Computational Intelligence in Security for Information Systems CISIS'09, 2nd International Workshop Burgos, Spain, September 2009 Proceedings
The Second International Workshop on Computational Intelligence for Security in Information Systems (CISIS’09) presented the most recent developments in the dynamically expanding realm of several fields such as Data Mining and Intelligence, Infrastructure Protection, Network Security, Biometry and I...
Other Authors: | , , |
---|---|
Format: | eBook |
Language: | English |
Published: |
Berlin, Heidelberg
Springer Berlin Heidelberg
2009, 2009
|
Edition: | 1st ed. 2009 |
Series: | Advances in Intelligent and Soft Computing
|
Subjects: | |
Online Access: | |
Collection: | Springer eBooks 2005- - Collection details see MPG.ReNa |
Table of Contents:
- Data Mining and Intelligence
- A Data Mining Based Analysis of Nmap Operating System Fingerprint Database
- Knowledge System for Application of Computer Security Rules
- Clustering of Windows Security Events by Means of Frequent Pattern Mining
- Text Clustering for Digital Forensics Analysis
- Infrastructure Protection
- A Preliminary Study on SVM Based Analysis of Underwater Magnetic Signals for Port Protection
- Fuzzy Rule Based Intelligent Security and Fire Detector System
- A Scaled Test Bench for Vanets with RFID Signalling
- A SVM-Based Behavior Monitoring Algorithm towards Detection of Un-desired Events in Critical Infrastructures
- Network Security
- Design and Implementation of High Performance Viterbi Decoder for Mobile Communication Data Security
- An Adaptive Multi-agent Solution to Detect DoS Attack in SOAP Messages
- A Self-learning Anomaly-Based Web Application Firewall
- An Investigation of Multi-objective Genetic Algorithms for Encrypted Traffic Identification
- A Multi-objective Optimisation Approach to IDS Sensor Placement
- Towards Ontology-Based Intelligent Model for Intrusion Detection and Prevention
- Ontology-Based Policy Translation
- Automatic Rule Generation Based on Genetic Programming for Event Correlation
- Learning Program Behavior for Run-Time Software Assurance
- Multiagent Systems for Network Intrusion Detection: A Review
- Biometry
- Multimodal Biometrics: Topics in Score Fusion
- Security Efficiency Analysis of a Biometric Fuzzy Extractor for Iris Templates
- Behavioural Biometrics Hardware Based on Bioinformatics Matching
- Industrial Perspectives
- Robust Real-Time Face Tracking Using an Active Camera
- An Approach to Centralized Control Systems Based on Cellular Automata
- Intelligent Methods and Models in Transportation
- Knowledge Based Expert System for PID Controller Tuning under Hazardous Operating Conditions