Intelligence and Security Informatics (Record no. 254628)

MARC details
000 -LEADER
fixed length control field 05252nam a22006135i 4500
001 - CONTROL NUMBER
control field 978-3-540-69209-6
003 - CONTROL NUMBER IDENTIFIER
control field DE-He213
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20160614140204.0
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION
fixed length control field cr nn 008mamaa
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 100301s2008 gw | s |||| 0|eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9783540692096
-- 978-3-540-69209-6
024 7# - OTHER STANDARD IDENTIFIER
Standard number or code 10.1007/978-3-540-69209-6
Source of number or code doi
049 ## - LOCAL HOLDINGS (OCLC)
Holding library Alfaisal Main Library
050 #4 - LIBRARY OF CONGRESS CALL NUMBER
Classification number TA329-348
050 #4 - LIBRARY OF CONGRESS CALL NUMBER
Classification number TA640-643
072 #7 - SUBJECT CATEGORY CODE
Subject category code TBJ
Source bicssc
072 #7 - SUBJECT CATEGORY CODE
Subject category code MAT003000
Source bisacsh
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 519
Edition number 23
245 10 - TITLE STATEMENT
Title Intelligence and Security Informatics
Medium [electronic resource] :
Remainder of title Techniques and Applications /
Statement of responsibility, etc edited by Hsinchun Chen, Christopher C. Yang.
264 #1 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE STATEMENTS
Place of production, publication, distribution, manufacture Berlin, Heidelberg :
Name of producer, publisher, distributor, manufacturer Springer Berlin Heidelberg,
Date of production, publication, distribution, manufacture 2008.
300 ## - PHYSICAL DESCRIPTION
Extent XIII, 460 p.
Other physical details online resource.
336 ## - CONTENT TYPE
Content Type Term text
Content Type Code txt
Source rdacontent
337 ## - MEDIA TYPE
Media Type Term computer
Media Type Code c
Source rdamedia
338 ## - CARRIER TYPE
Carrier Type Term online resource
Carrier Type Code cr
Source rdacarrier
347 ## -
-- text file
-- PDF
-- rda
490 1# - SERIES STATEMENT
Series statement Studies in Computational Intelligence,
International Standard Serial Number 1860-949X ;
Volume number/sequential designation 135
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note Terrorism Informatics and Data Mining -- Assured Information Sharing: Technologies, Challenges and Directions -- Automating Event Extraction for the Security Domain -- Knowledge Discovery and Information Visualization for Terrorist Social Networks -- Understanding the Nexus of Terrorist Web Sites -- Multi-lingual Detection of Web Terrorist Content -- Modeling Anticipatory Event Transitions -- Exploring Gray Web Forums: Analysis and Investigation of Forum-Based Communities in Taiwan -- Intelligence and Crime Analysis -- Identifying Interesting Networks of Criminal Activity -- Name Matching in Law Enforcement Database -- Discovering Investigation Clues through Mining Criminal Databases -- Automated Filtering on Data Streaming for Intelligence Analysis -- Personal Information Management for Intelligence Tasks -- A Data Miner’s Approach to Country Corruption Analysis -- Access Control, Infrastructure Protection and Privacy -- Protecting Private Information in Online Social Networks -- Protection of Database Security Via Collaborative Inference Detection -- Suspect Vehicle Identification for Border Safety -- Optimization Problems for Port-of-Entry Detection Systems -- Modeling and Validation of Aviation Security -- Surveillance and Emergency Response -- Anomaly Detection in Moving Object -- Intelligent Face Recognition -- Video Analysis of Vehicles and Persons for Surveillance -- Video-Based Deception Detection.
520 ## - SUMMARY, ETC.
Summary, etc Intelligence and Security Informatics (ISI) has become an important research field after the tragic event of September 11, 2001. Researchers in computer and information science have a unique opportunity (and obligation) to contribute to international security via advanced IT research. A series of conferences on ISI has been organized in US since 2003, in Pacific Asia since 2006, and in Europe since 2008. More details about this series of conferences can be found at http://www.isiconference.org/. These activities have brought together researchers, practitioners, and policy-makers to support counterterrorism and homeland security mission. This book, INTELLIGENCE and SECURITY INFORMATICS: TECHNIQUES & APPLICATIONS, presents a collection of works discussing terrorism informatics, information sharing, data mining, intelligence and crime analysis, infrastructure protection, privacy protection, information surveillance, and emergency response. The authors come from nine different countries and contribute a total of twenty-two chapters of advanced and high-impact ISI research. The audiences of this book include: (1) public and private sector practitioners in the national/international and homeland security area; (2) consultants and contractors engaging in on-going relationships with federal, state, local, and international agencies on projects related to national security; (3) graduate level students in computer science, information science, public policy, information security, criminology, and terrorism study; and (4) researchers engaging in security informatics, homeland security, information policy, knowledge management, public policy, and counterterrorism research.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Engineering.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Information technology.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Business
General subdivision Data processing.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Data encryption (Computer science).
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Artificial intelligence.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element E-commerce.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Applied mathematics.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Engineering mathematics.
650 14 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Engineering.
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Appl.Mathematics/Computational Methods of Engineering.
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Data Encryption.
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Artificial Intelligence (incl. Robotics).
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element e-Commerce/e-business.
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element IT in Business.
655 #7 - INDEX TERM--GENRE/FORM
Genre/form data or focus term Electronic books.
Source of term local
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Chen, Hsinchun.
Relator term editor.
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Yang, Christopher C.
Relator term editor.
710 2# - ADDED ENTRY--CORPORATE NAME
Corporate name or jurisdiction name as entry element SpringerLink (Online service)
773 0# - HOST ITEM ENTRY
Title Springer eBooks
776 08 - ADDITIONAL PHYSICAL FORM ENTRY
Display text Printed edition:
International Standard Book Number 9783540692072
830 #0 - SERIES ADDED ENTRY--UNIFORM TITLE
Uniform title Studies in Computational Intelligence,
-- 1860-949X ;
Volume number/sequential designation 135
856 40 - ELECTRONIC LOCATION AND ACCESS
Uniform Resource Identifier <a href="http://ezproxy.alfaisal.edu/login?url=http://dx.doi.org/10.1007/978-3-540-69209-6">http://ezproxy.alfaisal.edu/login?url=http://dx.doi.org/10.1007/978-3-540-69209-6</a>
912 ## -
-- ZDB-2-ENG
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Source of classification or shelving scheme Library of Congress Classification
Koha item type eBooks

No items available.

Copyright © 2020 Alfaisal University Library. All Rights Reserved.
Tel: +966 11 2158948 Fax: +966 11 2157910 Email:
librarian@alfaisal.edu