Intelligence and Security Informatics
Intelligence and Security Informatics
11th Pacific Asia Workshop. PAISI 2016, Auckland, New Zealand, April 19, 2016, Proceedings
Chen, Hsinchun; Wang, G. Alan; Chau, Michael
Springer International Publishing AG
03/2016
203
Mole
Inglês
9783319318622
15 a 20 dias
3343
of Criminal Networks.- Heterogeneous Information Networks Bi-clustering with
Similarity Regularization.- A Profile-Based Authorship Attribution Approach to
Forensic Identification in Chinese Online Messages.- Multilevel Syntactic
Parsing Based on Recursive Restricted Boltzmann Machines and Learning to Rank.-
Stratified Over-sampling Bagging Method for Random Forests on Imbalanced Data.-
Revisiting Attribute Independence Assumption in Probabilistic Unsupervised
Anomaly Detection.- Incremental Privacy-Preserving Association Rule Mining
Using Negative Border.- Differentially Private Multi-task Learning.- Intelligent
Recognition of Spontaneous Expression Using Motion Magnification of
Spatio-Temporal Data.- Cyber security and Infrastructure Protection k-NN Classification
of Malware in HTTPS Traffic Using the Metric Space Approach.- A Syntactic
Approach for Detecting Viral Polymorphic Malware Variants.- Small State
Acquisition of Offensive Cyber warfare Capabilities: Towards Building an
Analytical Framework.- Data-Driven Stealthy Injection Attacks on Smart Grid
with Incomplete Measurements.- Information Security in Software Engineering,
Analysis of Developers Communications about Security in Social Q&A Website.
of Criminal Networks.- Heterogeneous Information Networks Bi-clustering with
Similarity Regularization.- A Profile-Based Authorship Attribution Approach to
Forensic Identification in Chinese Online Messages.- Multilevel Syntactic
Parsing Based on Recursive Restricted Boltzmann Machines and Learning to Rank.-
Stratified Over-sampling Bagging Method for Random Forests on Imbalanced Data.-
Revisiting Attribute Independence Assumption in Probabilistic Unsupervised
Anomaly Detection.- Incremental Privacy-Preserving Association Rule Mining
Using Negative Border.- Differentially Private Multi-task Learning.- Intelligent
Recognition of Spontaneous Expression Using Motion Magnification of
Spatio-Temporal Data.- Cyber security and Infrastructure Protection k-NN Classification
of Malware in HTTPS Traffic Using the Metric Space Approach.- A Syntactic
Approach for Detecting Viral Polymorphic Malware Variants.- Small State
Acquisition of Offensive Cyber warfare Capabilities: Towards Building an
Analytical Framework.- Data-Driven Stealthy Injection Attacks on Smart Grid
with Incomplete Measurements.- Information Security in Software Engineering,
Analysis of Developers Communications about Security in Social Q&A Website.