• Contact

  • Newsletter

  • About us

  • Delivery options

  • Prospero Book Market Podcast

  • Intelligence and Security Informatics: Pacific Asia Workshop, PAISI 2010, Hyderabad, India, June 21, 2010 Proceedings

    Intelligence and Security Informatics by Chen, Hsinchun; Chau, Michael; Li, Shu-Hsing;

    Pacific Asia Workshop, PAISI 2010, Hyderabad, India, June 21, 2010 Proceedings

    Series: Lecture Notes in Computer Science; 6122;

      • GET 20% OFF

      • The discount is only available for 'Alert of Favourite Topics' newsletter recipients.
      • Publisher's listprice EUR 53.49
      • The price is estimated because at the time of ordering we do not know what conversion rates will apply to HUF / product currency when the book arrives. In case HUF is weaker, the price increases slightly, in case HUF is stronger, the price goes lower slightly.

        22 184 Ft (21 128 Ft + 5% VAT)
      • Discount 20% (cc. 4 437 Ft off)
      • Discounted price 17 748 Ft (16 902 Ft + 5% VAT)

    22 184 Ft

    db

    Availability

    Estimated delivery time: In stock at the publisher, but not at Prospero's office. Delivery time approx. 3-5 weeks.
    Not in stock at Prospero.

    Why don't you give exact delivery time?

    Delivery time is estimated on our previous experiences. We give estimations only, because we order from outside Hungary, and the delivery time mainly depends on how quickly the publisher supplies the book. Faster or slower deliveries both happen, but we do our best to supply as quickly as possible.

    Table of Contents:

    Terrorism Informatics and Crime Analysis.- Combined Detection Model for Criminal Network Detection.- An Association Model for Implicit Crime Link Analysis.- Design and Deployment of a National Detecting Stolen Vehicles Network System.- Fighting Cybercrime: A KM Perspective.- Transportation Infrastructure Security.- Trajectory Similarity of Network Constrained Moving Objects and Applications to Traffic Security.- An Emergent Traffic Messaging Service Using Wireless Technology.- Information Access and Security.- A Model for Detecting “Global Footprint Anomalies” in a Grid Environment.- Secure Anonymous Routing for MANETs Using Distributed Dynamic Random Path Selection.- MAD-IDS: Novel Intrusion Detection System Using Mobile Agents and Data Mining Approaches.- Data Encryption.- Fuzzy Biometric Signcryption Scheme with Bilinear Pairings in the Standard Model.- Key Independent Decryption of Graphically Encrypted Images.- Towards Confidentiality of ID-Based Signcryption Schemes under without Random Oracle Model.- JPEG Steganalysis Using HBCL Statistics and FR Index.- Data and Text Mining.- Text Mining Technique for Chinese Written Judgment of Criminal Case.- Exploration of Document Relation Quality with Consideration of Term Representation Basis, Term Weighting and Association Measure.- Identifying Controversial Issues and Their Sub-topics in News Articles.- Efficient Privacy Preserving K-Means Clustering.- A Fuzzy Threshold Based Modified Clustering Algorithm for Natural Data Exploration.

    More
    Recently viewed
    previous
    20% %discount
    Intelligence and Security Informatics: Pacific Asia Workshop, PAISI 2010, Hyderabad, India, June 21, 2010 Proceedings

    Multiple Regression in Practice

    Berry, William D.; Feldman, Stanley;

    17 671 HUF

    14 137 HUF

    20% %discount
    Intelligence and Security Informatics: Pacific Asia Workshop, PAISI 2010, Hyderabad, India, June 21, 2010 Proceedings

    Models in Statics for Engineers

    Vlase, Sorin; Marin, Marin; Öchsner, Andreas; Scutaru, Maria Luminita

    44 374 HUF

    35 499 HUF

    next