Computational Intelligence in Security for Information Systems : CISIS'09, 2nd International Workshop Burgos, Spain, September 2009 Proceedings /

Detalles Bibliográficos
Autor Corporativo: SpringerLink (Online service)
Otros Autores: Gastaldo, Paolo. (Editor ), Zunino, Rodolfo. (Editor ), Corchado, Emilio. (Editor )
Formato: eBook
Lenguaje:English
Publicado: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2009.
Edición:1st ed. 2009.
Colección:Advances in Intelligent and Soft Computing, 63
Materias:
LEADER 03331nam a22003495i 4500
001 000281376
005 20211029132731.0
007 cr nn 008mamaa
008 100301s2009 gw | s |||| 0|eng d
020 |a 9783642040917 
024 7 |a 10.1007/978-3-642-04091-7  |2 doi 
040 |a Sistema de Bibliotecas del Tecnológico de Costa Rica 
245 1 0 |a Computational Intelligence in Security for Information Systems :  |b CISIS'09, 2nd International Workshop Burgos, Spain, September 2009 Proceedings /  |c edited by Paolo Gastaldo, Rodolfo Zunino, Emilio Corchado. 
250 |a 1st ed. 2009. 
260 # # |a Berlin, Heidelberg :  |b Springer Berlin Heidelberg :  |b Imprint: Springer,  |c 2009. 
300 |a XVI, 216 p. 71 illus. :  |b online resource. 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
490 1 |a Advances in Intelligent and Soft Computing,  |v 63 
505 0 |a Data Mining and Intelligence -- A Data Mining Based Analysis of Nmap Operating System Fingerprint Database -- Knowledge System for Application of Computer Security Rules -- Clustering of Windows Security Events by Means of Frequent Pattern Mining -- Text Clustering for Digital Forensics Analysis -- Infrastructure Protection -- A Preliminary Study on SVM Based Analysis of Underwater Magnetic Signals for Port Protection -- Fuzzy Rule Based Intelligent Security and Fire Detector System -- A Scaled Test Bench for Vanets with RFID Signalling -- A SVM-Based Behavior Monitoring Algorithm towards Detection of Un-desired Events in Critical Infrastructures -- Network Security -- Design and Implementation of High Performance Viterbi Decoder for Mobile Communication Data Security -- An Adaptive Multi-agent Solution to Detect DoS Attack in SOAP Messages -- A Self-learning Anomaly-Based Web Application Firewall -- An Investigation of Multi-objective Genetic Algorithms for Encrypted Traffic Identification -- A Multi-objective Optimisation Approach to IDS Sensor Placement -- Towards Ontology-Based Intelligent Model for Intrusion Detection and Prevention -- Ontology-Based Policy Translation -- Automatic Rule Generation Based on Genetic Programming for Event Correlation -- Learning Program Behavior for Run-Time Software Assurance -- Multiagent Systems for Network Intrusion Detection: A Review -- Biometry -- Multimodal Biometrics: Topics in Score Fusion -- Security Efficiency Analysis of a Biometric Fuzzy Extractor for Iris Templates -- Behavioural Biometrics Hardware Based on Bioinformatics Matching -- Industrial Perspectives -- Robust Real-Time Face Tracking Using an Active Camera -- An Approach to Centralized Control Systems Based on Cellular Automata -- Intelligent Methods and Models in Transportation -- Knowledge Based Expert System for PID Controller Tuning under Hazardous Operating Conditions. 
650 0 |a Applied mathematics. 
650 0 |a Engineering mathematics. 
650 0 |a Artificial intelligence. 
650 1 4 |a Mathematical and Computational Engineering. 
650 2 4 |a Artificial Intelligence. 
700 1 |a Gastaldo, Paolo.  |e editor. 
700 1 |a Zunino, Rodolfo.  |e editor. 
700 1 |a Corchado, Emilio.  |e editor. 
710 2 |a SpringerLink (Online service) 
773 0 |t Springer eBooks 
900 |a Libro descargado a ALEPH en bloque (proveniente de proveedor)