Hsinchun Chen (auth.), Christopher C. Yang, Daniel Zeng, Michael Chau, Kuiyu Chang, Qing Yang, Xueqi Cheng, Jue Wang, Fei-Yue Wang, Hsinchun Chen (eds.)3540715487, 9783540715481
Table of contents :
Front Matter….Pages –
Exploring Extremism and Terrorism on the Web: The Dark Web Project….Pages 1-20
Analyzing and Visualizing Gray Web Forum Structure….Pages 21-33
An Empirical Analysis of Online Gaming Crime Characteristics from 2002 to 2004….Pages 34-45
Detecting Cyber Security Threats in Weblogs Using Probabilistic Models….Pages 46-57
What-if Emergency Management System: A Generalized Voronoi Diagram Approach….Pages 58-69
Agent Based Framework for Emergency Rescue and Assistance Planning….Pages 70-81
Object Tracking with Self-updating Tracking Window….Pages 82-93
A Case-Based Evolutionary Group Decision Support Method for Emergency Response….Pages 94-104
Lightweight Anomaly Intrusion Detection in Wireless Sensor Networks….Pages 105-116
ASITL: Adaptive Secure Interoperation Using Trust-Level….Pages 117-128
A RT0-Based Compliance Checker Model for Automated Trust Negotiation….Pages 129-140
TCM-KNN Algorithm for Supervised Network Intrusion Detection….Pages 141-151
Research on Hidden Markov Model for System Call Anomaly Detection….Pages 152-159
Towards Identifying True Threat from Network Security Data….Pages 160-171
Security Assessment for Application Network Services Using Fault Injection….Pages 172-183
A Secure Data Transmission Protocol for Mobile Ad Hoc Networks….Pages 184-195
Defending DDoS Attacks Using Hidden Markov Models and Cooperative Reinforcement Learning….Pages 196-207
A Novel Relational Database Watermarking Algorithm….Pages 208-219
Anticipatory Event Detection for Bursty Events….Pages 220-225
Community Detection in Scale-Free Networks Based on Hypergraph Model….Pages 226-231
The Treelike Assembly Classifier for Pedestrian Detection….Pages 232-237
A Proposed Data Mining Approach for Internet Auction Fraud Detection….Pages 238-243
Trends in Computer Crime and Cybercrime Research During the Period 1974-2006: A Bibliometric Approach….Pages 244-250
The Study of Government Website Information Disclosure in Taiwan….Pages 251-256
Informed Recognition in Software Watermarking….Pages 257-261
An Inference Control Algorithm for RDF(S) Repository….Pages 262-268
PPIDS: Privacy Preserving Intrusion Detection System….Pages 269-274
Evaluating the Disaster Defense Ability of Information Systems….Pages 275-281
Airline Safety Evaluation Based on Fuzzy TOPSIS….Pages 282-287
A Framework for Proving the Security of Data Transmission Protocols in Sensor Network….Pages 288-294
Port and Address Hopping for Active Cyber-Defense….Pages 295-300
A Hybrid Model for Worm Simulations in a Large Network….Pages 301-306
A Web Portal for Terrorism Activities in China….Pages 307-308
An Overview of Telemarketing Fraud Problems and Countermeasures in Taiwan….Pages 309-310
Mining the Core Member of Terrorist Crime Group Based on Social Network Analysis….Pages 311-313
Providing Personalized Services for HWME System by Item-Based Collaborative Filtering….Pages 314-315
An Intelligent Agent-Oriented System for Integrating Network Security Devices and Handling Large Amount of Security Events….Pages 316-317
Link Analysis-Based Detection of Anomalous Communication Patterns….Pages 318-320
Social Modeling and Reasoning for Security Informatics….Pages 321-322
Detecting Botnets by Analyzing DNS Traffic….Pages 323-324
HMM-Based Approach for Evaluating Risk Propagation….Pages 325-326
A Symptom-Based Taxonomy for an Early Detection of Network Attacks….Pages 327-328
Back Matter….Pages –
Reviews
There are no reviews yet.