Table of contents

  1. Front Matter
  2. Keynote

    1. Bhavani Thuraisingham, Murat Kantarcioglu, Latifur Khan
      Pages 1-1
  3. Terrorism Informatics and Crime Analysis

    1. Peter Phillips, Ickjai Lee
      Pages 2-13
    2. Jianbin Ma, Guifa Teng, Yuxin Zhang, Yueli Li, Ying Li
      Pages 14-24
    3. Fatih Ozgul, Zeki Erdem, Chris Bowerman
      Pages 25-30
  4. Enterprise Risk Management

    1. Rua-Huan Tsaih, Wan-Ying Lin, Shin-Ying Huang
      Pages 31-41
    2. Hsin-Min Lu, Nina WanHsin Huang, Zhu Zhang, Tsai-Jyh Chen
      Pages 42-53
  5. Emergency Response and Surveillance

    1. Christopher Torpelund-Bruin, Ickjai Lee
      Pages 64-75
    2. Teng Long, Shaojie Qiao, Changjie Tang, Liangxu Liu, Taiyong Li, Jiang Wu
      Pages 76-88
  6. Information Access and Security

    1. Paul W. H. Kwan, Junbin Gao, Graham Leedham
      Pages 89-100
    2. Lei Shi, Shenghui Su, Zhengrong Xiang
      Pages 101-111
    3. Robert Moskovitch, Clint Feher, Yuval Elovici
      Pages 112-117
  7. Data and Text Mining

    1. Nichnan Kittiphattanabawon, Thanaruk Theeramunkong
      Pages 118-129
    2. Yongxin Tong, Shilong Ma, Dan Yu, Yuanyuan Zhang, Li Zhao, Ke Xu
      Pages 130-142
    3. Yan Guo, Yu Wang, Guodong Ding, Donglin Cao, Gang Zhang, Yi Lv
      Pages 143-148
    4. Nattapong Tongtep, Thanaruk Theeramunkong
      Pages 149-154
    5. Kuo-Tay Chen, Jian-Shuen Lian, Yu-Ting Hsieh
      Pages 161-168
  8. Back Matter

About these proceedings

Introduction

This book constitutes the refereed proceedings of the Pacific Asia Workshop on Intelligence and Security Informatics, PAISI 2009, held in Bangkok, Thailand, in April 2009.

The 10 revised full papers, 7 revised short papers together with 1 keynote lecture were carefully reviewed and selected from numerous submissions. The papers are organized in topical sections on terrorism informatics and crime analysis enterprise risk management emergency response and surveillance information access and security, as well as data and text mining.

Keywords

IT adaptive information processing anomaly detection association rule mining authorship analysis biometrics classification clustering crime analysis crime data mining cybercrime forensics data mining deception detection digital signature schemes security

Editors and affiliations

  • Hsinchun Chen
    • 1
  • Christopher C. Yang
    • 2
  • Michael Chau
    • 3
  • Shu-Hsing Li
    • 4
  1. 1.The University of ArizonaTucsonUSA
  2. 2.Drexel UniversityPhiladelphiaUSA
  3. 3.The University of Hong KongHong KongChina
  4. 4.National Taiwan UniversityTaipeiTaiwan, R.O.C.

Bibliographic information

  • DOI https://doi.org/10.1007/978-3-642-01393-5
  • Copyright Information Springer-Verlag Berlin Heidelberg 2009
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science
  • Print ISBN 978-3-642-01392-8
  • Online ISBN 978-3-642-01393-5
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • About this book