Skip to main content
  • Conference proceedings
  • © 2012

Intelligence and Security Informatics

Pacific Asia Workshop, PAISI 2012, Kuala Lumpur, Malaysia, May 29, 2012, Proceedings

  • Up-to-date results
  • Fast track conference proceedings
  • State-of-the-art report

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 7299)

Part of the book sub series: Security and Cryptology (LNSC)

Conference series link(s): PAISI: Pacific-Asia Workshop on Intelligence and Security Informatics

Conference proceedings info: PAISI 2012.

Buy it now

Buying options

eBook USD 54.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 69.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (17 papers)

  1. Front Matter

  2. Keynote Paper

    1. Cloud-Centric Assured Information Sharing

      • Bhavani Thuraisingham, Vaibhav Khadilkar, Jyothsna Rachapalli, Tyrone Cadenhead, Murat Kantarcioglu, Kevin Hamlen et al.
      Pages 1-26
  3. Terrorism Informatics and Crime Analysis

    1. Illicit Activities and Terrorism in Cyberspace: An Exploratory Study in the Southeast Asian Region

      • Zahri Yunos, Rabiah Ahmad, Syahrir Mat Ali, Solahuddin Shamsuddin
      Pages 27-35
    2. CybercrimeIR – A Technological Perspective to Fight Cybercrime

      • Weiping Chang, Yungchang Ku, Sinru Wu, Chaochang Chiu
      Pages 36-44
  4. Social Media

    1. Information Credibility on Twitter in Emergency Situation

      • Xin Xia, Xiaohu Yang, Chao Wu, Shanping Li, Linfeng Bao
      Pages 45-59
    2. Multi-Layer Network for Influence Propagation over Microblog

      • Chao Li, Jun Luo, Joshua Zhexue Huang, Jianping Fan
      Pages 60-72
    3. A Hybrid System for Online Detection of Emotional Distress

      • Tim M. H. Li, Michael Chau, Paul W. C. Wong, Paul S. F. Yip
      Pages 73-80
  5. Intrusion Detection

    1. Securing Advanced Metering Infrastructure Using Intrusion Detection System with Data Stream Mining

      • Mustafa Amir Faisal, Zeyar Aung, John R. Williams, Abel Sanchez
      Pages 96-111
  6. Data and Text Mining

    1. A Universal Toolkit for Cryptographically Secure Privacy-Preserving Data Mining

      • Dan Bogdanov, Roman Jagomägis, Sven Laur
      Pages 112-126
    2. Identifying Walk Cycles for Human Recognition

      • Jakub Valcik, Jan Sedmidubsky, Michal Balazia, Pavel Zezula
      Pages 127-135
    3. Chinese Organization Name Recognition Based on Multiple Features

      • Yajuan Ling, Jing Yang, Liang He
      Pages 136-144
    4. A Plagiarism Detection System for Arabic Text-Based Documents

      • Ameera Jadalla, Ashraf Elnagar
      Pages 145-153
    5. Examining Text Categorization Methods for Incidents Analysis

      • Nurfadhlina Mohd Sharef, Khairul Azhar Kasmiran
      Pages 154-161
  7. Information Access and Security

    1. Multi-Committer Threshold Commitment Scheme from Lattice

      • Weiwei Sun, Bo Yang, Qiong Huang, Sha Ma, Ximing Li
      Pages 162-175
    2. A Simultaneous Members Enrollment and Revocation Protocol for Secret Sharing Schemes

      • Jia Yu, Shuguang Wang, Huawei Zhao, Minglei Shu, Jialiang Lv, Qiang Guo
      Pages 190-197
    3. SaaS-Driven Botnets

      • Biao Jiang, Eul Gyu Im, Yunmo Koo
      Pages 198-206
  8. Back Matter

Other Volumes

  1. Intelligence and Security Informatics

About this book

This book constitutes the refereed proceedings of the Pacific Asia Workshop on Intelligence and Security Informatics, PAISI 2012, held in Kuala Lumpur, Malaysia, in May 2012 - held in conjunction with the Pacific Asia Conference on Knowledge Discovery and Data Mining (PAKDD 2012). The 8 revised full papers and the 8 revised short papers presented together with 1 keynote lecture were carefully reviewed and selected from numerous submissions. The papers are organized in topical sections on terrorism informatics and crime analysis, social media, intrusion detection, data and text mining, as well as information access and security.

Editors and Affiliations

  • The University of Hong Kong, Pokfulam, Hong Kong

    Michael Chau

  • Virginia Tech, Blacksburg, USA

    G. Alan Wang

  • City University of Hong Kong, Hong Kong

    Wei Thoo Yue

  • Artificial Intelligence Lab, University of Arizona, Tucson, USA

    Hsinchun Chen

Bibliographic Information

Buy it now

Buying options

eBook USD 54.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 69.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access