000727122 000__ 03539cam\a2200529Ii\4500 000727122 001__ 727122 000727122 005__ 20230306140801.0 000727122 006__ m\\\\\o\\d\\\\\\\\ 000727122 007__ cr\cn\nnnunnun 000727122 008__ 150515s2015\\\\sz\a\\\\o\\\\\100\0\eng\d 000727122 020__ $$a9783319184555$$qelectronic book 000727122 020__ $$a3319184555$$qelectronic book 000727122 020__ $$z9783319184548 000727122 0247_ $$a10.1007/978-3-319-18455-5$$2doi 000727122 035__ $$aSP(OCoLC)ocn909023729 000727122 035__ $$aSP(OCoLC)909023729 000727122 040__ $$aGW5XE$$beng$$erda$$epn$$cGW5XE$$dOCLCO$$dYDXCP$$dNUI$$dVLB 000727122 049__ $$aISEA 000727122 050_4 $$aQA76.9.A25$$bP35 2015eb 000727122 08204 $$a005.8$$223 000727122 1112_ $$aPAISI (Workshop)$$n(2015 :$$cHo Chi Minh City, Vietnam) 000727122 24510 $$aIntelligence and security informatics$$h[electronic resource] :$$bPacific Asia Workshop, PAISI 2015, Ho Chi Minh City, Vietnam, May 19, 2015. Proceedings /$$cMichael Chau, G. Alan Wang, Hsinchun Chen (eds.). 000727122 2463_ $$aPAISI 2015 000727122 264_1 $$aCham :$$bSpringer,$$c2015. 000727122 300__ $$a1 online resource (viii, 113 pages) :$$billustrations. 000727122 336__ $$atext$$btxt$$2rdacontent 000727122 337__ $$acomputer$$bc$$2rdamedia 000727122 338__ $$aonline resource$$bcr$$2rdacarrier 000727122 4901_ $$aLecture notes in computer science,$$x0302-9743 ;$$v9074 000727122 4901_ $$aLNCS sublibrary. SL 4, Security and cryptology 000727122 500__ $$aInternational conference proceedings. 000727122 5050_ $$aMedia Revealr: A Social Multimedia Monitoring and Intelligence System for Web Multimedia Verification -- Geotagging Social Media Content with a Refined Language Modelling Approach -- Predicting Vehicle Recalls with User-Generated Contents: A Text Mining Approach -- GCM: A Greedy-based Cross-Matching Algorithm for Identifying Users across Multiple Online Social Networks -- P2P Lending Fraud Detection: A Big Data Approach -- Drug Anti-forgery and Tracing System Based on Lightweight Asymmetric Identities -- Chinese Word POS Tagging with Markov Logic -- In Search of Plagiarism Behaviors: An Empirical Study of Online Reviews. 000727122 506__ $$aAccess limited to authorized users. 000727122 520__ $$aThis book constitutes the refereed proceedings of the Pacific Asia Workshop on Intelligence and Security Informatics, PAISI 2015, held in Ho Chi Minh City, Vietnam, in May 2015 in conjunction with PAKDD 2015, the 19th Pacific-Asia Conference on Knowledge Discovery and Data Mining. The 8 revised full papers presented were carefully reviewed and selected from numerous submissions. Topics of the workshop are information sharing and big data analytics, infrastructure protection and emergency responses, cybercrime and terrorism informatics and analytics, as well as enterprise risk management, IS security, and social media analytics. The papers present a significant view on regional data sets and case studies, including online social media and multimedia, fraud deception, and text mining. 000727122 588__ $$aOnline resource; title from PDF title page (SpringerLink, viewed May 15, 2015). 000727122 650_0 $$aComputer security$$vCongresses. 000727122 650_0 $$aData encryption (Computer science)$$vCongresses. 000727122 650_0 $$aInternet$$xSecurity measures$$vCongresses. 000727122 7001_ $$aChau, Michael,$$eeditor. 000727122 7001_ $$aWang, G. Alan,$$eeditor. 000727122 7001_ $$aChen, Hsinchun,$$eeditor. 000727122 830_0 $$aLecture notes in computer science ;$$v9074. 000727122 830_0 $$aLNCS sublibrary.$$nSL 4,$$pSecurity and cryptology. 000727122 852__ $$bebk 000727122 85640 $$3SpringerLink$$uhttps://univsouthin.idm.oclc.org/login?url=http://link.springer.com/10.1007/978-3-319-18455-5$$zOnline Access$$91397441.1 000727122 909CO $$ooai:library.usi.edu:727122$$pGLOBAL_SET 000727122 980__ $$aEBOOK 000727122 980__ $$aBIB 000727122 982__ $$aEbook 000727122 983__ $$aOnline 000727122 994__ $$a92$$bISE