標(biāo)題: Titlebook: Intelligence and Security Informatics; European Conference, Daniel Ortiz-Arroyo,Henrik Legind Larsen,Gerhard W Conference proceedings 2008 [打印本頁(yè)] 作者: 根深蒂固 時(shí)間: 2025-3-21 19:22
書(shū)目名稱Intelligence and Security Informatics影響因子(影響力)
書(shū)目名稱Intelligence and Security Informatics影響因子(影響力)學(xué)科排名
書(shū)目名稱Intelligence and Security Informatics網(wǎng)絡(luò)公開(kāi)度
書(shū)目名稱Intelligence and Security Informatics網(wǎng)絡(luò)公開(kāi)度學(xué)科排名
書(shū)目名稱Intelligence and Security Informatics被引頻次
書(shū)目名稱Intelligence and Security Informatics被引頻次學(xué)科排名
書(shū)目名稱Intelligence and Security Informatics年度引用
書(shū)目名稱Intelligence and Security Informatics年度引用學(xué)科排名
書(shū)目名稱Intelligence and Security Informatics讀者反饋
書(shū)目名稱Intelligence and Security Informatics讀者反饋學(xué)科排名
作者: 指耕作 時(shí)間: 2025-3-21 22:24
978-3-540-89899-3Springer-Verlag Berlin Heidelberg 2008作者: 表臉 時(shí)間: 2025-3-22 03:34
Intelligence and Security Informatics978-3-540-89900-6Series ISSN 0302-9743 Series E-ISSN 1611-3349 作者: Loathe 時(shí)間: 2025-3-22 05:01
An Information Theory Approach to Identify Sets of Key Playerst we use to analyze the structural properties of a social network. Then, we propose a new method aimed at finding a set of key players that solves the . and . problems. Our preliminary experimental results indicate that the entropy measures can be used effectively to identify a set of key players in a social network.作者: Derogate 時(shí)間: 2025-3-22 09:09
Computational Modeling of Criminal Activityvel ideas and tools for crime investigations as well as experimental platforms for decision support in evidence-based policy making. We present here a comprehensive computational framework for modeling of criminal behavior to facilitate systematic experimental studies of a wide range of criminal activities in urban environments.作者: Distribution 時(shí)間: 2025-3-22 13:45
https://doi.org/10.1007/978-3-540-89900-6DRM; access control; audio watermarking; biometrics; classification; clustering; collaborative computing; c作者: FAZE 時(shí)間: 2025-3-22 17:50
t zu sein. Wer das ?fters n?tig hat, kann einem leid tun.“ Da? sie aber auch für mittlere Unternehmungen auf dem Marsche war, beweist der Erfolg, mit dem die Treuhand AG, K?ln, das Schema einer Kurzfristigen Erfolgsrechnung für mittlere Maschinenfabriken auf der K?lner Werkbundausstellung im Jahre 1作者: Phenothiazines 時(shí)間: 2025-3-22 22:09 作者: Mumble 時(shí)間: 2025-3-23 03:53 作者: 感情脆弱 時(shí)間: 2025-3-23 08:20 作者: acetylcholine 時(shí)間: 2025-3-23 10:25
Bon Syechtern. Immerhin aber werden diese Erhebungen nicht weit von der Wahrheit entfernt sein, und trotz der bekannten ?Gef?hrlichkeit“ der Statistik wird man die warnende Stimme nicht überh?ren dürfen: Je l?nger der Schulbesuch, desto mehr Gefahr für den K?rper.作者: grounded 時(shí)間: 2025-3-23 14:20 作者: Medley 時(shí)間: 2025-3-23 19:48 作者: Sarcoma 時(shí)間: 2025-3-23 23:32
Daniel Ortiz-Arroyo,Henrik Legind Larsen,Gerhard W作者: antiquated 時(shí)間: 2025-3-24 06:23
Intelligent Social Network Modeling and Analysis for Security Informatics both formal network models and the paradigm of computing with words are built upon set based technologies. More specifically, the formal representation of a social network is in terms a mathematical set object called a relationship and computing with words uses a set object, fuzzy subsets, to forma作者: Lipoprotein 時(shí)間: 2025-3-24 07:26 作者: 手段 時(shí)間: 2025-3-24 12:26
SPYWatch, Overcoming Linguistic Barriers in Information ManagementSINT that provides deep semantic search and information access to large quantities of distributed multimedia. SPYWatch provides with a language independent search and dynamic classification features for a broad range of data collected from several sources in a number of culturally diverse languages.作者: 鎮(zhèn)壓 時(shí)間: 2025-3-24 17:36
Dissecting the Meaning of an Encrypted Message: An Approach to Discovering the Goals of an Adversaryern the goals of an intruder, we need to understand what an agent is attempting to achieve by sending a given message. In the context of cryptographic protocols, it is particularly important to understand what an agent is attempting to achieve by encrypting a specific message with a specific key. In作者: ARCH 時(shí)間: 2025-3-24 21:52
Conference proceedings 2008g, Denmark, in December 2008. The 23 revised full papers and 2 revised poster papers presented were carefully reviewed and selected from 48 submissions. The papers are organized in topical sections on criminal and social network analysis, intelligence analysis and knowledge discovery, Web-based inte作者: humectant 時(shí)間: 2025-3-24 23:21
Access Control of Federated Information Systemsl autonomy of systems does not allow to create a global integrated security schema. To solve such problems we propose to use the intelligent agents that can assist in a process of real-time access by defined and undefined users to the data stored in different systems, subsystems or applications of federated information systems.作者: 旁觀者 時(shí)間: 2025-3-25 03:22
Designing Information Systems Which Manage or Avoid Privacy IncidentsAPI Framework (Manage or Avoid Privacy Incidents), which designs IS to manage or avoid privacy incidents. The MAPI Framework can also be used for evaluating IS by identifying the missing or inappropriate technologies which may lead to privacy incidents.作者: 表臉 時(shí)間: 2025-3-25 07:38 作者: Immortal 時(shí)間: 2025-3-25 15:29 作者: 背書(shū) 時(shí)間: 2025-3-25 19:29 作者: justify 時(shí)間: 2025-3-25 23:03
Nuclear Threat Detection Via the Nuclear Web and Dark Web: Framework and Preliminary Studylso identify potential extremist or terrorist groups from our Dark Web testbed who might pose WMD threats to the US and the international community. Selected knowledge mapping and focused web crawling techniques and findings from a preliminary study are presented in this paper.作者: cortisol 時(shí)間: 2025-3-26 00:28 作者: Mendicant 時(shí)間: 2025-3-26 07:33 作者: 疾馳 時(shí)間: 2025-3-26 10:10 作者: MOCK 時(shí)間: 2025-3-26 13:28
Jihadi Video and Auto-radicalisation: Evidence from an Exploratory YouTube Studyto support the potential for online radicalisation is presented. Findings relating to newly formed virtual relationships involving a YouTube user with no apparent prior links to jihadists are discussed.作者: 溫順 時(shí)間: 2025-3-26 18:09 作者: jovial 時(shí)間: 2025-3-26 23:58
A Distributed Framework for the Detection of New Worm-Related Malwaretial malware. These propagation graphs are compared to known malware propagation characteristics in order to determine whether the potential malware is indeed a malware. All the agents are notified with a final decision in order to start the containment process. The new framework was evaluated and the results are promising.作者: 不開(kāi)心 時(shí)間: 2025-3-27 01:52 作者: 加強(qiáng)防衛(wèi) 時(shí)間: 2025-3-27 08:27 作者: 使虛弱 時(shí)間: 2025-3-27 10:15
Digital Audio Watermarking for Copyright Protection Based on Multiwavelet Transformuptions. The embedding technique is based on quantization process which does not require the original audio signal in the watermark extraction. The experimental results show that the proposed scheme yields the watermark audio signal with high quality and the watermark survives to most of the attacks which were included in this study.作者: Needlework 時(shí)間: 2025-3-27 14:58 作者: 誰(shuí)在削木頭 時(shí)間: 2025-3-27 18:23
rst damals begann das bis dahin schwache Interesse für sie in den Unternehmungen zu wachsen. Zwar soll schon w?hrend der Periode der Stockung in den 80er Jahren des vorigen Jahrhunderts das Bedürfnis nach kurzfristigen Erfolgsrechnungen wach geworden sein, und es ist bekannt, da? vor dem ersten Krie作者: 不要不誠(chéng)實(shí) 時(shí)間: 2025-3-27 21:56 作者: nullify 時(shí)間: 2025-3-28 02:41 作者: 強(qiáng)壯 時(shí)間: 2025-3-28 07:42
Aaron Hunterwischen Aufsauger und L?sungspumpe geschalteter Sammler dient zum Ausgleich der unvermeidlichen Schwankungen Die Abkühlung der vom Austreiber kommenden schwachen L?sung im Temperaturwechsler wird durch einen Nachkühler erg?nzt. Damit die D?mpfe mit m?glichst niedrigem Wassergehalt zum Verflüssiger u作者: predict 時(shí)間: 2025-3-28 11:35
Bon Sydarunter Schwiening (Schulbesuch und Milit?rtauglichkeit) die Dauer der Schulzeit und die k?rperliche Minderwertigkeit als parallel laufend bezeichneten. Je kürzer die Schulzeit, umso h?her war die Milit?rtauglichkeit. Dazu kommt, da? auch gro?e statistische Erhebungen dargetan haben, da? jene Schul作者: 范圍廣 時(shí)間: 2025-3-28 15:18
Intelligent Social Network Modeling and Analysis for Security Informaticsn of social network modeling by introducing ideas from fuzzy sets and related granular computing technologies. We approach this extension in a number of ways. One is with the introduction of fuzzy graphs representing the networks. This allows a generalization of the types of connection between nodes作者: ACME 時(shí)間: 2025-3-28 20:39 作者: Entirety 時(shí)間: 2025-3-29 00:23 作者: Blood-Vessels 時(shí)間: 2025-3-29 04:00 作者: 現(xiàn)存 時(shí)間: 2025-3-29 10:45 作者: Commonplace 時(shí)間: 2025-3-29 13:28
Locating Key Actors in Social Networks Using Bayes’ Posterior Probability Frameworkeir successful use. However, modeling of covert, terrorist or criminal networks through social graph dose not really provide the hierarchical structure of such networks because these networks are composed of leaders and followers. It is possible mathematically, for some graphs to estimate the probab作者: 打折 時(shí)間: 2025-3-29 15:43
Computational Modeling of Criminal Activityvel ideas and tools for crime investigations as well as experimental platforms for decision support in evidence-based policy making. We present here a comprehensive computational framework for modeling of criminal behavior to facilitate systematic experimental studies of a wide range of criminal act作者: Bravura 時(shí)間: 2025-3-29 20:44
SPYWatch, Overcoming Linguistic Barriers in Information Managementluable. Up to 80% of electronic data is textual and most valuable information is often encoded in pages which are neither structured, nor classified. The process of accessing all these raw data, heterogeneous for language used, and transforming them into information is therefore inextricably linked 作者: CAPE 時(shí)間: 2025-3-30 02:36
Dissecting the Meaning of an Encrypted Message: An Approach to Discovering the Goals of an Adversaryuld be exchanged to achieve communicative goals. There has been a great deal of literature on the formal verification of cryptographic protocols, where the emphasis is on finding attacks that compromise the security of a given protocol. However, in the context of intelligence analysis, simply determ作者: Tartar 時(shí)間: 2025-3-30 06:55 作者: sperse 時(shí)間: 2025-3-30 10:19
Nuclear Threat Detection Via the Nuclear Web and Dark Web: Framework and Preliminary Studyhe intelligence collection, analytical techniques and instrumentation used in determining the origin, capability, intent, and transit route of nuclear materials by selected hostile countries and (terrorist) groups. We propose a research framework that aims to investigate the Capability, Accessibilit作者: 對(duì)手 時(shí)間: 2025-3-30 13:15
Mapping Dark Web Geolocationearch design and case study that aim to identify the geolocation of the countries, cities, and ISPs that host selected international Jihadist web sites. We provide an overview of key relevant Internet functionality and architecture and present techniques for exploiting networking technologies for lo作者: AV-node 時(shí)間: 2025-3-30 17:53
Jihadi Video and Auto-radicalisation: Evidence from an Exploratory YouTube Studyloration of the support base for political violence. This exploratory study analyses the online supporters of jihad-promoting video content on YouTube, focusing on those posting and commenting upon martyr-promoting material from Iraq. Findings suggest that a majority are under 35 years of age and re作者: MINT 時(shí)間: 2025-3-31 00:22
Access Control of Federated Information Systemsed information systems. The assurance of access data security realized in federated information systems with loose connection among local data sources is hard to achieve mainly for two reasons: local data sources are heterogeneous (i.e. data, models, access security models, semantics, etc.) and loca作者: 煤渣 時(shí)間: 2025-3-31 04:46 作者: 粗語(yǔ) 時(shí)間: 2025-3-31 05:43 作者: 裝飾 時(shí)間: 2025-3-31 10:14 作者: ESPY 時(shí)間: 2025-3-31 17:06 作者: 無(wú)所不知 時(shí)間: 2025-3-31 19:54 作者: 受人支配 時(shí)間: 2025-3-31 21:56
M. Roseiro,J. Henriques,S. Paredes,J. Sousa,L. Gon?alvess of the quality of architectural heritage research has so far been neglected. Therefore this paper would discuss how are significant complex architectural heritage research and the position and competencies of researchers for further heritage maintenance works. This research will raise the question作者: WITH 時(shí)間: 2025-4-1 05:53 作者: 把手 時(shí)間: 2025-4-1 08:50
ry. It is a carefully collected, documented and executed work of the evolution of the Charnley low-frictional torque arthroplasty of the hip based on sound principles, supported by long-term studies with benefits derived..978-3-319-79335-1978-3-319-21320-0作者: 鍍金 時(shí)間: 2025-4-1 14:09
Assessing the Threat of Major Outbreaks of Vector-Borne Diseases Under a Changing Climatepresent results from a collaboration that was set up following Michael’s untimely death in October 2018, between climate scientists (Jim Hurrell and Lantao Sun) and mathematical epidemiologists (Robin Thompson and Uri Obolski). Specifically, we propose a framework for studying the effect of climate 作者: Urologist 時(shí)間: 2025-4-1 17:21 作者: 逢迎春日 時(shí)間: 2025-4-1 22:30
Performance Evaluation of Check-By-Voting for Colluding Attack in Volunteer Computing Systems, In this paper, we propose a colluding attack model, and conduct a detailed study for two major voting-based methods (i.e., .-first voting and check-by-voting) through a Monte Carlo simulation to reveal the sabotage-tolerance performance against colluding attacks. Our model introduces a colluding pr