


default search action
4. CISIS 2011: Torremolinos-Málaga, Spain
- Álvaro Herrero
, Emilio Corchado:
Computational Intelligence in Security for Information Systems - 4th International Conference, CISIS 2011, Held at IWANN 2011, Torremolinos-Málaga, Spain, June 8-10, 2011. Proceedings. Lecture Notes in Computer Science 6694, Springer 2011, ISBN 978-3-642-21322-9
Machine Learning and Intelligence
- Carlos Laorden
, Borja Sanz
, Igor Santos
, Patxi Galán-García, Pablo García Bringas
:
Collective Classification for Spam Filtering. 1-8 - Zorana Bankovic, Juan Carlos Vallejo, David Fraga, José Manuel Moya
:
Detecting Bad-Mouthing Attacks on Reputation Systems Using Self-Organizing Maps. 9-16 - Emna Bahri, Nouria Harbi, Hoa Nguyen Huu:
Approach Based Ensemble Methods for Better and Faster Intrusion Detection. 17-24 - Hai Thanh Nguyen, Carmen Torrano-Gimenez, Gonzalo Álvarez
, Slobodan Petrovic, Katrin Franke:
Application of the Generic Feature Selection Measure in Detection of Web Attacks. 25-32 - Pino Caballero-Gil
, Jezabel Molina-Gil
, Cándido Caballero-Gil
:
Data Aggregation Based on Fuzzy Logic for VANETs. 33-40
Network Security
- Cynthia Wagner, Gérard Wagener, Radu State, Thomas Engel:
Digging into IP Flow Records with a Visual Kernel Method. 41-49 - Igor Santos
, Borja Sanz
, Carlos Laorden
, Felix Brezo, Pablo García Bringas
:
Opcode-Sequence-Based Semi-supervised Unknown Malware Detection. 50-57 - Sebastian Roschke, Feng Cheng, Christoph Meinel:
A New Alert Correlation Algorithm Based on Attack Graph. 58-67 - João Paulo S. Medeiros, Agostinho de Medeiros Brito Júnior, Paulo S. Motta Pires:
A Qualitative Survey of Active TCP/IP Fingerprinting Tools and Techniques for Operating Systems Identification. 68-75 - Francisco José Mora-Gimeno, Francisco Maciá Pérez
, Iren Lorenzo-Fonseca
, Juan Antonio Gil-Martínez-Abarca
, Diego Marcos-Jorquera, Virgilio Gilart-Iglesias:
Security Alert Correlation Using Growing Neural Gas. 76-83 - Alessio Merlo, Gianluca Papaleo
, Stefano Veneziano
, Maurizio Aiello
:
A Comparative Performance Evaluation of DNS Tunneling Tools. 84-91 - Ehsan Vahedi, Rabab K. Ward, Ian F. Blake:
Security Analysis and Complexity Comparison of Some Recent Lightweight RFID Protocols. 92-99 - Jaydip Sen
:
A Secure and Efficient Searching Scheme for Trusted Nodes in a Peer-to-Peer Network. 100-108 - Silvia González, Javier Sedano, Álvaro Herrero
, Bruno Baruque
, Emilio Corchado:
Testing Ensembles for Intrusion Detection: On the Identification of Mutated Network Scans. 109-117 - Kashif Saleem
, Norsheila Fisal, Sharifah Hafizah Syed Ariffin
, Rozeha A. Rashid
:
An Intelligent Information Security Mechanism for the Network Layer of WSN: BIOSARP. 118-126
Cryptography
- Amparo Fúster-Sabater:
Structural Properties of Cryptographic Sequences. 127-134 - Raúl Durán Díaz, Luis Hernández Encinas
, Jaime Muñoz Masqué:
A Multisignature Scheme Based on the SDLP and on the IFP. 135-142 - Raúl Durán Díaz, Luis Hernández Encinas
, Jaime Muñoz Masqué:
A Group Signature Scheme Based on the Integer Factorization and the Subgroup Discrete Logarithm Problems. 143-150 - J. A. M. Naranjo
, Leocadio G. Casado
:
Keeping Group Communications Private: An Up-to-Date Review on Centralized Secure Multicast. 151-159 - Victor Gayoso Martínez
, Luis Hernández Encinas
, Carmen Sánchez Ávila
:
Java Card Implementation of the Elliptic Curve Integrated Encryption Scheme Using Prime and Binary Finite Fields. 160-167 - Guillermo Azuara
, José Luis Salazar:
Comprehensive Protection of RFID Traceability Information Systems Using Aggregate Signatures. 168-176 - Alberto Peinado, Andrés Ortiz
:
Cryptanalysis of Multicast Protocols with Key Refreshment Based on the Extended Euclidean Algorithm. 177-182 - Rafael Álvarez
, José-Francisco Vicent
, Antonio Zamora
:
Improving the Message Expansion of the Tangle Hash Function. 183-189 - Jorge A. Martínez-Ñonthe, A. Díaz-Méndez, Miguel Cruz-Irisson
, Leonardo Palacios-Luengas
, José Luis Del-Río-Correa, Ruben Vázquez-Medina
:
Cryptosystem with One Dimensional Chaotic Maps. 190-197
Securing Software
- Craig S. Wright, Tanveer A. Zia
:
A Quantitative Analysis into the Economics of Correcting Software Bugs. 198-205 - Craig S. Wright, Tanveer A. Zia
:
Rationally Opting for the Insecure Alternative: Negative Externalities and the Selection of Security Controls. 206-213 - Jesus Diaz
, David Arroyo
, Francisco de Borja Rodríguez
:
An Approach for Adapting Moodle into a Secure Infrastructure. 214-221 - Milan Markovic, Goran Dordevic:
On Secure JAVA Application in SOA-Based PKI Mobile Government Systems. 222-229
Applications of Intelligent Methods for Security
- Xabier Ugarte-Pedrero, Igor Santos
, Pablo García Bringas
:
Structural Feature Based Anomaly Detection for Packed Executable Identification. 230-237 - Jian-bin Hu, Yonggang Wang, Tao Yang, Zhi Guan, Nike Gui, Zhong Chen:
Produre: A Novel Proximity Discovery Mechanism in Location Tagging System. 238-245 - Eva Pajorová, Ladislav Hluchý
:
Scientific Gateway and Visualization Tool. 246-250 - Flora Amato
, Valentina Casola
, Antonino Mazzeo
, Sara Romano:
An Innovative Framework for Securing Unstructured Documents. 251-258 - Sean S. E. Thorpe, Indrajit Ray, Tyrone Grandison
:
Use of Schema Associative Mapping for Synchronization of the Virtual Machine Audit Logs. 259-264 - Sean S. E. Thorpe, Indrajit Ray, Tyrone Grandison
:
Enforcing Data Quality Rules for a Synchronized VM Log Audit Environment Using Transformation Mapping Techniques. 265-271 - Ali Dehghantanha, Nur Izura Udzir
, Ramlan Mahmod:
Evaluating User-Centered Privacy Model (UPM) in Pervasive Computing Systems. 272-284 - Hamid Parvin
, Behrouz Minaei-Bidgoli
, B. Hoda Helmi:
An Innovative Linkage Learning Based on Differences in Local Optimums. 285-292 - Hamid Parvin
, Behrouz Minaei
, Sajjad Ghatei:
A New Particle Swarm Optimization for Dynamic Environments. 293-300 - Hamid Parvin
, Nasser Mozayani
, Akram Beigi:
A Classifier Ensemble for Face Recognition Using Gabor Wavelet Features. 301-307

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.