Intelligence and Security Informatics

Pacific Asia Workshop, PAISI 2012, Kuala Lumpur, Malaysia, May 29, 2012. Proceedings

Editors:

ISBN: 978-3-642-30427-9 (Print) 978-3-642-30428-6 (Online)

Table of contents (17 chapters)

  1. Front Matter

    Pages -

  2. Keynote Paper

    1. No Access

      Book Chapter

      Pages 1-26

      Cloud-Centric Assured Information Sharing

  3. Terrorism Informatics and Crime Analysis

    1. No Access

      Book Chapter

      Pages 27-35

      Illicit Activities and Terrorism in Cyberspace: An Exploratory Study in the Southeast Asian Region

    2. No Access

      Book Chapter

      Pages 36-44

      CybercrimeIR – A Technological Perspective to Fight Cybercrime

  4. Social Media

    1. No Access

      Book Chapter

      Pages 45-59

      Information Credibility on Twitter in Emergency Situation

    2. No Access

      Book Chapter

      Pages 60-72

      Multi-Layer Network for Influence Propagation over Microblog

    3. No Access

      Book Chapter

      Pages 73-80

      A Hybrid System for Online Detection of Emotional Distress

  5. Intrusion Detection

    1. No Access

      Book Chapter

      Pages 81-95

      Process Mining and Security: Visualization in Database Intrusion Detection

    2. No Access

      Book Chapter

      Pages 96-111

      Securing Advanced Metering Infrastructure Using Intrusion Detection System with Data Stream Mining

  6. Data and Text Mining

    1. No Access

      Book Chapter

      Pages 112-126

      A Universal Toolkit for Cryptographically Secure Privacy-Preserving Data Mining

    2. No Access

      Book Chapter

      Pages 127-135

      Identifying Walk Cycles for Human Recognition

    3. No Access

      Book Chapter

      Pages 136-144

      Chinese Organization Name Recognition Based on Multiple Features

    4. No Access

      Book Chapter

      Pages 145-153

      A Plagiarism Detection System for Arabic Text-Based Documents

    5. No Access

      Book Chapter

      Pages 154-161

      Examining Text Categorization Methods for Incidents Analysis

  7. Information Access and Security

    1. No Access

      Book Chapter

      Pages 162-175

      Multi-Committer Threshold Commitment Scheme from Lattice

    2. No Access

      Book Chapter

      Pages 176-189

      Conjunctive Keywords Searchable Encryption with Efficient Pairing, Constant Ciphertext and Short Trapdoor

    3. No Access

      Book Chapter

      Pages 190-197

      A Simultaneous Members Enrollment and Revocation Protocol for Secret Sharing Schemes

    4. No Access

      Book Chapter

      Pages 198-206

      SaaS-Driven Botnets

  8. Back Matter

    Pages -