Computational Intelligence in Security for Information Systems 2010 Proceedings of the 3rd International Conference on Computational Intelligence in Security for Information Systems (CISIS’10)

This volume of Advances in Intelligent and Soft Computing contains accepted papers presented at the 3rd International Conference on Computational Intelligence in Security for Information Systems (CISIS'10), which was held in the beautiful and historic city of León, Spain, in November, 2010.   S...

Full description

Bibliographic Details
Other Authors: Herrero, Álvaro (Editor), Corchado, Emilio (Editor), Redondo Gil, Carlos (Editor), Alonso Alvarez, Ángel (Editor)
Format: eBook
Language:English
Published: Berlin, Heidelberg Springer Berlin Heidelberg 2010, 2010
Edition:1st ed. 2010
Series:Advances in Intelligent and Soft Computing
Subjects:
Online Access:
Collection: Springer eBooks 2005- - Collection details see MPG.ReNa
Table of Contents:
  • 1: Machine Learning and Intelligence
  • An Incremental Density-Based Clustering Technique for Large Datasets
  • BSDT ROC and Cognitive Learning Hypothesis
  • Evolving Fuzzy Classifier for Data Mining - an Information Retrieval Approach
  • Mereotopological Analysis of Formal Concepts in Security Ontologies
  • 2: Agents and Multi-Agent Systems
  • A Multi-agent Data Mining System for Defect Forecasting in a Decentralized Manufacturing Environment
  • A Distributed Hierarchical Multi-agent Architecture for Detecting Injections in SQL Queries
  • Incorporating Temporal Constraints in the Analysis Task of a Hybrid Intelligent IDS
  • 3: Image, Video and Speech Processing
  • Performances of Speech Signal Biometric Systems Based on Signal to Noise Ratio Degradation
  • Lipreading Using n–Gram Feature Vector
  • Face Processing for Security: A Short Review
  • 4: Network Security
  • Ontologies-Based Automated Intrusion Response System
  • Semi-supervised Fingerprinting of Protocol Messages
  • Monitoring of Spatial-Aggregated IP-Flow Records
  • Improving Network Security through Traffic Log Anomaly Detection Using Time Series Analysis
  • A Threat Model Approach to Threats and Vulnerabilities in On-line Social Networks
  • An SLA-Based Approach for Network Anomaly Detection
  • Understanding Honeypot Data by an Unsupervised Neural Visualization
  • 5: Watermarking
  • Permuted Image DCT Watermarking
  • A Developed WaterMark Technique for Distributed Database Security
  • 6: Cryptography
  • Trident, a New Pseudo Random Number Generator Based on Coupled Chaotic Maps
  • The Impact of the SHA-3 Casting Cryptography Competition on the Spanish IT Market
  • 7: Industrial and Commercial Applications of Intelligent Methods for Security
  • A New Task Engineering Approach for Workflow Access Control
  • OPBUS: Fault ToleranceAgainst Integrity Attacks in Business Processes
  • A Key Distribution Scheme for Live Streaming Multi-tree Overlays
  • Intelligent Methods for Scheduling in Transportation