|
|
|
|
LEADER |
03331nam a22003495i 4500 |
001 |
000281376 |
005 |
20211029132731.0 |
007 |
cr nn 008mamaa |
008 |
100301s2009 gw | s |||| 0|eng d |
020 |
|
|
|a 9783642040917
|
024 |
7 |
|
|a 10.1007/978-3-642-04091-7
|2 doi
|
040 |
|
|
|a Sistema de Bibliotecas del Tecnológico de Costa Rica
|
245 |
1 |
0 |
|a Computational Intelligence in Security for Information Systems :
|b CISIS'09, 2nd International Workshop Burgos, Spain, September 2009 Proceedings /
|c edited by Paolo Gastaldo, Rodolfo Zunino, Emilio Corchado.
|
250 |
|
|
|a 1st ed. 2009.
|
260 |
# |
# |
|a Berlin, Heidelberg :
|b Springer Berlin Heidelberg :
|b Imprint: Springer,
|c 2009.
|
300 |
|
|
|a XVI, 216 p. 71 illus. :
|b online resource.
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
490 |
1 |
|
|a Advances in Intelligent and Soft Computing,
|v 63
|
505 |
0 |
|
|a Data Mining and Intelligence -- A Data Mining Based Analysis of Nmap Operating System Fingerprint Database -- Knowledge System for Application of Computer Security Rules -- Clustering of Windows Security Events by Means of Frequent Pattern Mining -- Text Clustering for Digital Forensics Analysis -- Infrastructure Protection -- A Preliminary Study on SVM Based Analysis of Underwater Magnetic Signals for Port Protection -- Fuzzy Rule Based Intelligent Security and Fire Detector System -- A Scaled Test Bench for Vanets with RFID Signalling -- A SVM-Based Behavior Monitoring Algorithm towards Detection of Un-desired Events in Critical Infrastructures -- Network Security -- Design and Implementation of High Performance Viterbi Decoder for Mobile Communication Data Security -- An Adaptive Multi-agent Solution to Detect DoS Attack in SOAP Messages -- A Self-learning Anomaly-Based Web Application Firewall -- An Investigation of Multi-objective Genetic Algorithms for Encrypted Traffic Identification -- A Multi-objective Optimisation Approach to IDS Sensor Placement -- Towards Ontology-Based Intelligent Model for Intrusion Detection and Prevention -- Ontology-Based Policy Translation -- Automatic Rule Generation Based on Genetic Programming for Event Correlation -- Learning Program Behavior for Run-Time Software Assurance -- Multiagent Systems for Network Intrusion Detection: A Review -- Biometry -- Multimodal Biometrics: Topics in Score Fusion -- Security Efficiency Analysis of a Biometric Fuzzy Extractor for Iris Templates -- Behavioural Biometrics Hardware Based on Bioinformatics Matching -- Industrial Perspectives -- Robust Real-Time Face Tracking Using an Active Camera -- An Approach to Centralized Control Systems Based on Cellular Automata -- Intelligent Methods and Models in Transportation -- Knowledge Based Expert System for PID Controller Tuning under Hazardous Operating Conditions.
|
650 |
|
0 |
|a Applied mathematics.
|
650 |
|
0 |
|a Engineering mathematics.
|
650 |
|
0 |
|a Artificial intelligence.
|
650 |
1 |
4 |
|a Mathematical and Computational Engineering.
|
650 |
2 |
4 |
|a Artificial Intelligence.
|
700 |
1 |
|
|a Gastaldo, Paolo.
|e editor.
|
700 |
1 |
|
|a Zunino, Rodolfo.
|e editor.
|
700 |
1 |
|
|a Corchado, Emilio.
|e editor.
|
710 |
2 |
|
|a SpringerLink (Online service)
|
773 |
0 |
|
|t Springer eBooks
|
900 |
|
|
|a Libro descargado a ALEPH en bloque (proveniente de proveedor)
|