Intelligence and security informatics (ISI) is concerned with the study of the development and use of advanced information technologies and systems for national, international, and societal security-related applications. The annual IEEE International Conference series on ISI was started in 2003 and the first four meetings were held in the United States. In 2006, the Workshop on ISI (http://isi. se. cuhk. edu. hk/2006/) was held in Singapore in conjunction with the Pacific Asia Conference on Knowledge Discovery and Data Mining, with over 100 contributors and participants from all over the world. These past ISI conferences have brought together academic researchers, law enforcement and intelligence experts, information technology consultants, and practitioners to discuss their research and practice related to various ISI topics including ISI data management, data and text mining for ISI applications, terrorism informatics, deception and intent detection, terrorist and criminal social network analysis, public health and bio-security, crime analysis, cyber-infrastructure protection, transportation infrastructure security, policy studies and evaluation, and information assurance, among others. We continued this stream of ISI conferences by organizing the 2007 Pacific Asia Workshop on ISI (PAISI 2007) to especially provide a stimulating forum for ISI researchers in Pacific Asia and other regions of the world to exchange ideas and report research progress. PAISI 2007 was hosted by the Chinese Academy of Sciences, the University of Arizona, and the Chinese University of Hong Kong.
Kuiyu Chang & Michael Chau
Intelligence and Security Informatics [PDF ebook]
Pacific Asia Workshop, PAISI 2007, Chengdu, China, April 11-12, 2007, Proceedings
Intelligence and Security Informatics [PDF ebook]
Pacific Asia Workshop, PAISI 2007, Chengdu, China, April 11-12, 2007, Proceedings
购买此电子书可免费获赠一本!
语言 英语 ● 格式 PDF ● ISBN 9783540715498 ● 编辑 Kuiyu Chang & Michael Chau ● 出版者 Springer Berlin Heidelberg ● 发布时间 2007 ● 下载 6 时 ● 货币 EUR ● ID 6319966 ● 复制保护 Adobe DRM
需要具备DRM功能的电子书阅读器