Proceedings of the International Workshop on Computational Intelligence in Security for Information Systems CISIS 2008

Detalles Bibliográficos
Autor Corporativo: SpringerLink (Online service)
Otros Autores: Corchado, Emilio. (Editor ), Zunino, Rodolfo. (Editor ), Gastaldo, Paolo. (Editor )
Formato: eBook
Lenguaje:English
Publicado: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2009.
Edición:1st ed. 2009.
Colección:Advances in Intelligent and Soft Computing, 53
Materias:
Acceso en línea:https://doi.org/10.1007/978-3-540-88181-0
LEADER 04649nam a22003495i 4500
001 978-3-540-88181-0
005 20191022063558.0
007 cr nn 008mamaa
008 100301s2009 gw | s |||| 0|eng d
020 |a 9783540881810 
024 7 |a 10.1007/978-3-540-88181-0  |2 doi 
040 |a Sistema de Bibliotecas del Tecnológico de Costa Rica 
245 1 0 |a Proceedings of the International Workshop on Computational Intelligence in Security for Information Systems CISIS 2008  |c edited by Emilio Corchado, Rodolfo Zunino, Paolo Gastaldo. 
250 |a 1st ed. 2009. 
260 # # |a Berlin, Heidelberg :  |b Springer Berlin Heidelberg :  |b Imprint: Springer,  |c 2009. 
300 |a XIII, 318 p.  |b online resource. 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
490 1 |a Advances in Intelligent and Soft Computing,  |v 53 
505 0 |a Computational Intelligence Methods for Fighting Crime -- An Artificial Neural Network for Bank Robbery Risk Management: The OS.SI.F Web On-Line Tool of the ABI Anti-crime Department -- Secure Judicial Communication Exchange Using Soft-computing Methods and Biometric Authentication -- Identity Resolution in Criminal Justice Data: An Application of NORA -- PTK: An Alternative Advanced Interface for the Sleuth Kit -- Text Mining and Intelligence -- Stalker, a Multilingual Text Mining Search Engine for Open Source Intelligence -- Computational Intelligence Solutions for Homeland Security -- Virtual Weapons for Real Wars: Text Mining for National Security -- Hypermetric k-Means Clustering for Content-Based Document Management -- Critical Infrastructure Protection -- Security Issues in Drinking Water Distribution Networks -- Trusted-Computing Technologies for the Protection of Critical Information Systems -- A First Simulation of Attacks in the Automotive Network Communications Protocol FlexRay -- Wireless Sensor Data Fusion for Critical Infrastructure Security -- Development of Anti Intruders Underwater Systems: Time Domain Evaluation of the Self-informed Magnetic Networks Performance -- Monitoring and Diagnosing Railway Signalling with Logic-Based Distributed Agents -- SeSaR: Security for Safety -- Network Security -- Automatic Verification of Firewall Configuration with Respect to Security Policy Requirements -- Automated Framework for Policy Optimization in Firewalls and Security Gateways -- An Intrusion Detection System Based on Hierarchical Self-Organization -- Evaluating Sequential Combination of Two Genetic Algorithm-Based Solutions for Intrusion Detection -- Agents and Neural Networks for Intrusion Detection -- Cluster Analysis for Anomaly Detection -- Statistical Anomaly Detection on Real e-Mail Traffic -- On-the-fly Statistical Classification of Internet Traffic at Application Layer Based on Cluster Analysis -- Flow Level Data Mining of DNS Query Streams for Email Worm Detection -- Adaptable Text Filters and Unsupervised Neural Classifiers for Spam Detection -- A Preliminary Performance Comparison of Two Feature Sets for Encrypted Traffic Classification -- Dynamic Scheme for Packet Classification Using Splay Trees -- A Novel Algorithm for Freeing Network from Points of Failure -- Biometry -- A Multi-biometric Verification System for the Privacy Protection of Iris Templates -- Score Information Decision Fusion Using Support Vector Machine for a Correlation Filter Based Speaker Authentication System -- Application of 2DPCA Based Techniques in DCT Domain for Face Recognition -- Fingerprint Based Male-Female Classification -- BSDT Multi-valued Coding in Discrete Spaces -- A Fast and Distortion Tolerant Hashing for Fingerprint Image Authentication -- The Concept of Application of Fuzzy Logic in Biometric Authentication Systems -- Information Protection -- Bidirectional Secret Communication by Quantum Collisions -- Semantic Region Protection Using Hu Moments and a Chaotic Pseudo-random Number Generator -- Random r-Continuous Matching Rule for Immune-Based Secure Storage System -- Industrial Perspectives -- nokLINK: A New Solution for Enterprise Security -- SLA and LAC: New Solutions for Security Monitoring in the Enterprise. 
650 0 |a Artificial intelligence. 
650 0 |a Applied mathematics. 
650 0 |a Engineering mathematics. 
650 1 4 |a Artificial Intelligence. 
650 2 4 |a Mathematical and Computational Engineering. 
700 1 |a Corchado, Emilio.  |e editor. 
700 1 |a Zunino, Rodolfo.  |e editor. 
700 1 |a Gastaldo, Paolo.  |e editor. 
710 2 |a SpringerLink (Online service) 
773 0 |t Springer eBooks 
856 4 0 |u https://doi.org/10.1007/978-3-540-88181-0