Proceedings of the International Workshop on Computational Intelligence in Security for Information Systems CISIS 2008

Detalles Bibliográficos
Autor Corporativo: SpringerLink (Online service)
Otros Autores: Corchado, Emilio. (Editor ), Zunino, Rodolfo. (Editor ), Gastaldo, Paolo. (Editor )
Formato: eBook
Lenguaje:English
Publicado: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2009.
Edición:1st ed. 2009.
Colección:Advances in Intelligent and Soft Computing, 53
Materias:
Acceso en línea:https://doi.org/10.1007/978-3-540-88181-0
Tabla de Contenidos:
  • Computational Intelligence Methods for Fighting Crime
  • An Artificial Neural Network for Bank Robbery Risk Management: The OS.SI.F Web On-Line Tool of the ABI Anti-crime Department
  • Secure Judicial Communication Exchange Using Soft-computing Methods and Biometric Authentication
  • Identity Resolution in Criminal Justice Data: An Application of NORA
  • PTK: An Alternative Advanced Interface for the Sleuth Kit
  • Text Mining and Intelligence
  • Stalker, a Multilingual Text Mining Search Engine for Open Source Intelligence
  • Computational Intelligence Solutions for Homeland Security
  • Virtual Weapons for Real Wars: Text Mining for National Security
  • Hypermetric k-Means Clustering for Content-Based Document Management
  • Critical Infrastructure Protection
  • Security Issues in Drinking Water Distribution Networks
  • Trusted-Computing Technologies for the Protection of Critical Information Systems
  • A First Simulation of Attacks in the Automotive Network Communications Protocol FlexRay
  • Wireless Sensor Data Fusion for Critical Infrastructure Security
  • Development of Anti Intruders Underwater Systems: Time Domain Evaluation of the Self-informed Magnetic Networks Performance
  • Monitoring and Diagnosing Railway Signalling with Logic-Based Distributed Agents
  • SeSaR: Security for Safety
  • Network Security
  • Automatic Verification of Firewall Configuration with Respect to Security Policy Requirements
  • Automated Framework for Policy Optimization in Firewalls and Security Gateways
  • An Intrusion Detection System Based on Hierarchical Self-Organization
  • Evaluating Sequential Combination of Two Genetic Algorithm-Based Solutions for Intrusion Detection
  • Agents and Neural Networks for Intrusion Detection
  • Cluster Analysis for Anomaly Detection
  • Statistical Anomaly Detection on Real e-Mail Traffic
  • On-the-fly Statistical Classification of Internet Traffic at Application Layer Based on Cluster Analysis
  • Flow Level Data Mining of DNS Query Streams for Email Worm Detection
  • Adaptable Text Filters and Unsupervised Neural Classifiers for Spam Detection
  • A Preliminary Performance Comparison of Two Feature Sets for Encrypted Traffic Classification
  • Dynamic Scheme for Packet Classification Using Splay Trees
  • A Novel Algorithm for Freeing Network from Points of Failure
  • Biometry
  • A Multi-biometric Verification System for the Privacy Protection of Iris Templates
  • Score Information Decision Fusion Using Support Vector Machine for a Correlation Filter Based Speaker Authentication System
  • Application of 2DPCA Based Techniques in DCT Domain for Face Recognition
  • Fingerprint Based Male-Female Classification
  • BSDT Multi-valued Coding in Discrete Spaces
  • A Fast and Distortion Tolerant Hashing for Fingerprint Image Authentication
  • The Concept of Application of Fuzzy Logic in Biometric Authentication Systems
  • Information Protection
  • Bidirectional Secret Communication by Quantum Collisions
  • Semantic Region Protection Using Hu Moments and a Chaotic Pseudo-random Number Generator
  • Random r-Continuous Matching Rule for Immune-Based Secure Storage System
  • Industrial Perspectives
  • nokLINK: A New Solution for Enterprise Security
  • SLA and LAC: New Solutions for Security Monitoring in the Enterprise.