Proceedings of the International Workshop on Computational Intelligence in Security for Information Systems CISIS 2008 - Advances in Intelligent and Soft Computing - Emilio Corchado - Books - Springer-Verlag Berlin and Heidelberg Gm - 9783540881803 - October 16, 2008
In case cover and title do not match, the title is correct

Proceedings of the International Workshop on Computational Intelligence in Security for Information Systems CISIS 2008 - Advances in Intelligent and Soft Computing

Emilio Corchado

Price
$ 235.49

Ordered from remote warehouse

Expected delivery May 17 - 31
Add to your iMusic wish list

Proceedings of the International Workshop on Computational Intelligence in Security for Information Systems CISIS 2008 - Advances in Intelligent and Soft Computing

The International Workshop on Computational Intelligence for Security in Inf- mation Systems (CISIS) proposes a meeting ground to the various communities - volved in building intelligent systems for security, namely: information security, data mining, adaptive learning methods and soft computing among others.


Marc Notes: Based on publisher provided data.; Includes CD-ROM. Table of Contents: Computational Intelligence Methods for Fighting Crime -- An Artificial Neural Network for Bank Robbery Risk Management: The OS. SI. F Web On-Line Tool of the ABI Anti-crime Department / Carlo Guazzoni, Gaetano Bruno Ronsivalle -- Secure Judicial Communication Exchange Using Soft-computing Methods and Biometric Authentication / Mauro Cislaghi, George Eleftherakis, Roberto Mazzilli, Francois Mohier, Sara Ferri, Valerio Giuffrida, Elisa Negroni -- Identity Resolution in Criminal Justice Data: An Application of NORA / Queen E. Booker -- PTK: An Alternative Advanced Interface for the Sleuth Kit / Dario V. Forte, Angelo Cavallini, Cristiano Maruti, Luca Losio, Thomas Orlandi, Michele Zambelli -- Text Mining and Intelligence -- Stalker, a Multilingual Text Mining Search Engine for Open Source Intelligence / F. Neri, M. Pettoni -- Computational Intelligence Solutions for Homeland Security / Enrico Appiani, Giuseppe Buslacchi -- Virtual Weapons for Real Wars: Text Mining for National Security / Alessandro Zanasi -- Hypermetric k-Means Clustering for Content-Based Document Management / Sergio Decherchi, Paolo Gastaldo, Judith Redi, Rodolfo Zunino -- Critical Infrastructure Protection -- Security Issues in Drinking Water Distribution Networks / Demetrios G. Eliades, Marios M. Polycarpou -- Trusted-Computing Technologies for the Protection of Critical Information Systems / Antonio Lioy, Gianluca Ramunno, Davide Vernizzi -- A First Simulation of Attacks in the Automotive Network Communications Protocol FlexRay / Dennis K. Nilsson, Ulf E. Larson, Francesco Picasso, Erland Jonsson -- Wireless Sensor Data Fusion for Critical Infrastructure Security / Francesco Flammini, Andrea Gaglione, Nicola Mazzocca, Vincenzo Moscato, Concetta Pragliola -- Development of Anti Intruders Underwater Systems: Time Domain Evaluation of the Self-informed Magnetic Networks Performance / Osvaldo Faggioni, Maurizio Soldani, Amleto Gabellone, Paolo Maggiani, Davide Leoncini -- Monitoring and Diagnosing Railway Signalling with Logic-Based Distributed Agents / Viviana Mascardi, Daniela Briola, Maurizio Martelli, Riccardo Caccia, Carlo Milani -- SeSaR: Security for Safety / Ermete Meda, Francesco Picasso, Andrea De Domenico, Paolo Mazzaron, Nadia Mazzino, Lorenzo Motta, Aldo Tamponi -- Network Security -- Automatic Verification of Firewall Configuration with Respect to Security Policy Requirements / Soutaro Matsumoto, Adel Bouhoula -- Automated Framework for Policy Optimization in Firewalls and Security Gateways / Gianluca Maiolini, Lorenzo Cignini, Andrea Baiocchi -- An Intrusion Detection System Based on Hierarchical Self-Organization / E. J. Palomo, E. Dominguez, R. M. Luque, J. Munoz -- Evaluating Sequential Combination of Two Genetic Algorithm-Based Solutions for Intrusion Detection / Zorana Bankovic, Slobodan Bojanic, Octavio Nieto-Taladriz -- Agents and Neural Networks for Intrusion Detection / Alvaro Herrero, Emilio Corchado -- Cluster Analysis for Anomaly Detection / Giuseppe Lieto, Fabio Orsini, Genoveffa Pagano -- Statistical Anomaly Detection on Real e-Mail Traffic / Maurizio Aiello, Davide Chiarella, Gianluca Papaleo -- On-the-fly Statistical Classification of Internet Traffic at Application Layer Based on Cluster Analysis / Andrea Baiocchi, Gianluca Maiolini, Giacomo Molina, Antonello Rizzi -- Flow Level Data Mining of DNS Query Streams for Email Worm Detection / Nikolaos Chatzis, Radu Popescu-Zeletin -- Adaptable Text Filters and Unsupervised Neural Classifiers for Spam Detection / Bogdan Vrusias, Ian Golledge -- A Preliminary Performance Comparison of Two Feature Sets for Encrypted Traffic Classification / Riyad Alshammari, A. Nur Zincir-Heywood -- Dynamic Scheme for Packet Classification Using Splay Trees / Nizar Ben-Neji, Adel Bouhoula -- A Novel Algorithm for Freeing Network from Points of Failure / Rahul Gupta, Suneeta Agarwal -- Biometry -- A Multi-biometric Verification System for the Privacy Protection of Iris Templates / S. Cimato, M. Gamassi, V. Piuri, R. Sassi, F. Scotti -- Score Information Decision Fusion Using Support Vector Machine for a Correlation Filter Based Speaker Authentication System / Dzati Athiar Ramli, Salina Abdul Samad, Aini Hussain -- Application of 2DPCA Based Techniques in DCT Domain for Face Recognition / Messaoud Bengherabi, Lamia Mezai, Farid Harizi, Abderrazak Guessoum, Mohamed Cheriet -- Fingerprint Based Male-Female Classification / Manish Verma, Suneeta Agarwal -- BSDT Multi-valued Coding in Discrete Spaces / Petro Gopych -- A Fast and Distortion Tolerant Hashing for Fingerprint Image Authentication / Thi Hoi Le, The Duy Bui -- The Concept of Application of Fuzzy Logic in Biometric Authentication Systems / Anatoly Sachenko, Arkadiusz Banasik, Adrian Kapczynski -- Information Protection -- Bidirectional Secret Communication by Quantum Collisions / Fabio Antonio Bovino -- Semantic Region Protection Using Hu Moments and a Chaotic Pseudo-random Number Generator / Paraskevi Tzouveli, Klimis Ntalianis, Stefanos Kollias -- Random r-Continuous Matching Rule for Immune-Based Secure Storage System / Cai Tao, Ju ShiGuang, Zhong Wei, Niu DeJiao -- Industrial Perspectives -- nokLINK: A New Solution for Enterprise Security / Francesco Pedersoli, Massimiliano Cristiano -- SLA & LAC: New Solutions for Security Monitoring in the Enterprise / Bruno Giacometti -- Author Index. Publisher Marketing: The research scenario in advanced systems for protecting critical infrastructures and for deeply networked information tools highlights a growing link between security issues and the need for intelligent processing abilities in the area of information s- tems. To face the ever-evolving nature of cyber-threats, monitoring systems must have adaptive capabilities for continuous adjustment and timely, effective response to modifications in the environment. Moreover, the risks of improper access pose the need for advanced identification methods, including protocols to enforce comput- security policies and biometry-related technologies for physical authentication. C- putational Intelligence methods offer a wide variety of approaches that can be fruitful in those areas, and can play a crucial role in the adaptive process by their ability to learn empirically and adapt a system s behaviour accordingly. The International Workshop on Computational Intelligence for Security in Inf- mation Systems (CISIS) proposes a meeting ground to the various communities - volved in building intelligent systems for security, namely: information security, data mining, adaptive learning methods and soft computing among others. The main goal is to allow experts and researchers to assess the benefits of learning methods in the data-mining area for information-security applications. The Workshop offers the opportunity to interact with the leading industries actively involved in the critical area of security, and have a picture of the current solutions adopted in practical domains. This volume of Advances in Soft Computing contains accepted papers presented at CISIS 08, which was held in Genova, Italy, on October 23rd 24th, 2008."

Media Books     Paperback Book   (Book with soft cover and glued back)
Released October 16, 2008
ISBN13 9783540881803
Publishers Springer-Verlag Berlin and Heidelberg Gm
Pages 318
Dimensions 156 × 234 × 17 mm   ·   521 g
Language French  
Editor Corchado, Emilio
Editor Gastaldo, Paolo
Editor Zunino, Rodolfo

Show all

More by Emilio Corchado