Description |
1 online resource (xvi, 310 pages) |
Series |
Lecture notes in computer science, 0302-9743 ; 6694 |
|
LNCS sublibrary. SL 4, Security and cryptology |
|
Lecture notes in computer science ; 6694. 0302-9743
|
|
LNCS sublibrary. SL 4, Security and cryptology.
|
Contents |
Machine generated contents note: ch. 1 Machine Learning and Intelligence -- Collective Classification for Spam Filtering / Pablo G. Bringas -- Detecting Bad-Mouthing Attacks on Reputation Systems Using Self-Organizing Maps / J.M. Moya -- Approach Based Ensemble Methods for Better and Faster Intrusion Detection / Hoa Nguyen Huu -- Application of the Generic Feature Selection Measure in Detection of Web Attacks / Katrin Franke -- Data Aggregation Based on Fuzzy Logic for VANETs / C. Caballero-Gil -- ch. 2 Network Security -- Digging into IP Flow Records with a Visual Kernel Method / Thomas Engel -- Opcode-Sequence-Based Semi-supervised Unknown Malware Detection / Pablo G. Bringas -- New Alert Correlation Algorithm Based on Attack Graph / Christoph Meinel -- Qualitative Survey of Active TCP/IP Fingerprinting Tools and Techniques for Operating Systems Identification / Paulo S. Motta Pires -- Security Alert Correlation Using Growing Neural Gas / Virgilio Gilart-Iglesias -- Comparative Performance Evaluation of DNS Tunneling Tools / Maurizio Aiello -- Security Analysis and Complexity Comparison of Some Recent Lightweight RFID Protocols / Ian F. Blake -- Secure and Efficient Searching Scheme for Trusted Nodes in a Peer-to-Peer Network / Jaydip Sen -- Testing Ensembles for Intrusion Detection: On the Identification of Mutated Network Scans / Emilio Corchado -- Intelligent Information Security Mechanism for the Network Layer of WSN: BIOSARP / Rozeha A. Rashid -- ch. 3 Cryptography -- Structural Properties of Cryptographic Sequences / A. Fuster-Sabater -- Multisignature Scheme Based on the SDLP and on the IFP / J. Munoz Masque -- Group Signature Scheme Based on the Integer Factorization and the Subgroup Discrete Logarithm Problems / J. Munoz Masque -- Keeping Group Communications Private: An Up-to-Date Review on Centralized Secure Multicast / L.G. Casado |
|
Note continued: Java Card Implementation of the Elliptic Curve Integrated Encryption Scheme Using Prime and Binary Finite Fields / C. Sanchez Avila -- Comprehensive Protection of RFID Traceability Information Systems Using Aggregate Signatures / Jose Luis Salazar -- Cryptanalysis of Multicast Protocols with Key Refreshment Based on the Extended Euclidean Algorithm / Andres Ortiz -- Improving the Message Expansion of the Tangle Hash Function / Antonio Zamora -- Cryptosystem with One Dimensional Chaotic Maps / R. Vazquez-Medina -- ch. 4 Securing Software -- Quantitative Analysis into the Economics of Correcting Software Bugs / Tanveer A. Zia -- Rationally Opting for the Insecure Alternative: Negative Externalities and the Selection of Security Controls / Tanveer A. Zia -- Approach for Adapting Moodle into a Secure Infrastructure / Francisco B. Rodriguez -- On Secure JAVA Application in SOA-Based PKI Mobile Government Systems / Goran Dordevic -- ch. 5 Applications of Intelligent Methods for Security -- Structural Feature Based Anomaly Detection for Packed Executable Identification / Pablo G. Bringas -- Produre: A Novel Proximity Discovery Mechanism in Location Tagging System / Zhong Chen -- Scientific Gateway and Visualization Tool / Ladislav Hluchy -- Innovative Framework for Securing Unstructured Documents / Sara Romano -- Use of Schema Associative Mapping for Synchronization of the Virtual Machine Audit Logs / Tyrone Grandison -- Enforcing Data Quality Rules for a Synchronized VM Log Audit Environment Using Transformation Mapping Techniques / Tyrone Grandison -- Evaluating User-Centered Privacy Model (UPM) in Pervasive Computing Systems / Ramlan Mahmod -- Innovative Linkage Learning Based on Differences in Local Optimums / B. Hoda Helmi -- New Particle Swarm Optimization for Dynamic Environments / Sajjad Ghatei |
|
Note continued: Classifier Ensemble for Face Recognition Using Gabor Wavelet Features / Akram Beigi |
Summary |
This book constitutes the refereed proceedings of the 4th International Conference on Computational Intelligence in Security for Information Systems, CISIS 2011, held in Torremolinos-Málaga, in June 2011 as a satellite event of IWANN 2011, the International Work-Conference on Artificial and Natural Neural Networks. The 38 revised full papers presented were carefully reviewed and selected from a total of 70 submissions. The papers are organized in topical sections on machine learning and intelligence, network security, cryptography, securing software, and applications of intelligent methods for security |
Bibliography |
Includes bibliographical references and author index |
Notes |
Print version record |
In |
Springer eBooks |
Subject |
Computer security -- Congresses
|
|
Computational intelligence -- Congresses
|
|
Computer security.
|
|
Information storage and retrieval systems.
|
|
Computer Security
|
|
Software
|
|
Information Systems
|
|
software.
|
|
Informatique.
|
|
Computational intelligence
|
|
Computer security
|
Genre/Form |
proceedings (reports)
|
|
Conference papers and proceedings
|
|
Conference papers and proceedings.
|
|
Actes de congrès.
|
Form |
Electronic book
|
Author |
Herrero, Alvaro.
|
|
Corchado, Emilio.
|
ISBN |
9783642213236 |
|
3642213235 |
|