|
|
|
|
LEADER |
04649nam a22003495i 4500 |
001 |
978-3-540-88181-0 |
005 |
20191022063558.0 |
007 |
cr nn 008mamaa |
008 |
100301s2009 gw | s |||| 0|eng d |
020 |
|
|
|a 9783540881810
|
024 |
7 |
|
|a 10.1007/978-3-540-88181-0
|2 doi
|
040 |
|
|
|a Sistema de Bibliotecas del Tecnológico de Costa Rica
|
245 |
1 |
0 |
|a Proceedings of the International Workshop on Computational Intelligence in Security for Information Systems CISIS 2008
|c edited by Emilio Corchado, Rodolfo Zunino, Paolo Gastaldo.
|
250 |
|
|
|a 1st ed. 2009.
|
260 |
# |
# |
|a Berlin, Heidelberg :
|b Springer Berlin Heidelberg :
|b Imprint: Springer,
|c 2009.
|
300 |
|
|
|a XIII, 318 p.
|b online resource.
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
490 |
1 |
|
|a Advances in Intelligent and Soft Computing,
|v 53
|
505 |
0 |
|
|a Computational Intelligence Methods for Fighting Crime -- An Artificial Neural Network for Bank Robbery Risk Management: The OS.SI.F Web On-Line Tool of the ABI Anti-crime Department -- Secure Judicial Communication Exchange Using Soft-computing Methods and Biometric Authentication -- Identity Resolution in Criminal Justice Data: An Application of NORA -- PTK: An Alternative Advanced Interface for the Sleuth Kit -- Text Mining and Intelligence -- Stalker, a Multilingual Text Mining Search Engine for Open Source Intelligence -- Computational Intelligence Solutions for Homeland Security -- Virtual Weapons for Real Wars: Text Mining for National Security -- Hypermetric k-Means Clustering for Content-Based Document Management -- Critical Infrastructure Protection -- Security Issues in Drinking Water Distribution Networks -- Trusted-Computing Technologies for the Protection of Critical Information Systems -- A First Simulation of Attacks in the Automotive Network Communications Protocol FlexRay -- Wireless Sensor Data Fusion for Critical Infrastructure Security -- Development of Anti Intruders Underwater Systems: Time Domain Evaluation of the Self-informed Magnetic Networks Performance -- Monitoring and Diagnosing Railway Signalling with Logic-Based Distributed Agents -- SeSaR: Security for Safety -- Network Security -- Automatic Verification of Firewall Configuration with Respect to Security Policy Requirements -- Automated Framework for Policy Optimization in Firewalls and Security Gateways -- An Intrusion Detection System Based on Hierarchical Self-Organization -- Evaluating Sequential Combination of Two Genetic Algorithm-Based Solutions for Intrusion Detection -- Agents and Neural Networks for Intrusion Detection -- Cluster Analysis for Anomaly Detection -- Statistical Anomaly Detection on Real e-Mail Traffic -- On-the-fly Statistical Classification of Internet Traffic at Application Layer Based on Cluster Analysis -- Flow Level Data Mining of DNS Query Streams for Email Worm Detection -- Adaptable Text Filters and Unsupervised Neural Classifiers for Spam Detection -- A Preliminary Performance Comparison of Two Feature Sets for Encrypted Traffic Classification -- Dynamic Scheme for Packet Classification Using Splay Trees -- A Novel Algorithm for Freeing Network from Points of Failure -- Biometry -- A Multi-biometric Verification System for the Privacy Protection of Iris Templates -- Score Information Decision Fusion Using Support Vector Machine for a Correlation Filter Based Speaker Authentication System -- Application of 2DPCA Based Techniques in DCT Domain for Face Recognition -- Fingerprint Based Male-Female Classification -- BSDT Multi-valued Coding in Discrete Spaces -- A Fast and Distortion Tolerant Hashing for Fingerprint Image Authentication -- The Concept of Application of Fuzzy Logic in Biometric Authentication Systems -- Information Protection -- Bidirectional Secret Communication by Quantum Collisions -- Semantic Region Protection Using Hu Moments and a Chaotic Pseudo-random Number Generator -- Random r-Continuous Matching Rule for Immune-Based Secure Storage System -- Industrial Perspectives -- nokLINK: A New Solution for Enterprise Security -- SLA and LAC: New Solutions for Security Monitoring in the Enterprise.
|
650 |
|
0 |
|a Artificial intelligence.
|
650 |
|
0 |
|a Applied mathematics.
|
650 |
|
0 |
|a Engineering mathematics.
|
650 |
1 |
4 |
|a Artificial Intelligence.
|
650 |
2 |
4 |
|a Mathematical and Computational Engineering.
|
700 |
1 |
|
|a Corchado, Emilio.
|e editor.
|
700 |
1 |
|
|a Zunino, Rodolfo.
|e editor.
|
700 |
1 |
|
|a Gastaldo, Paolo.
|e editor.
|
710 |
2 |
|
|a SpringerLink (Online service)
|
773 |
0 |
|
|t Springer eBooks
|
856 |
4 |
0 |
|u https://doi.org/10.1007/978-3-540-88181-0
|