Proceedings of the International Workshop on Computational Intelligence in Security for Information Systems CISIS’08
The International Workshop on Computational Intelligence for Security in Information Systems (CISIS) proposes a meeting ground to the various communities involved in building intelligent systems for security, namely: information security, data mining, adaptive learning methods and soft computing amo...
Συγγραφή απο Οργανισμό/Αρχή: | |
---|---|
Άλλοι συγγραφείς: | , , , |
Μορφή: | Ηλεκτρονική πηγή Ηλ. βιβλίο |
Γλώσσα: | English |
Έκδοση: |
Berlin, Heidelberg :
Springer Berlin Heidelberg,
2009.
|
Σειρά: | Advances in Soft Computing,
53 |
Θέματα: | |
Διαθέσιμο Online: | Full Text via HEAL-Link |
Πίνακας περιεχομένων:
- Computational Intelligence Methods for Fighting Crime
- An Artificial Neural Network for Bank Robbery Risk Management: The OS.SI.F Web On-Line Tool of the ABI Anti-crime Department
- Secure Judicial Communication Exchange Using Soft-computing Methods and Biometric Authentication
- Identity Resolution in Criminal Justice Data: An Application of NORA
- PTK: An Alternative Advanced Interface for the Sleuth Kit
- Text Mining and Intelligence
- Stalker, a Multilingual Text Mining Search Engine for Open Source Intelligence
- Computational Intelligence Solutions for Homeland Security
- Virtual Weapons for Real Wars: Text Mining for National Security
- Hypermetric k-Means Clustering for Content-Based Document Management
- Critical Infrastructure Protection
- Security Issues in Drinking Water Distribution Networks
- Trusted-Computing Technologies for the Protection of Critical Information Systems
- A First Simulation of Attacks in the Automotive Network Communications Protocol FlexRay
- Wireless Sensor Data Fusion for Critical Infrastructure Security
- Development of Anti Intruders Underwater Systems: Time Domain Evaluation of the Self-informed Magnetic Networks Performance
- Monitoring and Diagnosing Railway Signalling with Logic-Based Distributed Agents
- SeSaR: Security for Safety
- Network Security
- Automatic Verification of Firewall Configuration with Respect to Security Policy Requirements
- Automated Framework for Policy Optimization in Firewalls and Security Gateways
- An Intrusion Detection System Based on Hierarchical Self-Organization
- Evaluating Sequential Combination of Two Genetic Algorithm-Based Solutions for Intrusion Detection
- Agents and Neural Networks for Intrusion Detection
- Cluster Analysis for Anomaly Detection
- Statistical Anomaly Detection on Real e-Mail Traffic
- On-the-fly Statistical Classification of Internet Traffic at Application Layer Based on Cluster Analysis
- Flow Level Data Mining of DNS Query Streams for Email Worm Detection
- Adaptable Text Filters and Unsupervised Neural Classifiers for Spam Detection
- A Preliminary Performance Comparison of Two Feature Sets for Encrypted Traffic Classification
- Dynamic Scheme for Packet Classification Using Splay Trees
- A Novel Algorithm for Freeing Network from Points of Failure
- Biometry
- A Multi-biometric Verification System for the Privacy Protection of Iris Templates
- Score Information Decision Fusion Using Support Vector Machine for a Correlation Filter Based Speaker Authentication System
- Application of 2DPCA Based Techniques in DCT Domain for Face Recognition
- Fingerprint Based Male-Female Classification
- BSDT Multi-valued Coding in Discrete Spaces
- A Fast and Distortion Tolerant Hashing for Fingerprint Image Authentication
- The Concept of Application of Fuzzy Logic in Biometric Authentication Systems
- Information Protection
- Bidirectional Secret Communication by Quantum Collisions
- Semantic Region Protection Using Hu Moments and a Chaotic Pseudo-random Number Generator
- Random r-Continuous Matching Rule for Immune-Based Secure Storage System
- Industrial Perspectives
- nokLINK: A New Solution for Enterprise Security
- SLA and LAC: New Solutions for Security Monitoring in the Enterprise.