


default search action
CISIS-ICEUTE-SOCO 2012: Ostrava, Czech Republic - Special Sessions
- Álvaro Herrero
, Václav Snásel, Ajith Abraham, Ivan Zelinka, Bruno Baruque, Héctor Quintián-Pardo, José Luís Calvo-Rolle, Javier Sedano, Emilio Corchado:
International Joint Conference CISIS'12-ICEUTE'12-SOCO'12 Special Sessions, Ostrava, Czech Republic, September 5th-7th, 2012. Advances in Intelligent Systems and Computing 189, Springer 2013, ISBN 978-3-642-33017-9 - Abdallah Ghourabi
, Tarek Abbes, Adel Bouhoula:
Automatic Analysis of Web Service Honeypot Data Using Machine Learning Techniques. 1-11 - Angel Jesus Varela-Vaca
, Robert Warschofsky, Rafael M. Gasca
, Sergio Pozo
, Christoph Meinel:
A Security Pattern-Driven Approach toward the Automation of Risk Treatment in Business Processes. 13-23 - Eugene Semenkin
, Maria Semenkina
, Ilia Panfilov
:
Neural Network Ensembles Design with Self-Configuring Genetic Programming Algorithm for Solving Computer Security Problems. 25-32 - Raúl Sánchez, Álvaro Herrero
, Emilio Corchado:
Clustering for Intrusion Detection: Network Scans as a Case of Study. 33-45 - Camelia-Mihaela Pintea
, Petrica C. Pop
:
Sensor Networks Security Based on Sensitive Robots Agents: A Conceptual Model. 47-56 - Raúl Durán Díaz, Luis Hernández Encinas
, Jaime Muñoz Masqué:
Comments on a Cryptosystem Proposed by Wang and Hu. 57-65 - Fanbao Liu, Changxiang Shen, Tao Xie:
Equivalent Inner Key Recovery Attack to NMAC. 67-75 - Ciprian Pungila
:
Hybrid Compression of the Aho-Corasick Automaton for Static Analysis in Intrusion Detection Systems. 77-86 - José Antonio Álvarez-Bermejo
, Juan Antonio López Ramos:
Tracking Traitors in Web Services via Blind Signatures. 87-96 - Felix Brezo, José Gaviria de la Puerta, Igor Santos
, David Barroso, Pablo García Bringas
:
C&C Techniques in Botnet Development. 97-108 - Paulo Mourão
, José Pedro Cabral:
How Political Illusions Harm National Stability: Fiscal Illusion as a Source of Taxation. 109-115 - Oscar Delgado-Mohatar, Amparo Fúster-Sabater:
Software Implementation of Linear Feedback Shift Registers over Extended Fields. 117-126 - Jahangir Khan, Zoran S. Bojkovic, Syed Irfan Hayder, Gulam Ali Mallah, Abdul Haseeb, Fariha Atta:
Simulation Analysis of Static and Dynamic Intermediate Nodes and Performance Comparison of MANETS Routing Protocols. 127-140 - Eliska Ochodkova, Jiri Dvorský, Pavel Krömer
, Pavel Tucek
:
On Fitness Function Based upon Quasigroups Power Sequences. 141-150 - Ivan Zelinka, Filip Merhaut, Lenka Skanderová
:
Investigation on Operating Systems Identification by Means of Fractal Geometry and OS Pseudorandom Number Generators. 151-158 - Radek Vala
, David Malaník
, Roman Jasek
:
Usability of Software Intrusion-Detection System in Web Applications. 159-166 - Miroslaw Klinkowski
:
A Genetic Algorithm for Solving RSA Problem in Elastic Optical Networks with Dedicated Path Protection. 167-176 - Michal Choras, Rafal Kozik
, Damian Puchalski, Witold Holubowicz
:
Correlation Approach for SQL Injection Attacks Detection. 177-185 - Michal Choras, Rafal Kozik
, Rafal Renk, Witold Holubowicz
:
Information Exchange Mechanism between Federated Domains: P2P Approach. 187-196 - Wojciech Indyk, Tomasz Kajdanowicz
, Przemyslaw Kazienko
, Slawomir Plamowski:
Web Spam Detection Using MapReduce Approach to Collective Classification. 197-206 - Maciej Piec, Iwona Pozniak-Koszalka, Mariusz Koziol:
Analysis of Selected Aspects of "IBM I" Security. 207-214 - Wojciech Kmiecik
, Krzysztof Walkowiak
:
Metaheuristic Approach for Survivable P2P Multicasting Flow Assignment in Dual Homing Networks. 215-224 - Krzysztof Walkowiak
, Wojciech Charewicz, Maciej Donajski, Jacek Rak
:
A Tabu Search Algorithm for Optimization of Survivable Overlay Computing Systems. 225-234 - Tomasz Andrysiak, Lukasz Saganowski
, Michal Choras:
Greedy Algorithms for Network Anomaly Detection. 235-244 - Marcin Zmyslony, Bartosz Krawczyk, Michal Wozniak
:
Combined Classifiers with Neural Fuser for Spam Detection. 245-252 - Karol Wrótniak, Michal Wozniak
:
Combined Bayesian Classifiers Applied to Spam Filtering Problem. 253-260 - Carlos Laorden
, Patxi Galán-García, Igor Santos
, Borja Sanz, José María Gómez Hidalgo, Pablo García Bringas
:
Negobot: A Conversational Agent Based on Game Theory for the Detection of Paedophile Behaviour. 261-270 - Igor Santos
, Jaime Devesa, Felix Brezo, Javier Nieves, Pablo García Bringas
:
OPEM: A Static-Dynamic Approach for Machine-Learning-Based Malware Detection. 271-280 - Igor Santos
, Patxi Galán-García, Aitor Santamaría-Ibirika, Borja Alonso-Isla, Iker Alabau-Sarasola, Pablo García Bringas
:
Adult Content Filtering through Compression-Based Text Classification. 281-288 - Borja Sanz
, Igor Santos
, Carlos Laorden
, Xabier Ugarte-Pedrero, Pablo García Bringas
, Gonzalo Álvarez Marañón
:
PUMA: Permission Usage to Detect Malware in Android. 289-298 - Ignacio Aliaga, Vicente Vera
, Cristina González Losada, Alvaro Enrique Garcia
, Héctor Quintián-Pardo
, Emilio Corchado, Fanny Klett, Laura García-Hernández
:
Application of Soft Computing Technologies toward Assessment and Skills Development. 299-310 - José Antonio Álvarez-Bermejo
, J. Escoriza
, Juan Antonio López Ramos, J. Peralta:
An Interactive Mathematica Book. 311-319 - M. Dolores Redel-Macías
, Sara Pinzi
, Antonio J. Cubero-Atienza
, M. P. Dorado
, Maria del Pilar Martínez-Jiménez:
Biorefinery Virtual Lab-Integrating E-learning Techniques and Theoretical Learning. 321-330 - Pedro Antonio Gutiérrez
, Javier Sánchez-Monedero
, César Hervás-Martínez, Manuel Cruz-Ramírez
, Juan Carlos Fernández
, Francisco Fernández-Navarro
:
Approaching System Administration as a Group Project in Computer Engineering Higher Education. 331-340 - Pavel Brandstetter
, Marek Dobrovsky:
Speed Control of A.C. Drive with Induction Motor Using Genetic Algorithm. 341-350 - Pavel Brandstetter
, Pavel Bilek:
Applications of Artificial Neural Networks in Control of DC Drive. 351-360 - Pavol Fedor
, Daniela Perdukova
:
Energy Optimization of a Dynamic System Controller. 361-369 - Pavol Fedor
, Daniela Perdukova
, Zelmira Ferkova:
Optimal Input Vector Based Fuzzy Controller Rules Design. 371-380 - Radim Hercík
, Roman Slabý, Zdenek Machacek
, Jirí Koziorek
:
Correlation Methods of OCR Algorithm for Traffic Sign Detection Implementable in Microcontrollers. 381-389 - Jana Nowaková
, Miroslav Pokorný, Martin Pies
:
Takagi-Sugeno Fuzzy Model in Task of Controllers Design. 391-400 - Petr Palacky
, Petr Hudecek, Ales Havel
:
Real-Time Estimation of Induction Motor Parameters Based on the Genetic Algorithm. 401-409 - Jan Bauer
, Stanislav Fligl:
Comparison of Fuzzy Logic Based and Sliding Mode Based Controller for IM Drive Fed by Matrix Converter. 411-420 - Pavel Skalny
, Bohumil Krajc:
Discrete-Time Markov Chains in Reliability Analysis-Case Study. 421-427 - Jakub Talla, Zdenek Peroutka, Seppo J. Ovaska, Josef Stehlik:
Genetic Algorithm Based Optimization of MGP-FIR Current Reference Generator for Active Power Filters. 429-438 - Karla Stépánová, Martin Macas, Lenka Lhotská
:
Correlation-Based Neural Gas for Visualizing Correlations between EEG Features. 439-446 - Jakub Jirka, Michal Prauzek
:
Built-in Smartphone Accelerometer Motion Pattern Recognition Using Wavelet Transform. 447-455 - Sara Colantonio
, Ovidio Salvetti
:
Temporal Analysis of Remotely Sensed Data for the Assessment of COPD Patients' Health Status. 457-466 - Tomás Barton
, Pavel Kordík:
Encoding Time Series Data for Better Clustering Results. 467-475 - Pavel Dohnálek, Petr Gajdos, Tomas Peterek, Marek Penhaker
:
Pattern Recognition in EEG Cognitive Signals Accelerated by GPU. 477-485 - David Sikora, Martin Stepnicka
, Lenka Vavrickova:
On the Potential of Fuzzy Rule-Based Ensemble Forecasting. 487-496 - Vilém Novák, Hashim Habiballa
:
Recognition of Damaged Letters Based on Mathematical Fuzzy Logic Analysis. 497-506 - Pavel Vlasánek
, Irina Perfilieva:
Image Reconstruction with Usage of the F-Transform. 507-514 - Stephane Kouamo, Claude Tangha:
Image Compression with Artificial Neural Networks. 515-524 - Petr Hurtík
, Irina Perfilieva:
Image Compression Methodology Based on Fuzzy Transform. 525-532 - Iva Tomanova, Jiri Kupka
:
Implementation of Background Knowledge and Properties Induced by Fuzzy Confirmation Measures in Apriori Algorithm. 533-542

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.