|
|
|
|
| LEADER |
04650nam a22003495i 4500 |
| 001 |
978-3-540-88181-0 |
| 005 |
20191022063558.0 |
| 007 |
cr nn 008mamaa |
| 008 |
100301s2009 gw | s |||| 0|eng d |
| 020 |
|
|
|a 9783540881810
|
| 024 |
7 |
|
|a 10.1007/978-3-540-88181-0
|2 doi
|
| 040 |
|
|
|a Sistema de Bibliotecas del Tecnológico de Costa Rica
|
| 245 |
1 |
0 |
|a Proceedings of the International Workshop on Computational Intelligence in Security for Information Systems CISIS 2008
|c edited by Emilio Corchado, Rodolfo Zunino, Paolo Gastaldo.
|
| 250 |
|
|
|a 1st ed. 2009.
|
| 260 |
# |
# |
|a Berlin, Heidelberg :
|b Springer Berlin Heidelberg :
|b Imprint: Springer,
|c 2009.
|
| 300 |
|
|
|a XIII, 318 p.
|b online resource.
|
| 336 |
|
|
|a text
|b txt
|2 rdacontent
|
| 337 |
|
|
|a computer
|b c
|2 rdamedia
|
| 338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
| 490 |
1 |
|
|a Advances in Intelligent and Soft Computing,
|v 53
|
| 505 |
0 |
|
|a Computational Intelligence Methods for Fighting Crime -- An Artificial Neural Network for Bank Robbery Risk Management: The OS.SI.F Web On-Line Tool of the ABI Anti-crime Department -- Secure Judicial Communication Exchange Using Soft-computing Methods and Biometric Authentication -- Identity Resolution in Criminal Justice Data: An Application of NORA -- PTK: An Alternative Advanced Interface for the Sleuth Kit -- Text Mining and Intelligence -- Stalker, a Multilingual Text Mining Search Engine for Open Source Intelligence -- Computational Intelligence Solutions for Homeland Security -- Virtual Weapons for Real Wars: Text Mining for National Security -- Hypermetric k-Means Clustering for Content-Based Document Management -- Critical Infrastructure Protection -- Security Issues in Drinking Water Distribution Networks -- Trusted-Computing Technologies for the Protection of Critical Information Systems -- A First Simulation of Attacks in the Automotive Network Communications Protocol FlexRay -- Wireless Sensor Data Fusion for Critical Infrastructure Security -- Development of Anti Intruders Underwater Systems: Time Domain Evaluation of the Self-informed Magnetic Networks Performance -- Monitoring and Diagnosing Railway Signalling with Logic-Based Distributed Agents -- SeSaR: Security for Safety -- Network Security -- Automatic Verification of Firewall Configuration with Respect to Security Policy Requirements -- Automated Framework for Policy Optimization in Firewalls and Security Gateways -- An Intrusion Detection System Based on Hierarchical Self-Organization -- Evaluating Sequential Combination of Two Genetic Algorithm-Based Solutions for Intrusion Detection -- Agents and Neural Networks for Intrusion Detection -- Cluster Analysis for Anomaly Detection -- Statistical Anomaly Detection on Real e-Mail Traffic -- On-the-fly Statistical Classification of Internet Traffic at Application Layer Based on Cluster Analysis -- Flow Level Data Mining of DNS Query Streams for Email Worm Detection -- Adaptable Text Filters and Unsupervised Neural Classifiers for Spam Detection -- A Preliminary Performance Comparison of Two Feature Sets for Encrypted Traffic Classification -- Dynamic Scheme for Packet Classification Using Splay Trees -- A Novel Algorithm for Freeing Network from Points of Failure -- Biometry -- A Multi-biometric Verification System for the Privacy Protection of Iris Templates -- Score Information Decision Fusion Using Support Vector Machine for a Correlation Filter Based Speaker Authentication System -- Application of 2DPCA Based Techniques in DCT Domain for Face Recognition -- Fingerprint Based Male-Female Classification -- BSDT Multi-valued Coding in Discrete Spaces -- A Fast and Distortion Tolerant Hashing for Fingerprint Image Authentication -- The Concept of Application of Fuzzy Logic in Biometric Authentication Systems -- Information Protection -- Bidirectional Secret Communication by Quantum Collisions -- Semantic Region Protection Using Hu Moments and a Chaotic Pseudo-random Number Generator -- Random r-Continuous Matching Rule for Immune-Based Secure Storage System -- Industrial Perspectives -- nokLINK: A New Solution for Enterprise Security -- SLA and LAC: New Solutions for Security Monitoring in the Enterprise.
|
| 650 |
|
0 |
|a Artificial intelligence.
|
| 650 |
|
0 |
|a Applied mathematics.
|
| 650 |
|
0 |
|a Engineering mathematics.
|
| 650 |
1 |
4 |
|a Artificial Intelligence.
|
| 650 |
2 |
4 |
|a Mathematical and Computational Engineering.
|
| 700 |
1 |
|
|a Corchado, Emilio.
|e editor.
|
| 700 |
1 |
|
|a Zunino, Rodolfo.
|e editor.
|
| 700 |
1 |
|
|a Gastaldo, Paolo.
|e editor.
|
| 710 |
2 |
|
|a SpringerLink (Online service)
|
| 773 |
0 |
|
|t Springer eBooks
|
| 856 |
4 |
0 |
|u https://doi.org/10.1007/978-3-540-88181-0
|