| Information Retrieval and Event Detection | |
| Chinese Word Segmentation for Terrorism-Related Contents | p. 1 |
| A Term Association Inference Model for Single Documents: A Stepping Stone for Investigation through Information Extraction | p. 14 |
| Internet Security and Cybercrime | |
| Method for Evaluating the Security Risk of a Website Against Phishing Attacks | p. 21 |
| CyberIR - A Technological Approach to Fight Cybercrime | p. 32 |
| Currency and Data Protection | |
| The Banknote Anti-forgery System Based on Digital Signature Algorithms | p. 44 |
| Sequence Matching for Suspicious Activity Detection in Anti-Money Laundering | p. 50 |
| Data Protection in Memory Using Byte Reordering | p. 62 |
| Cryptography | |
| Highly Efficient Password-Based Three-Party Key Exchange in Random Oracle Model | p. 69 |
| A Pairwise Key Pre-distribution Scheme for Wireless Sensor Network | p. 77 |
| Image and Video Analysis | |
| Attacks on SVD-Based Watermarking Schemes | p. 83 |
| Trigger Based Security Alarming Scheme for Moving Objects on Road Networks | p. 92 |
| Reducing False Alarm of Video-Based Smoke Detection by Support Vector Machine | p. 102 |
| Privacy Issues | |
| Privacy-Preserving Collaborative Social Networks | p. 114 |
| Efficient Secret Authenticatable Anonymous Signcryption Scheme with Identity Privacy | p. 126 |
| How to Publicly Verifiably Expand a Member without Changing Old Shares in a Secret Sharing Scheme | p. 138 |
| Social Networks | |
| Comparing Two Models for Terrorist Group Detection: GDM or OGDM? | p. 149 |
| Applying Case-Based Reasoning and Expert Systems to Coastal Patrol Crime Investigation in Taiwan | p. 161 |
| Modeling and Visualization | |
| Integrating Data Sources and Network Analysis Tools to Support the Fight Against Organized Crime | p. 171 |
| Visual Analytics for Supporting Entity Relationship Discovery on Text Data | p. 183 |
| Network Intrusion Detection | |
| Feature Weighting and Selection for a Real-Time Network Intrusion Detection System Based on GA with KNN | p. 195 |
| Locality-Based Server Profiling for Intrusion Detection | p. 205 |
| Forensic Information Management | |
| A Simple WordNet-Ontology Based Email Retrieval System for Digital Forensics | p. 217 |
| Preservation of Evidence in Case of Online Gaming Crime | p. 229 |
| Dataset Analysis of Proxy Logs Detecting to Curb Propagations in Network Attacks | p. 245 |
| Identifying Chinese E-Mail Documents' Authorship for the Purpose of Computer Forensic | p. 251 |
| Forensic Technologies | |
| A Collaborative Forensics Framework for VoIP Services in Multi-network Environments | p. 260 |
| Wireless Forensic: A New Radio Frequency Based Locating System | p. 272 |
| Applying Public-Key Watermarking Techniques in Forensic Imaging to Preserve the Authenticity of the Evidence | p. 278 |
| Forensic Principles and Tools | |
| Computer Forensics and Culture | p. 288 |
| E-Commerce Security: The Categorical Role of Computers in Forensic Online Crime | p. 298 |
| Forensic Artifacts of Microsoft Windows Vista System | p. 304 |
| Social Web and Social Information Management | |
| How Useful Are Tags? - An Empirical Analysis of Collaborative Tagging for Web Page Recommendation | p. 320 |
| A Generative Model for Statistical Determination of Information Content from Conversation Threads | p. 331 |
| Using "Cited by" Information to Find the Context of Research Papers | p. 343 |
| Online Communities: A Social Computing Perspective | p. 355 |
| User-Centered Interface Design of Social Websites | p. 366 |
| Discovering Trends in Collaborative Tagging Systems | p. 377 |
| Socio-contextual Filters for Discovering Similar Knowledge-Gathering Tasks in Generic Information Systems | p. 384 |
| Exploring Social Dynamics in Online Bookmarking Systems | p. 390 |
| Social Networks and Agent-Based Modeling | |
| Dispositional Factors in the Use of Social Networking Sites: Findings and Implications for Social Computing Research | p. 392 |
| Agent-Based Social Simulation and Modeling in Social Computing | p. 401 |
| Transforming Raw-Email Data into Social-Network Information | p. 413 |
| Using Social Networks to Organize Researcher Community | p. 421 |
| Online Gaming Perpetrators Model | p. 428 |
| Proposal for a Multiagent Architecture for Self-Organizing Systems (MA-SOS) | p. 434 |
| Social Opinions, E-Commerce, Security and Privacy Considerations | |
| Applying Text Mining to Assist People Who Inquire HIV/AIDS Information from Internet | p. 440 |
| Polarity Classification of Public Health Opinions in Chinese | p. 449 |
| Parallel Crawling and Capturing for On-Line Auction | p. 455 |
| A New Credit Card Payment Scheme Using Mobile Phones Based on Visual Cryptography | p. 467 |
| Detecting Hidden Hierarchy in Terrorist Networks: Some Case Studies | p. 477 |
| Keyphrase Extraction from Chinese News Web Pages Based on Semantic Relations | p. 490 |
| Automatic Recognition of News Web Pages | p. 496 |
| Understanding Users' Attitudes Towards Using a VoIP Survey | p. 502 |
| Privacy-Preserving Collaborative E-Voting | p. 508 |
| Privacy-Aware Access Control through Negotiation in Daily Life Service | p. 514 |
| Author Index | p. 521 |
| Table of Contents provided by Blackwell. All Rights Reserved. |