Intelligence and security informatics: 11th Pacific Asia Workshop, PAISI 2016, Auckland, New Zealand, April 19, 2016 : proceedings
Gespeichert in:
Internformat
MARC
LEADER | 00000nam a2200000zcb4500 | ||
---|---|---|---|
001 | BV043503916 | ||
003 | DE-604 | ||
005 | 20170407 | ||
007 | cr|uuu---uuuuu | ||
008 | 160411s2016 xx a||| o|||| 10||| eng d | ||
020 | |a 9783319318639 |c Online |9 978-3-319-31863-9 | ||
020 | |a 9783319318622 |c Print |9 978-3-319-31862-2 | ||
024 | 7 | |a 10.1007/978-3-319-31863-9 |2 doi | |
035 | |a (ZDB-2-SCS)978-3-319-31863-9 | ||
035 | |a (ZDB-2-LNC)978-3-319-31863-9 | ||
035 | |a (OCoLC)949956393 | ||
035 | |a (DE-599)BVBBV043503916 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-355 |a DE-706 |a DE-91 |a DE-19 |a DE-Aug4 |a DE-898 |a DE-861 |a DE-859 |a DE-473 |a DE-29 |a DE-20 |a DE-92 |a DE-384 |a DE-573 |a DE-M347 |a DE-703 |a DE-739 |a DE-634 |a DE-523 | ||
082 | 0 | |a 005.8 |2 23 | |
084 | |a DAT 460f |2 stub | ||
084 | |a DAT 055f |2 stub | ||
084 | |a DAT 000 |2 stub | ||
084 | |a MED 730f |2 stub | ||
111 | 2 | |a PAISI |n 11. |d 2016 |c Auckland |j Verfasser |0 (DE-588)1097230562 |4 aut | |
245 | 1 | 0 | |a Intelligence and security informatics |b 11th Pacific Asia Workshop, PAISI 2016, Auckland, New Zealand, April 19, 2016 : proceedings |c edited by Michael Chau, G. Alan Wang, Hsinchun Chen |
264 | 1 | |a [Cham] |b Springer |c [2016] | |
264 | 4 | |c © 2016 | |
300 | |a 1 Online-Ressource XII, 203 Seiten |b Illustrationen, Diagramme | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
490 | 1 | |a Lecture Notes in Computer Science |v Volume 9650 |x 0302-9743 | |
650 | 4 | |a Computer science | |
650 | 4 | |a Computer security | |
650 | 4 | |a Data mining | |
650 | 4 | |a Information storage and retrieval | |
650 | 4 | |a Artificial intelligence | |
650 | 4 | |a Computers and civilization | |
650 | 4 | |a Computer Science | |
650 | 4 | |a Systems and Data Security | |
650 | 4 | |a Information Storage and Retrieval | |
650 | 4 | |a Data Mining and Knowledge Discovery | |
650 | 4 | |a Computers and Society | |
650 | 4 | |a Information Systems Applications (incl. Internet) | |
650 | 4 | |a Artificial Intelligence (incl. Robotics) | |
650 | 4 | |a Informatik | |
650 | 4 | |a Künstliche Intelligenz | |
650 | 0 | 7 | |a Soft Computing |0 (DE-588)4455833-8 |2 gnd |9 rswk-swf |
655 | 7 | |0 (DE-588)1071861417 |a Konferenzschrift |2 gnd-content | |
655 | 7 | |0 (DE-588)1071861417 |a Konferenzschrift |y 19.04.2016 |z Auckland |2 gnd-content | |
689 | 0 | 0 | |a Soft Computing |0 (DE-588)4455833-8 |D s |
689 | 0 | |5 DE-604 | |
700 | 1 | |a Chau, Michael |0 (DE-588)138455058 |4 edt | |
830 | 0 | |a Lecture Notes in Computer Science |v 9650 |w (DE-604)BV014880109 |9 9650 | |
856 | 4 | 0 | |u https://doi.org/10.1007/978-3-319-31863-9 |x Verlag |z URL des Erstveröffentlichers |3 Volltext |
856 | 4 | 2 | |m Springer Fremddatenuebernahme |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028920261&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
856 | 4 | 2 | |m Springer Fremddatenuebernahme |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028920261&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA |3 Abstract |
912 | |a ZDB-2-SCS | ||
912 | |a ZDB-2-LNC | ||
940 | 1 | |q ZDB-2-SCS_2016 | |
943 | 1 | |a oai:aleph.bib-bvb.de:BVB01-028920261 | |
966 | e | |l BTU01 |u https://doi.org/10.1007/978-3-319-31863-9 |p ZDB-2-LNC |q ZDB-2-LNC-2016 |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-31863-9 |l DE-Aug4 |p ZDB-2-LNC |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-31863-9 |l DE-573 |p ZDB-2-LNC |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-31863-9 |l DE-M347 |p ZDB-2-LNC |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-31863-9 |l DE-92 |p ZDB-2-LNC |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-31863-9 |l DE-898 |p ZDB-2-LNC |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-31863-9 |l DE-859 |p ZDB-2-LNC |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-31863-9 |l DE-861 |p ZDB-2-LNC |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-31863-9 |l DE-523 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-31863-9 |l DE-91 |p ZDB-2-LNC |q ZDB-2-LNC_2016 |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-31863-9 |l DE-384 |p ZDB-2-LNC |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-31863-9 |l DE-473 |p ZDB-2-LNC |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-31863-9 |l DE-19 |p ZDB-2-LNC |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-31863-9 |l DE-355 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-31863-9 |l DE-703 |p ZDB-2-LNC |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-31863-9 |l DE-20 |p ZDB-2-LNC |x Verlag |3 Volltext | |
966 | e | |l UBY01 |u https://doi.org/10.1007/978-3-319-31863-9 |p ZDB-2-LNC |q ZDB-2-LNC-2016 |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-31863-9 |l DE-29 |p ZDB-2-LNC |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-31863-9 |l DE-739 |p ZDB-2-LNC |x Verlag |3 Volltext |
Datensatz im Suchindex
DE-BY-TUM_katkey | 2190230 |
---|---|
_version_ | 1821932453561892864 |
adam_text | INTELLIGENCE AND SECURITY INFORMATICS
/
: 2016
TABLE OF CONTENTS / INHALTSVERZEICHNIS
THE USE OF REFERENCE GRAPHS IN THE ENTITY RESOLUTION OF CRIMINAL
NETWORKS
HETEROGENEOUS INFORMATION NETWORKS BI-CLUSTERING WITH SIMILARITY
REGULARIZATION
A PROFILE-BASED AUTHORSHIP ATTRIBUTION APPROACH TO FORENSIC
IDENTIFICATION IN CHINESE ONLINE MESSAGES
MULTILEVEL SYNTACTIC PARSING BASED ON RECURSIVE RESTRICTED BOLTZMANN
MACHINES AND LEARNING TO RANK
STRATIFIED OVER-SAMPLING BAGGING METHOD FOR RANDOM FORESTS ON IMBALANCED
DATA
REVISITING ATTRIBUTE INDEPENDENCE ASSUMPTION IN PROBABILISTIC
UNSUPERVISED ANOMALY DETECTION
INCREMENTAL PRIVACY-PRESERVING ASSOCIATION RULE MINING USING NEGATIVE
BORDER
DIFFERENTIALLY PRIVATE MULTI-TASK LEARNING
INTELLIGENT RECOGNITION OF SPONTANEOUS EXPRESSION USING MOTION
MAGNIFICATION OF SPATIO-TEMPORAL DATA
CYBER SECURITY AND INFRASTRUCTURE PROTECTION K-NN CLASSIFICATION OF
MALWARE IN HTTPS TRAFFIC USING THE METRIC SPACE APPROACH
A SYNTACTIC APPROACH FOR DETECTING VIRAL POLYMORPHIC MALWARE VARIANTS
SMALL STATE ACQUISITION OF OFFENSIVE CYBER WARFARE CAPABILITIES: TOWARDS
BUILDING AN ANALYTICAL FRAMEWORK
DATA-DRIVEN STEALTHY INJECTION ATTACKS ON SMART GRID WITH INCOMPLETE
MEASUREMENTS
INFORMATION SECURITY IN SOFTWARE ENGINEERING, ANALYSIS OF DEVELOPERS
COMMUNICATIONS ABOUT SECURITY IN SOCIAL Q&A WEBSITE
DIESES SCHRIFTSTUECK WURDE MASCHINELL ERZEUGT.
INTELLIGENCE AND SECURITY INFORMATICS
/
: 2016
ABSTRACT / INHALTSTEXT
THIS BOOK CONSTITUTES THE REFEREED PROCEEDINGS OF THE 11TH PACIFIC ASIA
WORKSHOP ON INTELLIGENCE AND SECURITY INFORMATICS, PAISI 2016, HELD IN
AUCKLAND, NEW ZEALAND, IN APRIL 2016 IN CONJUNCTION WITH PAKDD 2016, THE
20TH PACIFIC-ASIA CONFERENCE ON KNOWLEDGE DISCOVERY AND DATA MINING. THE
7 REVISED FULL PAPERS PRESENTED TOGETHER WITH 7 SHORT PAPERS WERE
CAREFULLY REVIEWED AND SELECTED FROM 23 SUBMISSIONS. THE PAPERS COVER
NETWORK-BASED DATA ANALYTICS, DATA AND TEXT MINING, AND CYBER SECURITY
AND INFRASTRUCTURE PROTECTION
DIESES SCHRIFTSTUECK WURDE MASCHINELL ERZEUGT.
|
any_adam_object | 1 |
author2 | Chau, Michael |
author2_role | edt |
author2_variant | m c mc |
author_GND | (DE-588)138455058 |
author_corporate | PAISI Auckland |
author_corporate_role | aut |
author_facet | Chau, Michael PAISI Auckland |
author_sort | PAISI Auckland |
building | Verbundindex |
bvnumber | BV043503916 |
classification_tum | DAT 460f DAT 055f DAT 000 MED 730f |
collection | ZDB-2-SCS ZDB-2-LNC |
ctrlnum | (ZDB-2-SCS)978-3-319-31863-9 (ZDB-2-LNC)978-3-319-31863-9 (OCoLC)949956393 (DE-599)BVBBV043503916 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik Medizin |
doi_str_mv | 10.1007/978-3-319-31863-9 |
format | Electronic Conference Proceeding eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>05112nam a2200949zcb4500</leader><controlfield tag="001">BV043503916</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20170407 </controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">160411s2016 xx a||| o|||| 10||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783319318639</subfield><subfield code="c">Online</subfield><subfield code="9">978-3-319-31863-9</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783319318622</subfield><subfield code="c">Print</subfield><subfield code="9">978-3-319-31862-2</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1007/978-3-319-31863-9</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-2-SCS)978-3-319-31863-9</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-2-LNC)978-3-319-31863-9</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)949956393</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV043503916</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-355</subfield><subfield code="a">DE-706</subfield><subfield code="a">DE-91</subfield><subfield code="a">DE-19</subfield><subfield code="a">DE-Aug4</subfield><subfield code="a">DE-898</subfield><subfield code="a">DE-861</subfield><subfield code="a">DE-859</subfield><subfield code="a">DE-473</subfield><subfield code="a">DE-29</subfield><subfield code="a">DE-20</subfield><subfield code="a">DE-92</subfield><subfield code="a">DE-384</subfield><subfield code="a">DE-573</subfield><subfield code="a">DE-M347</subfield><subfield code="a">DE-703</subfield><subfield code="a">DE-739</subfield><subfield code="a">DE-634</subfield><subfield code="a">DE-523</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 460f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 055f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 000</subfield><subfield code="2">stub</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">MED 730f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="111" ind1="2" ind2=" "><subfield code="a">PAISI</subfield><subfield code="n">11.</subfield><subfield code="d">2016</subfield><subfield code="c">Auckland</subfield><subfield code="j">Verfasser</subfield><subfield code="0">(DE-588)1097230562</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Intelligence and security informatics</subfield><subfield code="b">11th Pacific Asia Workshop, PAISI 2016, Auckland, New Zealand, April 19, 2016 : proceedings</subfield><subfield code="c">edited by Michael Chau, G. Alan Wang, Hsinchun Chen</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">[Cham]</subfield><subfield code="b">Springer</subfield><subfield code="c">[2016]</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">© 2016</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource XII, 203 Seiten</subfield><subfield code="b">Illustrationen, Diagramme</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">Lecture Notes in Computer Science</subfield><subfield code="v">Volume 9650</subfield><subfield code="x">0302-9743</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer science</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data mining</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Information storage and retrieval</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Artificial intelligence</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computers and civilization</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer Science</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Systems and Data Security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Information Storage and Retrieval</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data Mining and Knowledge Discovery</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computers and Society</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Information Systems Applications (incl. Internet)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Artificial Intelligence (incl. Robotics)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Informatik</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Künstliche Intelligenz</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Soft Computing</subfield><subfield code="0">(DE-588)4455833-8</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)1071861417</subfield><subfield code="a">Konferenzschrift</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)1071861417</subfield><subfield code="a">Konferenzschrift</subfield><subfield code="y">19.04.2016</subfield><subfield code="z">Auckland</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Soft Computing</subfield><subfield code="0">(DE-588)4455833-8</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Chau, Michael</subfield><subfield code="0">(DE-588)138455058</subfield><subfield code="4">edt</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">Lecture Notes in Computer Science</subfield><subfield code="v">9650</subfield><subfield code="w">(DE-604)BV014880109</subfield><subfield code="9">9650</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1007/978-3-319-31863-9</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Erstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Springer Fremddatenuebernahme</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028920261&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Springer Fremddatenuebernahme</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028920261&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Abstract</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-2-SCS</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-2-LNC</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">ZDB-2-SCS_2016</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-028920261</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="l">BTU01</subfield><subfield code="u">https://doi.org/10.1007/978-3-319-31863-9</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="q">ZDB-2-LNC-2016</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-31863-9</subfield><subfield code="l">DE-Aug4</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-31863-9</subfield><subfield code="l">DE-573</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-31863-9</subfield><subfield code="l">DE-M347</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-31863-9</subfield><subfield code="l">DE-92</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-31863-9</subfield><subfield code="l">DE-898</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-31863-9</subfield><subfield code="l">DE-859</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-31863-9</subfield><subfield code="l">DE-861</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-31863-9</subfield><subfield code="l">DE-523</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-31863-9</subfield><subfield code="l">DE-91</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="q">ZDB-2-LNC_2016</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-31863-9</subfield><subfield code="l">DE-384</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-31863-9</subfield><subfield code="l">DE-473</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-31863-9</subfield><subfield code="l">DE-19</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-31863-9</subfield><subfield code="l">DE-355</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-31863-9</subfield><subfield code="l">DE-703</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-31863-9</subfield><subfield code="l">DE-20</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="l">UBY01</subfield><subfield code="u">https://doi.org/10.1007/978-3-319-31863-9</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="q">ZDB-2-LNC-2016</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-31863-9</subfield><subfield code="l">DE-29</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-31863-9</subfield><subfield code="l">DE-739</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
genre | (DE-588)1071861417 Konferenzschrift gnd-content (DE-588)1071861417 Konferenzschrift 19.04.2016 Auckland gnd-content |
genre_facet | Konferenzschrift Konferenzschrift 19.04.2016 Auckland |
id | DE-604.BV043503916 |
illustrated | Illustrated |
indexdate | 2024-12-20T17:38:05Z |
institution | BVB |
institution_GND | (DE-588)1097230562 |
isbn | 9783319318639 9783319318622 |
issn | 0302-9743 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-028920261 |
oclc_num | 949956393 |
open_access_boolean | |
owner | DE-355 DE-BY-UBR DE-706 DE-91 DE-BY-TUM DE-19 DE-BY-UBM DE-Aug4 DE-898 DE-BY-UBR DE-861 DE-859 DE-473 DE-BY-UBG DE-29 DE-20 DE-92 DE-384 DE-573 DE-M347 DE-703 DE-739 DE-634 DE-523 |
owner_facet | DE-355 DE-BY-UBR DE-706 DE-91 DE-BY-TUM DE-19 DE-BY-UBM DE-Aug4 DE-898 DE-BY-UBR DE-861 DE-859 DE-473 DE-BY-UBG DE-29 DE-20 DE-92 DE-384 DE-573 DE-M347 DE-703 DE-739 DE-634 DE-523 |
physical | 1 Online-Ressource XII, 203 Seiten Illustrationen, Diagramme |
psigel | ZDB-2-SCS ZDB-2-LNC ZDB-2-SCS_2016 ZDB-2-LNC ZDB-2-LNC-2016 ZDB-2-LNC ZDB-2-LNC_2016 |
publishDate | 2016 |
publishDateSearch | 2016 |
publishDateSort | 2016 |
publisher | Springer |
record_format | marc |
series | Lecture Notes in Computer Science |
series2 | Lecture Notes in Computer Science |
spellingShingle | Intelligence and security informatics 11th Pacific Asia Workshop, PAISI 2016, Auckland, New Zealand, April 19, 2016 : proceedings Lecture Notes in Computer Science Computer science Computer security Data mining Information storage and retrieval Artificial intelligence Computers and civilization Computer Science Systems and Data Security Information Storage and Retrieval Data Mining and Knowledge Discovery Computers and Society Information Systems Applications (incl. Internet) Artificial Intelligence (incl. Robotics) Informatik Künstliche Intelligenz Soft Computing (DE-588)4455833-8 gnd |
subject_GND | (DE-588)4455833-8 (DE-588)1071861417 |
title | Intelligence and security informatics 11th Pacific Asia Workshop, PAISI 2016, Auckland, New Zealand, April 19, 2016 : proceedings |
title_auth | Intelligence and security informatics 11th Pacific Asia Workshop, PAISI 2016, Auckland, New Zealand, April 19, 2016 : proceedings |
title_exact_search | Intelligence and security informatics 11th Pacific Asia Workshop, PAISI 2016, Auckland, New Zealand, April 19, 2016 : proceedings |
title_full | Intelligence and security informatics 11th Pacific Asia Workshop, PAISI 2016, Auckland, New Zealand, April 19, 2016 : proceedings edited by Michael Chau, G. Alan Wang, Hsinchun Chen |
title_fullStr | Intelligence and security informatics 11th Pacific Asia Workshop, PAISI 2016, Auckland, New Zealand, April 19, 2016 : proceedings edited by Michael Chau, G. Alan Wang, Hsinchun Chen |
title_full_unstemmed | Intelligence and security informatics 11th Pacific Asia Workshop, PAISI 2016, Auckland, New Zealand, April 19, 2016 : proceedings edited by Michael Chau, G. Alan Wang, Hsinchun Chen |
title_short | Intelligence and security informatics |
title_sort | intelligence and security informatics 11th pacific asia workshop paisi 2016 auckland new zealand april 19 2016 proceedings |
title_sub | 11th Pacific Asia Workshop, PAISI 2016, Auckland, New Zealand, April 19, 2016 : proceedings |
topic | Computer science Computer security Data mining Information storage and retrieval Artificial intelligence Computers and civilization Computer Science Systems and Data Security Information Storage and Retrieval Data Mining and Knowledge Discovery Computers and Society Information Systems Applications (incl. Internet) Artificial Intelligence (incl. Robotics) Informatik Künstliche Intelligenz Soft Computing (DE-588)4455833-8 gnd |
topic_facet | Computer science Computer security Data mining Information storage and retrieval Artificial intelligence Computers and civilization Computer Science Systems and Data Security Information Storage and Retrieval Data Mining and Knowledge Discovery Computers and Society Information Systems Applications (incl. Internet) Artificial Intelligence (incl. Robotics) Informatik Künstliche Intelligenz Soft Computing Konferenzschrift Konferenzschrift 19.04.2016 Auckland |
url | https://doi.org/10.1007/978-3-319-31863-9 http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028920261&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028920261&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA |
volume_link | (DE-604)BV014880109 |
work_keys_str_mv | AT paisiauckland intelligenceandsecurityinformatics11thpacificasiaworkshoppaisi2016aucklandnewzealandapril192016proceedings AT chaumichael intelligenceandsecurityinformatics11thpacificasiaworkshoppaisi2016aucklandnewzealandapril192016proceedings |