000 01728nam a22004095a 4500
005 20250914164845.0
006 m d
007 cr nn 008maaau
008 090212s2006 gw q j eng d
020 _a9783540344797 (electronic bk.)
020 _a9783540344780 (paper)
035 _a(Springer)978-3-540-34478-0
039 9 _a200902121950
_bmuhaimin
_y04-04-2008
_zmuhaimin
050 0 0 _aQA76.76.E95
_bI86 2006
082 0 0 _a005.74
_222
090 _aQA76.76.E95
_bI81 2006
111 2 _aISI 2006
_d(2006 :
_cSan Diego, Calif.)
245 1 0 _aIntelligence and Security Informatics (vol. # 3975)
_h[electronic resource] :
_bIEEE International Conference on Intelligence and Security Informatics, ISI 2006, San Diego, CA, USA, May 23-24, 2006. /
_cedited by Sharad Mehrotra ... [et al.].
260 _aBerlin Heidelberg :
_bSpringer-Verlag GmbH.,
_c2006
300 _axxii, 772 p. :
_bill., digital ;
_c24 cm.
440 0 _aLecture Notes in Computer Science,
_x0302-9743 ;
_v3975
650 0 _aExpert systems (Computer science)
_vCongresses.
650 0 _aData mining
_vCongresses.
650 0 _aComputer security
_vcongresses.
650 0 _aNational security
_vCongresses.
650 0 _aTerrorism
_xData processing
_vCongresses.
700 1 _aMehrotra, harad.
710 2 _aSpringerLink (Online service)
773 0 _tSpringer e-books
856 4 0 _uhttps://eresourcesptsl.ukm.remotexs.co/user/login?url=http://dx.doi.org/10.1007/11760146
907 _a.b14144189
_b2025-04-09
_c2019-11-12
942 _n0
_kQA76.76.E95 I81 2006
914 _avtls003371983
998 _ae
_b2008-04-04
_cm
_dz
_feng
_ggw
_y0
_z.b14144189
999 _c410398
_d410398