default search action
CISIS-ICEUTE 2015: Burgos, Spain
- Álvaro Herrero, Bruno Baruque, Javier Sedano, Héctor Quintián, Emilio Corchado:
International Joint Conference - CISIS'15 and ICEUTE'15, 8th International Conference on Computational Intelligence in Security for Information Systems / 6th International Conference on EUropean Transnational Education, Burgos, Spain, 15-17 June, 2015. Advances in Intelligent Systems and Computing 369, Springer 2015, ISBN 978-3-319-19712-8
CISIS 2015: Applications of Intelligent Methods for Security
- Jens Kohler, Thomas Specht:
Performance Analysis of Vertically Partitioned Data in Clouds Through a Client-Based In-Memory Key-Value Store Cache. 3-13 - Karsten Martiny, Alexander Motzek, Ralf Möller:
Formalizing Agents' Beliefs for Cyber-Security Defense Strategy Planning. 15-25 - Amina Saadaoui, Hajar Benmoussa, Adel Bouhoula, Anas Abou El Kalam:
Automatic Classification and Detection of Snort Configuration Anomalies - a Formal Approach. 27-39 - Adriana-Cristina Enache, Valentin Sgarciu:
An Improved Bat Algorithm Driven by Support Vector Machines for Intrusion Detection. 41-51 - Faouzi Jaïdi, Faten Labbene Ayachi:
A Formal Approach Based on Verification and Validation Techniques for Enhancing the Integrity of Concrete Role Based Access Control Policies. 53-64 - Ciprian Pungila, Viorel Negru:
Real-Time Hybrid Compression of Pattern Matching Automata for Heterogeneous Signature-Based Intrusion Detection. 65-74 - Mohamed Neji Maatouk, Najoua Essoukri Ben Amara:
Adaptive Watermarking Algorithm of Color Images of Ancient Documents on YIQ-PCA Color Space. 75-86 - Imen Abroug Ben Abdelghani, Najoua Essoukri Ben Amara:
Planar Multi-classifier Modelling-NN/SVM: Application to Off-line Handwritten Signature Verification. 87-97 - Mohamed el Boujnouni, Mohamed Jedra, Noureddine Zahid:
Email Spam Filtering Using the Combination of Two Improved Versions of Support Vector Domain Description. 99-109 - Sara D. Cardell, Amparo Fúster-Sabater:
Performance of the Cryptanalysis over the Shrinking Generator. 111-121 - Ruxandra F. Olimid:
On the (Non)Improvement of an Authenticated GKT Protocol. 123-132 - Ciprian Pungila, Bogdan Manate, Viorel Negru:
A Heterogeneous Fault-Resilient Architecture for Mining Anomalous Activity Patterns in Smart Homes. 133-143 - Dinh Q. Phung, Dat Tran, Wanli Ma, Tien Pham:
Investigating the Impacts of Brain Conditions on EEG-Based Person Identification. 145-155 - Dinh Q. Phung, Dat Tran, Wanli Ma, Tien Pham:
Conditional Entropy Approach to Multichannel EEG-Based Person Identification. 157-165 - Javier Sedano, Camelia Chira, Silvia González, Álvaro Herrero, Emilio Corchado, José Ramón Villar:
On the Selection of Key Features for Android Malware Characterization. 167-176 - Shilpa Bahl, Sudhir Kumar Sharma:
Performance Analysis of User to Root Attack Class Using Correlation Based Feature Selection Model. 177-187 - Hasnae Rahimi, Hanan El Bakkali:
CIOSOS: Combined Idiomatic-Ontology Based Sentiment Orientation System for Trust Reputation in E-commerce. 189-200 - David Atienza, Álvaro Herrero, Emilio Corchado:
Neural Analysis of HTTP Traffic for Web Attack Detection. 201-212 - M. Ravikumar, S. Manjunath, Devanur S. Guru:
Analysis and Automation of Handwritten Word Level Script Recognition. 213-225 - Rafal Kozik, Michal Choras, Rafal Renk, Witold Holubowicz:
Patterns Extraction Method for Anomaly Detection in HTTP Traffic. 227-236 - Muhammad Hussain, Awabed Jibreen, Hatim A. Aboalsamh, Hassan Madkour, George Bebis, Gholamreza Amayeh:
Feature Selection for Hand-Shape Based Identification. 237-246
CISIS 2015: Infrastructure and Network Security
- Enrico Cambiaso, Gianluca Papaleo, Giovanni Chiola, Maurizio Aiello:
Designing and Modeling the Slow Next DoS Attack. 249-259 - Francisco Martín-Fernández, Pino Caballero-Gil, Cándido Caballero-Gil:
Non-Interactive Authentication and Confidential Information Exchange for Mobile Environments. 261-271 - Ángel Martín del Rey, Ascensión Hernández Encinas, J. Martín-Vaquero, A. Queiruga Dios, Gerardo Rodríguez Sánchez:
Spatio-Temporal Spreading of Mobile Malware: A Model Based on Difference Equations. 273-283 - Adam Wójtowicz, Daniel Wilusz:
Privacy-Preserving Protocol for Smart Space Services with Negotiable Comfort Preferences. 285-295 - Rafael Álvarez, Antonio Zamora:
An Intermediate Approach to Spritz and RC4. 297-307 - Xiaoming Hu, Hong Lu, Huajie Xu, Jian Wang, Yinchun Yang:
An Efficient Identity-Based Proxy Signature Scheme in the Standard Model with Tight Reduction. 309-319 - Preeti Aggarwal, Sudhir Kumar Sharma:
A New Metric for Proficient Performance Evaluation of Intrusion Detection System. 321-331 - Raúl Sánchez, Álvaro Herrero, Emilio Corchado:
Clustering and Neural Visualization for Flow-Based Intrusion Detection. 333-345 - Kazumasa Omote, Tran Thao Phuong:
SW-SSS: Slepian-Wolf Coding-Based Secret Sharing Scheme. 347-365 - Li Zhai, ChuanKun Wu:
An Efficient RFID Distance Bounding Protocol. 367-376 - Khoa Nguyen, Dat Tran, Wanli Ma, Dharmendra Sharma:
A New Approach to Compressed File Fragment Identification. 377-387 - José Gaviria de la Puerta, Borja Sanz, Igor Santos-Grueiro, Pablo García Bringas:
The Evolution of Permission as Feature for Android Malware Detection. 389-400 - Cristóbal Medina-López, Leocadio G. Casado, Vicente González Ruiz:
Pollution Attacks Detection in the P2PSP Live Streaming System. 401-410
CISIS 2015-SS01: Digital Identities Management by Means of Non-Standard Digital Signatures Schemes
- V. Gayoso Martínez, Luis Hernández Encinas, Seok-Zun Song:
Group Signatures in Practice. 413-423 - David Arroyo, Jesus Diaz, Francisco de Borja Rodríguez:
Non-conventional Digital Signatures and Their Implementations - A Review. 425-435 - D. Arroyo Guardeño, V. Gayoso Martínez, Luis Hernández Encinas, Agustín Martín Muñoz:
Using Smart Cards for Authenticating in Public Services: A Comparative Study. 437-446 - Alberto Peinado, Andrés Ortiz García:
Reducing the Key Space of an Image Encryption Scheme Based on Two-Round Diffusion Process. 447-453 - David Arroyo, Jesus Diaz, Víctor Gayoso:
On the Difficult Tradeoff Between Security and Privacy: Challenges for the Management of Digital Identities. 455-462
CISIS 2015-SS02: User-Centric Security & Privacy
- Ruxandra F. Olimid:
GOTCHA Challenge (Un)Solved. 465-472 - Iskander Sánchez-Rola, Xabier Ugarte-Pedrero, Igor Santos, Pablo García Bringas:
Tracking Users Like There is No Tomorrow: Privacy on the Current Internet. 473-483 - Michal Choras, Rafal Kozik, Rafal Renk, Witold Holubowicz:
A Practical Framework and Guidelines to Enhance Cyber Security and Privacy. 485-495 - Enaitz Ezpeleta, Urko Zurutuza, José María Gómez Hidalgo:
An Analysis of the Effectiveness of Personalized Spam Using Online Social Network Public Information. 497-506
ICEUTE 2015: Domain Applications and Case Studies
- Wolfgang Gerken:
European Computer Science (ECS). 509-516 - Gabriel Michel, Véronique Jeanclaude, Sorin Stratulat:
Better Careers for Transnational European Students? - A Case Study for French-German Diploma Alumni. 517-524 - Ana María Lara Palma, José María Cámara Nebreda, Elena María Vicente Domingo:
Impact Level Within the English Friendly Program in Virtual Degrees at the University of Burgos. A Real Case Scenario of Transnational Education. 525-532 - José Antonio López-Vázquez, José Antonio Orosa, José Luís Calvo-Rolle, Francisco Javier de Cos Juez, José Luís Casteleiro-Roca, Angel Martín Costa:
A New Way to Improve Subject Selection in Engineering Degree Studies. 533-545
ICEUTE 2015: Information Technologies for Transnational Learning
- María Pereda, David Poza, José Ignacio Santos, José Manuel Galán:
Quality Uncertainty and Market Failure: An Interactive Model to Conduct Classroom Experiments. 549-557 - Gorka Epelde, Andoni Mujika, Peter Leskovský, Alessandro De Mauro:
Public Access Architecture Design of an FPGA-Hardware-Based Nervous System Emulation Remote Lab. 559-569 - Francisco J. Cardenal, Vivian F. López Batista:
Education Apps. One Step Beyond: It's Time for Something More in the Education Apps World. 571-581 - Bruno Baruque, Álvaro Herrero:
Self-Assessment Web Tool for Java Programming. 583-592
ICEUTE 2015: Teaching and Evaluation Methodologies
- Krzysztof Walczak, Wojciech Wiza, Rafal Wojciechowski, Adam Wójtowicz, Dariusz Ruminski, Wojciech Cellary:
Building Augmented Reality Presentations with Web 2.0 Tools. 595-605 - David Griol, José Manuel Molina:
Illustrating Abstract Concepts by Means of Virtual Learning Artifacts. 607-616 - Pavel Kordík, Stanislav Kuznetsov:
Mining Skills from Educational Data for Project Recommendations. 617-627 - Teresa Torres-Coronas, Mario Arias Oliva, Juan Carlos Yáñez Luna, Ana María Lara Palma:
Virtual Teams in Higher Education: A Review of Factors Affecting Creative Performance. 629-637
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.