default search action
3. CISIS 2010: León, Spain
- Álvaro Herrero, Emilio Corchado, Carlos Redondo, Ángel Alonso:
Computational Intelligence in Security for Information Systems 2010 - Proceedings of the 3rd International Conference on Computational Intelligence in Security for Information Systems (CISIS'10), León, Spain, November 11-12, 2010. Advances in Intelligent and Soft Computing 85, Springer 2010, ISBN 978-3-642-16625-9
Machine Learning and Intelligence
- Saif ur Rehman, Muhammed Naeem Ahmed Khan:
An Incremental Density-Based Clustering Technique for Large Datasets. 3-11 - Petro M. Gopych, Ivan Gopych:
BSDT ROC and Cognitive Learning Hypothesis. 13-23 - Pavel Krömer, Václav Snásel, Jan Platos, Ajith Abraham:
Evolving Fuzzy Classifier for Data Mining - an Information Retrieval Approach. 25-32 - Gonzalo A. Aranda-Corral, Joaquín Borrego-Díaz:
Mereotopological Analysis of Formal Concepts in Security Ontologies. 33-40
Agents and Multi-Agent Systems
- Javier Alfonso-Cendón, Ana González-Marcos, Manuel Castejón Limas, Joaquín B. Ordieres Meré:
A Multi-agent Data Mining System for Defect Forecasting in a Decentralized Manufacturing Environment. 43-50 - Cristian Pinzón, Juan Francisco de Paz, Álvaro Herrero, Emilio Corchado, Javier Bajo:
A Distributed Hierarchical Multi-agent Architecture for Detecting Injections in SQL Queries. 51-59
Image, Video and Speech Processing
- Dzati Athiar Ramli, Salina Abdul Samad, Aini Hussain:
Performances of Speech Signal Biometric Systems Based on Signal to Noise Ratio Degradation. 73-80 - Preety Singh, Vijay Laxmi, Deepika Gupta, Manoj Singh Gaur:
Lipreading Using n-Gram Feature Vector. 81-88 - Ion Marqués, Manuel Graña:
Face Processing for Security: A Short Review. 89-96
Network Security
- Verónica Mateos Lanchas, Víctor A. Villagrá González, Francisco Romero Bueno:
Ontologies-Based Automated Intrusion Response System. 99-106 - Jérôme François, Humberto J. Abdelnur, Radu State, Olivier Festor:
Semi-supervised Fingerprinting of Protocol Messages. 107-115 - Cynthia Wagner, Gérard Wagener, Radu State, Thomas Engel:
Monitoring of Spatial-Aggregated IP-Flow Records. 117-124 - Aitor Corchero Rodriguez, Mario Reyes de los Mozos:
Improving Network Security through Traffic Log Anomaly Detection Using Time Series Analysis. 125-133 - Carlos Laorden, Borja Sanz, Gonzalo Álvarez Marañón, Pablo García Bringas:
A Threat Model Approach to Threats and Vulnerabilities in On-line Social Networks. 135-142 - Yasser Yasami:
An SLA-Based Approach for Network Anomaly Detection. 143-150 - Álvaro Alonso, Santiago Porras, Enaitz Ezpeleta, Ekhiotz Jon Vergara, Ignacio Arenaza, Roberto Uribeetxeberria, Urko Zurutuza, Álvaro Herrero, Emilio Corchado:
Understanding Honeypot Data by an Unsupervised Neural Visualization. 151-160
Watermarking
- Reena Gunjan, Saurabh Maheshwari, Manoj Singh Gaur, Vijay Laxmi:
Permuted Image DCT Watermarking. 163-171 - Hazem M. El-Bakry, Mohamed Hamada:
A Developed WaterMark Technique for Distributed Database Security. 173-180
Cryptography
- Amalia Beatriz Orúe López, Gonzalo Álvarez Marañón, Alberto Guerra Estévez, Gerardo Pastor Dégano, Miguel Romera García, Fausto Montoya Vitini:
Trident, a New Pseudo Random Number Generator Based on Coupled Chaotic Maps. 183-190 - Manuel J. Martínez, Roberto Uribeetxeberria, Urko Zurutuza, Miguel Fernández:
The Impact of the SHA-3 Casting Cryptography Competition on the Spanish IT Market. 191-199
Industrial and Commercial Applications of Intelligent Methods for Security
- Hanan El Bakkali, Hamid Hatim, Ilham Berrada:
A New Task Engineering Approach for Workflow Access Control. 203-212 - Angel Jesus Varela-Vaca, Rafael Martinez Gasca:
OPBUS: Fault Tolerance Against Integrity Attacks in Business Processes. 213-222 - Juan Álvaro Muñoz Naranjo, Juan Antonio López Ramos, Leocadio González Casado:
A Key Distribution Scheme for Live Streaming Multi-tree Overlays. 223-230 - Maria Belén Vaquerizo García:
Intelligent Methods for Scheduling in Transportation. 231-238
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.