Edition (link) BibTeX
- Jau-Hwang Wang, Jiing-Long Jow, You-Lu Liao, Tyan-muh Tsai, Garfield Hung:
An Overview of Telemarketing Fraud Problems and Countermeasures in Taiwan.
309-310
Electronic Edition (link) BibTeX
- Qihong Liu, Changjie Tang, Shaojie Qiao, Qiwei Liu, Fenlian Wen:
Mining the Core Member of Terrorist Crime Group Based on Social Network Analysis.
311-313
Electronic Edition (link) BibTeX
- Qiudan Li, Yaodong Li, Huiguang He, Guanggang Geng, Yuanping Zhu, Chunheng Wang:
Providing Personalized Services for HWME System by Item-Based Collaborative Filtering.
314-315
Electronic Edition (link) BibTeX
Network Security and Intrusion Detection
- Yang-ming Ma, Zhitang Li, Jie Lei, Li Wang, Dong Li:
An Intelligent Agent-Oriented System for Integrating Network Security Devices and Handling Large Amount of Security Events.
316-317
Electronic Edition (link) BibTeX
- Daniel Dajun Zeng, Zan Huang:
Link Analysis-Based Detection of Anomalous Communication Patterns.
318-320
Electronic Edition (link) BibTeX
- Wenji Mao, Daniel Dajun Zeng, Li Zhang, Donghua Wei, Fei-Yue Wang:
Social Modeling and Reasoning for Security Informatics.
321-322
Electronic Edition (link) BibTeX
- Hao Tu, Zhitang Li, Bin Liu:
Detecting Botnets by Analyzing DNS Traffic.
323-324
Electronic Edition (link) BibTeX
- Young-Gab Kim, Jongin Lim:
HMM-Based Approach for Evaluating Risk Propagation.
325-326
Electronic Edition (link) BibTeX
- Ki-Yoon Kim, Hyoung-Kee Choi:
A Symptom-Based Taxonomy for an Early Detection of Network Attacks.
327-328
Electronic Edition (link) BibTeX
Copyright © Sat May 16 23:32:21 2009
by Michael Ley (ley@uni-trier.de)