Limit search to available items
Book Cover
E-book
Author International Conference on Computational Intelligence in Security for Information Systems (2012 : Ostrava, Czech Republic)

Title International Joint Conference CISIS'12, ICEUTE'12, SOCO'12 special sessions / Álvaro Herrero [and others] (eds.)
Published Berlin ; New York : Springer, ©2013

Copies

Description 1 online resource
Series Advances in intelligent systems and computing, 2194-5357 ; 189
Advances in intelligent systems and computing ; 189.
Contents Automatic Analysis of Web Service Honeypot Data Using Machine Learning Techniques / Abdallah Ghourabi, Tarek Abbes and Adel Bouhoula -- A Security Pattern-Driven Approach toward the Automation of Risk Treatment in Business Processes / Angel Jesus Varela-Vaca, Robert Warschofsky, Rafael M. Gasca, Sergio Pozo and Christoph Meinel -- Neural Network Ensembles Design with Self-Configuring Genetic Programming Algorithm for Solving Computer Security Problems / Eugene Semenkin, Maria Semenkina and Ilia Panfilov -- Clustering for Intrusion Detection: Network Scans as a Case of Study / Raúl Sánchez, Álvaro Herrero and Emilio Corchado -- Sensor Networks Security Based on Sensitive Robots Agents: A Conceptual Model / Camelia-M. Pintea and Petrica C. Pop -- Comments on a Cryptosystem Proposed by Wang and Hu / R. Durán Díaz, L. Hernández Encinas and J. Muñoz Masqué -- Equivalent Inner Key Recovery Attack to NMAC / Fanbao Liu, Changxiang Shen and Tao Xie
Hybrid Compression of the Aho-Corasick Automaton for Static Analysis in Intrusion Detection Systems / Ciprian Pungila -- Tracking Traitors in Web Services via Blind Signatures / J.A. Álvarez-Bermejo and J.A. López-Ramos -- C & C Techniques in Botnet Development / Félix Brezo, José Gaviria de la Puerta, Igor Santos, David Barroso and Pablo Garcia Bringas -- How Political Illusions Harm National Stability: Fiscal Illusion as a Source of Taxation / Paulo Mourao and José Pedro Cabral -- Software Implementation of Linear Feedback Shift Registers over Extended Fields / O. Delgado-Mohatar and A. Fúster-Sabater -- Simulation Analysis of Static and Dynamic Intermediate Nodes and Performance Comparison of MANETS Routing Protocols / Jahangir Khan, Zoran Bojkovic, Syed Irfan Hayder, Gulam Ali Mallah and Abdul Haseeb, et al. -- On Fitness Function Based upon Quasigroups Power Sequences / Eliška Ochodková, Jiří Dvorský, Pavel Krömer and Pavel Tuček
Investigation on Operating Systems Identification by Means of Fractal Geometry and OS Pseudorandom Number Generators / Ivan Zelinka, Filip Merhaut and Lenka Skanderova -- Usability of Software Intrusion-Detection System in Web Applications / Radek Vala, David Malaník and Roman Jašek -- A Genetic Algorithm for Solving RSA Problem in Elastic Optical Networks with Dedicated Path Protection / Mirosław Klinkowski -- Correlation Approach for SQL Injection Attacks Detection / Michał Choraś, Rafał Kozik, Damian Puchalski and Witold Hołubowicz -- Information Exchange Mechanism between Federated Domains: P2P Approach / Michał Choraś, Rafał Kozik, Rafał Renk and Witold Hołubowicz -- Web Spam Detection Using MapReduce Approach to Collective Classification / Wojciech Indyk, Tomasz Kajdanowicz, Przemyslaw Kazienko and Slawomir Plamowski -- Analysis of Selected Aspects of "IBM I" Security / Maciej Piec, Iwona Pozniak-Koszalka and Mariusz Koziol
Metaheuristic Approach for Survivable P2P Multicasting Flow Assignment in Dual Homing Networks / Wojciech Kmiecik and Krzysztof Walkowiak -- A Tabu Search Algorithm for Optimization of Survivable Overlay Computing Systems / Krzysztof Walkowiak, Wojciech Charewicz, Maciej Donajski and Jacek Rak -- Greedy Algorithms for Network Anomaly Detection / Tomasz Andrysiak, Łukasz Saganowski and Michał Choraś -- Combined Classifiers with Neural Fuser for Spam Detection / Marcin Zmyślony, Bartosz Krawczyk and Michał Woźniak -- Combined Bayesian Classifiers Applied to Spam Filtering Problem / Karol Wrótniak and Michał Woźniak -- Negobot: A Conversational Agent Based on Game Theory for the Detection of Paedophile Behaviour / Carlos Laorden, Patxi Galán-García, Igor Santos, Borja Sanz and Jose María Gómez Hidalgo, et al. -- OPEM: A Static-Dynamic Approach for Machine-Learning-Based Malware Detection / Igor Santos, Jaime Devesa, Félix Brezo, Javier Nieves and Pablo Garcia Bringas
Adult Content Filtering through Compression-Based Text Classification / Igor Santos, Patxi Galán-García, Aitor Santamaría-Ibirika, Borja Alonso-Isla and Iker Alabau-Sarasola, et al. -- PUMA: Permission Usage to Detect Malware in Android / Borja Sanz, Igor Santos, Carlos Laorden, Xabier Ugarte-Pedrero and Pablo Garcia Bringas, et al. -- Application of Soft Computing Technologies toward Assessment and Skills Development / Ignacio Aliaga, Vicente Vera, Cristina González Losada, Álvaro Enrique García and Héctor Quintián, et al. -- An Interactive Mathematica Book / J.A. Álvarez-Bermejo, J. Escoriza, J.A. López-Ramos and J. Peralta -- Biorefinery Virtual Lab-Integrating E-learning Techniques and Theoretical Learning / M.D. Redel-Macías, S. Pinzi, A.J. Cubero-Atienza, M.P. Dorado and M.P. Martínez-Jiménez
Approaching System Administration as a Group Project in Computer Engineering Higher Education / P.A. Gutiérrez, J. Sánchez-Monedero, C. Hervás-Martínez, M. Cruz-Ramírez and J.C. Fernández, et al. -- Speed Control of A.C. Drive with Induction Motor Using Genetic Algorithm / Pavel Brandstetter and Marek Dobrovsky -- Applications of Artificial Neural Networks in Control of DC Drive / Pavel Brandstetter and Pavel Bilek -- Energy Optimization of a Dynamic System Controller / Pavol Fedor and Daniela Perdukova -- Optimal Input Vector Based Fuzzy Controller Rules Design / Pavol Fedor, Daniela Perdukova and Zelmira Ferkova -- Correlation Methods of OCR Algorithm for Traffic Sign Detection Implementable in Microcontrollers / Radim Hercik, Roman Slaby, Zdenek Machacek and Jiri Koziorek -- Takagi-Sugeno Fuzzy Model in Task of Controllers Design / Jana Nowaková, Miroslav Pokorný and Martin Pieš
Real-Time Estimation of Induction Motor Parameters Based on the Genetic Algorithm / Petr Palacky, Petr Hudecek and Ales Havel -- Comparison of Fuzzy Logic Based and Sliding Mode Based Controller for IM Drive Fed by Matrix Converter / Jan Bauer and Stanislav Fligl -- Discrete-Time Markov Chains in Reliability Analysis-Case Study / Pavel Skalny and Bohumil Krajc -- Genetic Algorithm Based Optimization of MGP-FIR Current Reference Generator for Active Power Filters / Jakub Talla, Zdenek Peroutka, Seppo J. Ovaska and Josef Stehlik -- Correlation-Based Neural Gas for Visualizing Correlations between EEG Features / Karla Štépánová, Martin Macaš and Lenka Lhotská -- Built-in Smartphone Accelerometer Motion Pattern Recognition Using Wavelet Transform / Jakub Jirka and Michal Prauzek -- Temporal Analysis of Remotely Sensed Data for the Assessment of COPD Patients' Health Status / Sara Colantonio and Ovidio Salvetti
Encoding Time Series Data for Better Clustering Results / Tomáš Bartoň and Pavel Kordík -- Pattern Recognition in EEG Cognitive Signals Accelerated by GPU / Pavel Dohnálek, Petr Gajdoš, Tomáš Peterek and Marek Penhaker -- On the Potential of Fuzzy Rule-Based Ensemble Forecasting / David Sikora, Martin Štěpnička and Lenka Vavříčková -- Recognition of Damaged Letters Based on Mathematical Fuzzy Logic Analysis / Vilem Novak and Hashim Habiballa -- Image Reconstruction with Usage of the F-Transform / Pavel Vlašánek and Irina Perfilieva -- Image Compression with Artificial Neural Networks / Stephane Kouamo and Claude Tangha -- Image Compression Methodology Based on Fuzzy Transform / Petr Hurtik and Irina Perfilieva -- Implementation of Background Knowledge and Properties Induced by Fuzzy Confirmation Measures in Apriori Algorithm / Iva Tomanová and Jiří Kupka
Summary This volume of Advances in Intelligent and Soft Computing contains accepted papers presented at CISIS 2012 and ICEUTE 2012, both conferences held in the beautiful and historic city of Ostrava (Czech Republic), in September 2012. CISIS aims to offer a meeting opportunity for academic and industry-related researchers belonging to the various, vast communities of Computational Intelligence, Information Security, and Data Mining. The need for intelligent, flexible behaviour by large, complex systems, especially in mission-critical domains, is intended to be the catalyst and the aggregation stimulus for the overall event. After a through peer-review process, the CISIS 2012 International Program Committee selected 30 papers which are published in these conference proceedings achieving an acceptance rate of 40%. In the case of ICEUTE 2012, the International Program Committee selected 4 papers which are published in these conference proceedings. The selection of papers was extremely rigorous in order to maintain the high quality of the conference and we would like to thank the members of the Program Committees for their hard work in the reviewing process. This is a crucial process to the creation of a high standard conference and the CISIS and ICEUTE conferences would not exist without their help
Analysis Engineering
Artificial intelligence
Computational Intelligence
Notes Includes author index
Bibliography Includes bibliographical references and index
Notes English
Subject Computer networks -- Security measures -- Congresses
Data mining -- Congresses
Soft computing -- Congresses
COMPUTERS -- Data Transmission Systems -- General.
COMPUTERS -- Networking -- Vendor Specific.
Ingénierie.
Computer networks -- Security measures
Data mining
Soft computing
Genre/Form proceedings (reports)
Conference papers and proceedings
Conference papers and proceedings.
Actes de congrès.
Form Electronic book
Author Herrero, Alvaro.
ICEUTE 2012 (2012 : Ostrava, Czech Republic)
International Conference on Soft Computing Models in Industrial and Environmental Applications (2012 : Ostrava, Czech Republic)
ISBN 9783642330186
3642330185
3642330177
9783642330179
Other Titles CISIS'12
ICEUTE'12
SOCO'12