Information Retrieval and Event Detection | |
Chinese Word Segmentation for Terrorism-Related Contents | p. 1 |
A Term Association Inference Model for Single Documents: A Stepping Stone for Investigation through Information Extraction | p. 14 |
Internet Security and Cybercrime | |
Method for Evaluating the Security Risk of a Website Against Phishing Attacks | p. 21 |
CyberIR - A Technological Approach to Fight Cybercrime | p. 32 |
Currency and Data Protection | |
The Banknote Anti-forgery System Based on Digital Signature Algorithms | p. 44 |
Sequence Matching for Suspicious Activity Detection in Anti-Money Laundering | p. 50 |
Data Protection in Memory Using Byte Reordering | p. 62 |
Cryptography | |
Highly Efficient Password-Based Three-Party Key Exchange in Random Oracle Model | p. 69 |
A Pairwise Key Pre-distribution Scheme for Wireless Sensor Network | p. 77 |
Image and Video Analysis | |
Attacks on SVD-Based Watermarking Schemes | p. 83 |
Trigger Based Security Alarming Scheme for Moving Objects on Road Networks | p. 92 |
Reducing False Alarm of Video-Based Smoke Detection by Support Vector Machine | p. 102 |
Privacy Issues | |
Privacy-Preserving Collaborative Social Networks | p. 114 |
Efficient Secret Authenticatable Anonymous Signcryption Scheme with Identity Privacy | p. 126 |
How to Publicly Verifiably Expand a Member without Changing Old Shares in a Secret Sharing Scheme | p. 138 |
Social Networks | |
Comparing Two Models for Terrorist Group Detection: GDM or OGDM? | p. 149 |
Applying Case-Based Reasoning and Expert Systems to Coastal Patrol Crime Investigation in Taiwan | p. 161 |
Modeling and Visualization | |
Integrating Data Sources and Network Analysis Tools to Support the Fight Against Organized Crime | p. 171 |
Visual Analytics for Supporting Entity Relationship Discovery on Text Data | p. 183 |
Network Intrusion Detection | |
Feature Weighting and Selection for a Real-Time Network Intrusion Detection System Based on GA with KNN | p. 195 |
Locality-Based Server Profiling for Intrusion Detection | p. 205 |
Forensic Information Management | |
A Simple WordNet-Ontology Based Email Retrieval System for Digital Forensics | p. 217 |
Preservation of Evidence in Case of Online Gaming Crime | p. 229 |
Dataset Analysis of Proxy Logs Detecting to Curb Propagations in Network Attacks | p. 245 |
Identifying Chinese E-Mail Documents' Authorship for the Purpose of Computer Forensic | p. 251 |
Forensic Technologies | |
A Collaborative Forensics Framework for VoIP Services in Multi-network Environments | p. 260 |
Wireless Forensic: A New Radio Frequency Based Locating System | p. 272 |
Applying Public-Key Watermarking Techniques in Forensic Imaging to Preserve the Authenticity of the Evidence | p. 278 |
Forensic Principles and Tools | |
Computer Forensics and Culture | p. 288 |
E-Commerce Security: The Categorical Role of Computers in Forensic Online Crime | p. 298 |
Forensic Artifacts of Microsoft Windows Vista System | p. 304 |
Social Web and Social Information Management | |
How Useful Are Tags? - An Empirical Analysis of Collaborative Tagging for Web Page Recommendation | p. 320 |
A Generative Model for Statistical Determination of Information Content from Conversation Threads | p. 331 |
Using "Cited by" Information to Find the Context of Research Papers | p. 343 |
Online Communities: A Social Computing Perspective | p. 355 |
User-Centered Interface Design of Social Websites | p. 366 |
Discovering Trends in Collaborative Tagging Systems | p. 377 |
Socio-contextual Filters for Discovering Similar Knowledge-Gathering Tasks in Generic Information Systems | p. 384 |
Exploring Social Dynamics in Online Bookmarking Systems | p. 390 |
Social Networks and Agent-Based Modeling | |
Dispositional Factors in the Use of Social Networking Sites: Findings and Implications for Social Computing Research | p. 392 |
Agent-Based Social Simulation and Modeling in Social Computing | p. 401 |
Transforming Raw-Email Data into Social-Network Information | p. 413 |
Using Social Networks to Organize Researcher Community | p. 421 |
Online Gaming Perpetrators Model | p. 428 |
Proposal for a Multiagent Architecture for Self-Organizing Systems (MA-SOS) | p. 434 |
Social Opinions, E-Commerce, Security and Privacy Considerations | |
Applying Text Mining to Assist People Who Inquire HIV/AIDS Information from Internet | p. 440 |
Polarity Classification of Public Health Opinions in Chinese | p. 449 |
Parallel Crawling and Capturing for On-Line Auction | p. 455 |
A New Credit Card Payment Scheme Using Mobile Phones Based on Visual Cryptography | p. 467 |
Detecting Hidden Hierarchy in Terrorist Networks: Some Case Studies | p. 477 |
Keyphrase Extraction from Chinese News Web Pages Based on Semantic Relations | p. 490 |
Automatic Recognition of News Web Pages | p. 496 |
Understanding Users' Attitudes Towards Using a VoIP Survey | p. 502 |
Privacy-Preserving Collaborative E-Voting | p. 508 |
Privacy-Aware Access Control through Negotiation in Daily Life Service | p. 514 |
Author Index | p. 521 |
Table of Contents provided by Blackwell. All Rights Reserved. |