000712065 000__ 04651cam\a2200505Ii\4500 000712065 001__ 712065 000712065 005__ 20230306140225.0 000712065 006__ m\\\\\o\\d\\\\\\\\ 000712065 007__ cr\cn\nnnunnun 000712065 008__ 141112s2014\\\\sz\a\\\\o\\\\\101\0\eng\d 000712065 020__ $$a9783319127781$$qelectronic book 000712065 020__ $$a3319127780$$qelectronic book 000712065 020__ $$z9783319127774 000712065 0247_ $$a10.1007/978-3-319-12778-1$$2doi 000712065 035__ $$aSP(OCoLC)ocn895051091 000712065 040__ $$aGW5XE$$beng$$erda$$epn$$cGW5XE$$dYDXCP$$dUPM 000712065 049__ $$aISEA 000712065 050_4 $$aQA76.9.A25 000712065 08204 $$a005.8$$223 000712065 1112_ $$aInternational Conference on Future Data and Security Engineering$$n(1st :$$d2014 :$$cHo Chi Minh City, Vietnam) 000712065 24510 $$aFuture data and security engineering$$h[electronic resource] :$$bfirst International Conference, FDSE 2014, Ho Chi Minh City, Vietnam, November 19-21, 2014, Proceedings /$$cTran Khanh Dang, Roland Wagner, Erich Neuhold, Makoto Takizawa, Josef Küng, Nam Thoai (eds.). 000712065 2463_ $$aFDSE 2014 000712065 264_1 $$aCham :$$bSpringer,$$c2014. 000712065 300__ $$a1 online resource (xvi, 312 pages) :$$billustrations. 000712065 336__ $$atext$$btxt$$2rdacontent 000712065 337__ $$acomputer$$bc$$2rdamedia 000712065 338__ $$aonline resource$$bcr$$2rdacarrier 000712065 4901_ $$aLecture Notes in Computer Science,$$x0302-9743 ;$$v8860 000712065 4901_ $$aLNCS sublibrary. SL 3, Information systems and application, incl. Internet/Web and HCI 000712065 500__ $$aInternational conference proceedings. 000712065 500__ $$aIncludes author index. 000712065 5050_ $$aOn Context- and Sequence-Aware Document Enrichment and Retrieval towards Personalized Recommendations -- Forests of Oblique Decision Stumps for Classifying Very Large Number of Tweets -- Performance Evaluation of a Natural Language Processing Approach Applied in White Collar Crime Investigation -- An Efficient Similarity Search in Large Data Collections with MapReduce -- Memory-Based Multi-pattern Signature Scanning for ClamAV Antivirus -- Constructing Private Indexes on Encrypted Data for Outsourced Databases -- An Extensible Framework for Web Application Vulnerabilities Visualization and Analysis -- A Combination of Negative Selection Algorithm and Artificial Immune Network for Virus Detection -- De-anonymising Set-Generalised Transactions Based on Semantic Relationships -- An Implementation of a Unified Security, Trust and Privacy (STP) Framework for Future Integrated RFID System -- Toward a Nexus Model Supporting the Establishment of Business Process Crowdsourcing -- Link Prediction in Social Networks Based on Local Weighted Paths -- An Architecture Utilizing the Crowd for Building an Anti-virus Knowledge Base -- Two-Way Biometrics-Based Authentication Scheme on Mobile Devices -- Prospective Cryptography in NFC with the Lightweight Block Encryption Algorithm LEA -- Enhance Fuzzy Vault Security Using Nonrandom Chaff Point Generator -- Smart Card Based User Authentication Scheme with Anonymity -- Cloud-Based ERP Solution for Modern Education in Vietnam -- Heuristics for Energy-Aware VM Allocation in HPC Clouds -- Information-Flow Analysis of Hibernate Query Language -- Investigation of Regularization Theory for Four-Class Classification in Brain-Computer Interface -- Enhancing Genetic Algorithm with Cumulative Probabilities to Derive Critical Test Scenarios from Use-Cases -- Towards a Semantic Linked Data Retrieval Model. 000712065 506__ $$aAccess limited to authorized users. 000712065 520__ $$aThis book constitutes the refereed proceedings of the First International Conference on Future Data and Security Engineering, FDSE 2014, held in Ho Chi Minh City, Vietnam, in November 2014. The 23 full papers presented were carefully reviewed and selected from 66 submissions. They have been organized in the following topical sections: big data analytics and applications; security and privacy engineering; crowdsourcing and social network data analytics; biometrics and data protection in smart devices; cloud data management and applications; and advances in query processing and optimization. 000712065 588__ $$aOnline resource; title from PDF title page (SpringerLink, viewed November 12, 2014). 000712065 650_0 $$aComputer security$$vCongresses. 000712065 650_0 $$aData encryption (Computer science)$$vCongresses. 000712065 650_0 $$aData mining$$vCongresses. 000712065 7001_ $$aDang, Tran Khanh,$$eeditor. 000712065 830_0 $$aLecture notes in computer science ;$$v8860. 000712065 830_0 $$aLNCS sublibrary.$$nSL 3,$$pInformation systems and applications, incl. Internet/Web, and HCI. 000712065 85280 $$bebk$$hSpringerLink 000712065 85640 $$3SpringerLink$$uhttps://univsouthin.idm.oclc.org/login?url=http://dx.doi.org/10.1007/978-3-319-12778-1$$zOnline Access 000712065 909CO $$ooai:library.usi.edu:712065$$pGLOBAL_SET 000712065 980__ $$aEBOOK 000712065 980__ $$aBIB 000712065 982__ $$aEbook 000712065 983__ $$aOnline 000712065 994__ $$a92$$bISE