default search action
Search dblp for Publications
export results for "toc:db/conf/paisi/paisi2017.bht:"
@inproceedings{DBLP:conf/paisi/0002C17, author = {Daniel Hughes and Andrew M. Colarik}, editor = {G. Alan Wang and Michael Chau and Hsinchun Chen}, title = {The Hierarchy of Cyber War Definitions}, booktitle = {Intelligence and Security Informatics - 12th Pacific Asia Workshop, {PAISI} 2017, Jeju Island, South Korea, May 23, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10241}, pages = {15--33}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-57463-9\_2}, doi = {10.1007/978-3-319-57463-9\_2}, timestamp = {Tue, 14 May 2019 10:00:49 +0200}, biburl = {https://dblp.org/rec/conf/paisi/0002C17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/paisi/HsiaoK17, author = {Shou{-}Ching Hsiao and Da{-}Yu Kao}, editor = {G. Alan Wang and Michael Chau and Hsinchun Chen}, title = {Differentiating the Investigation Response Process of Cyber Security Incident for LEAs}, booktitle = {Intelligence and Security Informatics - 12th Pacific Asia Workshop, {PAISI} 2017, Jeju Island, South Korea, May 23, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10241}, pages = {34--48}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-57463-9\_3}, doi = {10.1007/978-3-319-57463-9\_3}, timestamp = {Thu, 11 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/paisi/HsiaoK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/paisi/HuangSCW17, author = {Cheng{-}Ta Huang and De{-}En Sun and Yen{-}Lin Chen and Shiuh{-}Jeng Wang}, editor = {G. Alan Wang and Michael Chau and Hsinchun Chen}, title = {{VQ} Coding in Data Hiding Using Correlated Neighboring Blocks in Security Performance}, booktitle = {Intelligence and Security Informatics - 12th Pacific Asia Workshop, {PAISI} 2017, Jeju Island, South Korea, May 23, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10241}, pages = {111--128}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-57463-9\_8}, doi = {10.1007/978-3-319-57463-9\_8}, timestamp = {Thu, 11 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/paisi/HuangSCW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/paisi/KaoKL17, author = {Da{-}Yu Kao and Benjamaporn Kluaypa and Hung{-}Chih Lin}, editor = {G. Alan Wang and Michael Chau and Hsinchun Chen}, title = {The Cyberbullying Assessment of Capable Guardianship in Routine Activity Theory}, booktitle = {Intelligence and Security Informatics - 12th Pacific Asia Workshop, {PAISI} 2017, Jeju Island, South Korea, May 23, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10241}, pages = {3--14}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-57463-9\_1}, doi = {10.1007/978-3-319-57463-9\_1}, timestamp = {Thu, 11 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/paisi/KaoKL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/paisi/LakshmiB17, author = {T. Jaya Lakshmi and S. Durga Bhavani}, editor = {G. Alan Wang and Michael Chau and Hsinchun Chen}, title = {Link Prediction in Temporal Heterogeneous Networks}, booktitle = {Intelligence and Security Informatics - 12th Pacific Asia Workshop, {PAISI} 2017, Jeju Island, South Korea, May 23, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10241}, pages = {83--98}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-57463-9\_6}, doi = {10.1007/978-3-319-57463-9\_6}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/paisi/LakshmiB17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/paisi/MengTLCT17, author = {XiangFeng Meng and Yunhai Tong and Xinhai Liu and Yiren Chen and Shaohua Tan}, editor = {G. Alan Wang and Michael Chau and Hsinchun Chen}, title = {A Structural Based Community Similarity Algorithm and Its Application in Scientific Event Detection}, booktitle = {Intelligence and Security Informatics - 12th Pacific Asia Workshop, {PAISI} 2017, Jeju Island, South Korea, May 23, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10241}, pages = {67--82}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-57463-9\_5}, doi = {10.1007/978-3-319-57463-9\_5}, timestamp = {Thu, 11 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/paisi/MengTLCT17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/paisi/MengTLCT17a, author = {XiangFeng Meng and Yunhai Tong and Xinhai Liu and Yiren Chen and Shaohua Tan}, editor = {G. Alan Wang and Michael Chau and Hsinchun Chen}, title = {NetRating: Credit Risk Evaluation for Loan Guarantee Chain in China}, booktitle = {Intelligence and Security Informatics - 12th Pacific Asia Workshop, {PAISI} 2017, Jeju Island, South Korea, May 23, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10241}, pages = {99--108}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-57463-9\_7}, doi = {10.1007/978-3-319-57463-9\_7}, timestamp = {Thu, 11 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/paisi/MengTLCT17a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/paisi/SethiKR17, author = {Tegjyot Singh Sethi and Mehmed M. Kantardzic and Joung Woo Ryu}, editor = {G. Alan Wang and Michael Chau and Hsinchun Chen}, title = {'Security Theater': On the Vulnerability of Classifiers to Exploratory Attacks}, booktitle = {Intelligence and Security Informatics - 12th Pacific Asia Workshop, {PAISI} 2017, Jeju Island, South Korea, May 23, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10241}, pages = {49--63}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-57463-9\_4}, doi = {10.1007/978-3-319-57463-9\_4}, timestamp = {Thu, 11 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/paisi/SethiKR17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/paisi/SuZLHLT17, author = {Shenghui Su and Jianhua Zheng and Shuwang L{\"{u}} and Zhiqiu Huang and Zhoujun Li and Zhenmin Tang}, editor = {G. Alan Wang and Michael Chau and Hsinchun Chen}, title = {Idology and Its Applications in Public Security and Network Security}, booktitle = {Intelligence and Security Informatics - 12th Pacific Asia Workshop, {PAISI} 2017, Jeju Island, South Korea, May 23, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10241}, pages = {129--149}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-57463-9\_9}, doi = {10.1007/978-3-319-57463-9\_9}, timestamp = {Wed, 04 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/paisi/SuZLHLT17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/paisi/2017, editor = {G. Alan Wang and Michael Chau and Hsinchun Chen}, title = {Intelligence and Security Informatics - 12th Pacific Asia Workshop, {PAISI} 2017, Jeju Island, South Korea, May 23, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10241}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-57463-9}, doi = {10.1007/978-3-319-57463-9}, isbn = {978-3-319-57462-2}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/paisi/2017.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.