feed icon rss

Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
Filter
Type of Medium
Language
Region
Years
Subjects(RVK)
Access
  • 1
    UID:
    almahu_BV023353097
    Format: XXII, 522 S. : , Ill., graph. Darst. ; , 24 cm.
    ISBN: 978-3-540-69136-5
    Series Statement: Lecture notes in computer science 5075
    Note: Literaturangaben
    Language: English
    Subjects: Computer Science
    RVK:
    Keywords: Internet ; Computersicherheit ; Datensicherung ; Kryptoanalyse ; Kryptoanalyse ; Internetkriminalität ; World Wide Web 2.0 ; Soziales Netzwerk ; Soziale Software ; Informationsmanagement ; Konferenzschrift ; Kongress ; Konferenzschrift ; Konferenzschrift
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 2
    Online Resource
    Online Resource
    Oxford :Academic Press, | Oxford :Academic Press ;
    UID:
    almahu_9949697781102882
    Format: 1 online resource (ix, 205 pages) : , illustrations (some color).
    Edition: 1st ed.
    ISBN: 0-12-405902-3 , 1-283-99395-3
    Series Statement: Intelligent systems series Intelligent systems for security informatics
    Content: The Intelligent Systems Series comprises titles that present state-of-the-art knowledge and the latest advances in intelligent systems. Its scope includes theoretical studies, design methods, and real-world implementations and applications. The most prevalent topics in Intelligence and Security Informatics (ISI) include data management, data and text mining for ISI applications, terrorism informatics, deception and intent detection, terrorist and criminal social network analysis, public health and bio-security, crime analysis, cyber-infrastructure protection, transportation infrastr
    Note: Description based upon print version of record. , Front Cover; Intelligent Systems Series; Intelligent Systems for Security Informatics; Copyright; Contents; Preface; Chapter 1 - Revealing the Hidden World of the Dark Web: Social Media Forums and Videos1; 1.1 Introduction; 1.2 The Dark Web Forum Portal; 1.3 The Video Portal; 1.4 Conclusion and Future Directions; Acknowledgments; References; Chapter 2 - Proactive Cyber Defense; 2.1 Introduction; 2.2 Proactive Filters; 2.3 Early Warning; 2.4 Concluding Remarks; Acknowledgments; References; Chapter 3 - Privacy-Preserving Social Network Integration, Analysis, and Mining , 3.1 Social Network Analysis and Mining3.2 Privacy Preservation; 3.3 Information Integration and Privacy Preservation for SNAM; 3.4 Conclusion; References; Chapter 4 - A Digraph Model for Risk Identification and Management in SCADA Systems; 4.1 Introduction; 4.2 Background; 4.3 A Digraph Model of SCADA Systems; 4.4 Conclusions; References; Chapter 5 - High-Level Architecture and Design of a Decision Engine for Marine Safety and Security1; 5.1 Introduction; 5.2 Background; 5.3 Conceptual Design; 5.4 Formal Representation; 5.5 Application; 5.6 Conclusions and Future Work; Acknowledgments , ReferencesChapter 6 - Criminal Identity Resolution Using Personal and Social Identity Attributes: A Collective Resolution Approach; 6.1 Introduction; 6.2 Related Work; 6.3 A Collective Identity Resolution Approach; 6.4 Experiments; 6.5 Concluding Remarks; References; Chapter 7 - Al Qaeda Terrorist Financing; 7.1 Importance of Cutting Terrorist Financing; 7.2 Description of Al Qaeda's Financial Network; 7.3 History and Development of Al Qaeda and its Financial Network; 7.4 Organizational Structure: Control Over Finances Within Al Qaeda; 7.5 Al Qaeda's Portfolio and Sources of "Revenues" , 7.6 Methods of Transferring and Storing FundsReferences; Chapter 8 - Study on Covert Networks of Terrorists Based on Interactive Relationship Hypothesis; 8.1 Introduction; 8.2 Relevant Works; 8.3 Initial Network Construction; 8.4 Network Refinement Based on Interaction Relation Hypothesis; 8.5 Relationship Network Refinement and Final Relationship Network of Terrorist Organizations and Incidents; 8.6 Analysis and Verification; 8.7 Conclusions; Acknowledgments; References; Chapter 9 - Incorporating Data and Methodologies for Knowledge Discovery for Crime; 9.1 Introduction , 9.2 Steps Involved in Crime Investigation9.3 Data Sources for Crime Data Mining and Investigation; 9.4 The Four Types of Knowledge Discovery; 9.5 Knowledge Discovery Methodologies for Crime Data; 9.6 Methodologies Applied to Knowledge Discovery Types; 9.7 Conclusion; References; Index , English
    Additional Edition: ISBN 0-12-404702-5
    Language: English
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 3
    UID:
    b3kat_BV022399795
    Format: XII, 330 S. , Ill., graph. Darst.
    ISBN: 9783540715481 , 3540715487
    Series Statement: Lecture Notes in Computer Science 4430
    Language: English
    Subjects: Computer Science
    RVK:
    Keywords: Rechnernetz ; Computersicherheit ; Eindringerkennung ; Data Mining ; Datensicherung ; Zugriffskontrolle ; Internetkriminalität ; Kryptoanalyse ; Konferenzschrift ; Kongress ; Konferenzschrift
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 4
    UID:
    b3kat_BV023183369
    Format: 1 Online-Ressource (XII, 330 S.) , Ill., graph. Darst.
    ISBN: 9783540715481 , 9783540715498
    Series Statement: Lecture Notes in Computer Science 4430
    Language: English
    Subjects: Computer Science
    RVK:
    Keywords: Rechnernetz ; Computersicherheit ; Eindringerkennung ; Data Mining ; Datensicherung ; Zugriffskontrolle ; Internetkriminalität ; Kryptoanalyse ; Konferenzschrift ; Konferenzschrift
    URL: Volltext  (lizenzpflichtig)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 5
    UID:
    b3kat_BV023415276
    Format: 1 Online-Ressource (XXII, 522 S.) , Ill., graph. Darst.
    ISBN: 9783540691365 , 9783540693048
    Series Statement: Lecture notes in computer science 5075
    Language: English
    Subjects: Computer Science
    RVK:
    Keywords: Internet ; Computersicherheit ; Datensicherung ; Kryptoanalyse ; Internetkriminalität ; Kryptoanalyse ; World Wide Web 2.0 ; Soziales Netzwerk ; Soziale Software ; Informationsmanagement ; Konferenzschrift ; Konferenzschrift
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 6
    UID:
    almahu_9947364460502882
    Format: XII, 151 p. 47 illus. , online resource.
    ISBN: 9783642398445
    Series Statement: Lecture Notes in Computer Science, 8040
    Content: This book constitutes the refereed proceedings of the International Conference for Smart Health, ICSH 2013, held in Beijing, China, in August 2013. The 15 revised full papers presented were carefully reviewed and selected from numerous submissions. The papers are organized in topical sections on Information Sharing, Integrating and Extraction; Mining Clinical and Medical Data; Smart Health Applications.
    Note: Information Sharing, Integrating and Extraction -- Mining Clinical and Medical Data -- Smart Health Applications.
    In: Springer eBooks
    Additional Edition: Printed edition: ISBN 9783642398438
    Language: English
    Subjects: Computer Science
    RVK:
    Keywords: Konferenzschrift ; Konferenzschrift
    URL: Volltext  (lizenzpflichtig)
    URL: Volltext  (lizenzpflichtig)
    URL: Cover
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 7
    UID:
    b3kat_BV041909197
    Format: 1 Online-Ressource (vii, 170 Seiten) , Illustrationen, Diagramme
    ISBN: 9781441913258
    Series Statement: Annals of information systems volume 9
    Note: Includes bibliographical references
    Additional Edition: Erscheint auch als Druck-Ausgabe, Paperback ISBN 978-1-4419-1324-1
    Language: English
    Subjects: Computer Science
    RVK:
    Keywords: Kriminalpolitik ; Innere Sicherheit ; Data Mining ; Computersicherheit ; Aufsatzsammlung
    URL: Volltext  (URL des Erstveröffentlichers)
    Author information: Yang, Christopher C.
    Author information: Chau, Michael
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 8
    Book
    Book
    New York, NY [u.a.] : IEEE Computer Society
    UID:
    b3kat_BV042145507
    Format: 96 S. , Ill., graph. Darst., Kt.
    Series Statement: IEEE intelligent systems 29,2
    Language: English
    Author information: Yang, Christopher C.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 9
    Online Resource
    Online Resource
    Oxford :Academic Press, | Oxford :Academic Press ;
    UID:
    edocfu_9960073768302883
    Format: 1 online resource (ix, 205 pages) : , illustrations (some color).
    Edition: 1st ed.
    ISBN: 0-12-405902-3 , 1-283-99395-3
    Series Statement: Intelligent systems series Intelligent systems for security informatics
    Content: The Intelligent Systems Series comprises titles that present state-of-the-art knowledge and the latest advances in intelligent systems. Its scope includes theoretical studies, design methods, and real-world implementations and applications. The most prevalent topics in Intelligence and Security Informatics (ISI) include data management, data and text mining for ISI applications, terrorism informatics, deception and intent detection, terrorist and criminal social network analysis, public health and bio-security, crime analysis, cyber-infrastructure protection, transportation infrastr
    Note: Description based upon print version of record. , Front Cover; Intelligent Systems Series; Intelligent Systems for Security Informatics; Copyright; Contents; Preface; Chapter 1 - Revealing the Hidden World of the Dark Web: Social Media Forums and Videos1; 1.1 Introduction; 1.2 The Dark Web Forum Portal; 1.3 The Video Portal; 1.4 Conclusion and Future Directions; Acknowledgments; References; Chapter 2 - Proactive Cyber Defense; 2.1 Introduction; 2.2 Proactive Filters; 2.3 Early Warning; 2.4 Concluding Remarks; Acknowledgments; References; Chapter 3 - Privacy-Preserving Social Network Integration, Analysis, and Mining , 3.1 Social Network Analysis and Mining3.2 Privacy Preservation; 3.3 Information Integration and Privacy Preservation for SNAM; 3.4 Conclusion; References; Chapter 4 - A Digraph Model for Risk Identification and Management in SCADA Systems; 4.1 Introduction; 4.2 Background; 4.3 A Digraph Model of SCADA Systems; 4.4 Conclusions; References; Chapter 5 - High-Level Architecture and Design of a Decision Engine for Marine Safety and Security1; 5.1 Introduction; 5.2 Background; 5.3 Conceptual Design; 5.4 Formal Representation; 5.5 Application; 5.6 Conclusions and Future Work; Acknowledgments , ReferencesChapter 6 - Criminal Identity Resolution Using Personal and Social Identity Attributes: A Collective Resolution Approach; 6.1 Introduction; 6.2 Related Work; 6.3 A Collective Identity Resolution Approach; 6.4 Experiments; 6.5 Concluding Remarks; References; Chapter 7 - Al Qaeda Terrorist Financing; 7.1 Importance of Cutting Terrorist Financing; 7.2 Description of Al Qaeda's Financial Network; 7.3 History and Development of Al Qaeda and its Financial Network; 7.4 Organizational Structure: Control Over Finances Within Al Qaeda; 7.5 Al Qaeda's Portfolio and Sources of "Revenues" , 7.6 Methods of Transferring and Storing FundsReferences; Chapter 8 - Study on Covert Networks of Terrorists Based on Interactive Relationship Hypothesis; 8.1 Introduction; 8.2 Relevant Works; 8.3 Initial Network Construction; 8.4 Network Refinement Based on Interaction Relation Hypothesis; 8.5 Relationship Network Refinement and Final Relationship Network of Terrorist Organizations and Incidents; 8.6 Analysis and Verification; 8.7 Conclusions; Acknowledgments; References; Chapter 9 - Incorporating Data and Methodologies for Knowledge Discovery for Crime; 9.1 Introduction , 9.2 Steps Involved in Crime Investigation9.3 Data Sources for Crime Data Mining and Investigation; 9.4 The Four Types of Knowledge Discovery; 9.5 Knowledge Discovery Methodologies for Crime Data; 9.6 Methodologies Applied to Knowledge Discovery Types; 9.7 Conclusion; References; Index , English
    Additional Edition: ISBN 0-12-404702-5
    Language: English
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 10
    Online Resource
    Online Resource
    Oxford :Academic Press, | Oxford :Academic Press ;
    UID:
    edoccha_9960073768302883
    Format: 1 online resource (ix, 205 pages) : , illustrations (some color).
    Edition: 1st ed.
    ISBN: 0-12-405902-3 , 1-283-99395-3
    Series Statement: Intelligent systems series Intelligent systems for security informatics
    Content: The Intelligent Systems Series comprises titles that present state-of-the-art knowledge and the latest advances in intelligent systems. Its scope includes theoretical studies, design methods, and real-world implementations and applications. The most prevalent topics in Intelligence and Security Informatics (ISI) include data management, data and text mining for ISI applications, terrorism informatics, deception and intent detection, terrorist and criminal social network analysis, public health and bio-security, crime analysis, cyber-infrastructure protection, transportation infrastr
    Note: Description based upon print version of record. , Front Cover; Intelligent Systems Series; Intelligent Systems for Security Informatics; Copyright; Contents; Preface; Chapter 1 - Revealing the Hidden World of the Dark Web: Social Media Forums and Videos1; 1.1 Introduction; 1.2 The Dark Web Forum Portal; 1.3 The Video Portal; 1.4 Conclusion and Future Directions; Acknowledgments; References; Chapter 2 - Proactive Cyber Defense; 2.1 Introduction; 2.2 Proactive Filters; 2.3 Early Warning; 2.4 Concluding Remarks; Acknowledgments; References; Chapter 3 - Privacy-Preserving Social Network Integration, Analysis, and Mining , 3.1 Social Network Analysis and Mining3.2 Privacy Preservation; 3.3 Information Integration and Privacy Preservation for SNAM; 3.4 Conclusion; References; Chapter 4 - A Digraph Model for Risk Identification and Management in SCADA Systems; 4.1 Introduction; 4.2 Background; 4.3 A Digraph Model of SCADA Systems; 4.4 Conclusions; References; Chapter 5 - High-Level Architecture and Design of a Decision Engine for Marine Safety and Security1; 5.1 Introduction; 5.2 Background; 5.3 Conceptual Design; 5.4 Formal Representation; 5.5 Application; 5.6 Conclusions and Future Work; Acknowledgments , ReferencesChapter 6 - Criminal Identity Resolution Using Personal and Social Identity Attributes: A Collective Resolution Approach; 6.1 Introduction; 6.2 Related Work; 6.3 A Collective Identity Resolution Approach; 6.4 Experiments; 6.5 Concluding Remarks; References; Chapter 7 - Al Qaeda Terrorist Financing; 7.1 Importance of Cutting Terrorist Financing; 7.2 Description of Al Qaeda's Financial Network; 7.3 History and Development of Al Qaeda and its Financial Network; 7.4 Organizational Structure: Control Over Finances Within Al Qaeda; 7.5 Al Qaeda's Portfolio and Sources of "Revenues" , 7.6 Methods of Transferring and Storing FundsReferences; Chapter 8 - Study on Covert Networks of Terrorists Based on Interactive Relationship Hypothesis; 8.1 Introduction; 8.2 Relevant Works; 8.3 Initial Network Construction; 8.4 Network Refinement Based on Interaction Relation Hypothesis; 8.5 Relationship Network Refinement and Final Relationship Network of Terrorist Organizations and Incidents; 8.6 Analysis and Verification; 8.7 Conclusions; Acknowledgments; References; Chapter 9 - Incorporating Data and Methodologies for Knowledge Discovery for Crime; 9.1 Introduction , 9.2 Steps Involved in Crime Investigation9.3 Data Sources for Crime Data Mining and Investigation; 9.4 The Four Types of Knowledge Discovery; 9.5 Knowledge Discovery Methodologies for Crime Data; 9.6 Methodologies Applied to Knowledge Discovery Types; 9.7 Conclusion; References; Index , English
    Additional Edition: ISBN 0-12-404702-5
    Language: English
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. Further information can be found on the KOBV privacy pages