Limit search to available items
Book Cover
E-book
Author International Conference on Computational Intelligence in Security for Information Systems (4th : 2011 : Torremolinos, Spain)

Title Computational intelligence in security for information systems : 4th International Conference, CISIS 2011, Held at IWANN 2011, Torremolinos-Málaga, Spain, June 8-10, 2011, proceedings / Álvaro Herrero, Emilio Corchado (eds.)
Published Berlin ; Heidelberg ; New York : Springer, ©2011

Copies

Description 1 online resource (xvi, 310 pages)
Series Lecture notes in computer science, 0302-9743 ; 6694
LNCS sublibrary. SL 4, Security and cryptology
Lecture notes in computer science ; 6694. 0302-9743
LNCS sublibrary. SL 4, Security and cryptology.
Contents Machine generated contents note: ch. 1 Machine Learning and Intelligence -- Collective Classification for Spam Filtering / Pablo G. Bringas -- Detecting Bad-Mouthing Attacks on Reputation Systems Using Self-Organizing Maps / J.M. Moya -- Approach Based Ensemble Methods for Better and Faster Intrusion Detection / Hoa Nguyen Huu -- Application of the Generic Feature Selection Measure in Detection of Web Attacks / Katrin Franke -- Data Aggregation Based on Fuzzy Logic for VANETs / C. Caballero-Gil -- ch. 2 Network Security -- Digging into IP Flow Records with a Visual Kernel Method / Thomas Engel -- Opcode-Sequence-Based Semi-supervised Unknown Malware Detection / Pablo G. Bringas -- New Alert Correlation Algorithm Based on Attack Graph / Christoph Meinel -- Qualitative Survey of Active TCP/IP Fingerprinting Tools and Techniques for Operating Systems Identification / Paulo S. Motta Pires -- Security Alert Correlation Using Growing Neural Gas / Virgilio Gilart-Iglesias -- Comparative Performance Evaluation of DNS Tunneling Tools / Maurizio Aiello -- Security Analysis and Complexity Comparison of Some Recent Lightweight RFID Protocols / Ian F. Blake -- Secure and Efficient Searching Scheme for Trusted Nodes in a Peer-to-Peer Network / Jaydip Sen -- Testing Ensembles for Intrusion Detection: On the Identification of Mutated Network Scans / Emilio Corchado -- Intelligent Information Security Mechanism for the Network Layer of WSN: BIOSARP / Rozeha A. Rashid -- ch. 3 Cryptography -- Structural Properties of Cryptographic Sequences / A. Fuster-Sabater -- Multisignature Scheme Based on the SDLP and on the IFP / J. Munoz Masque -- Group Signature Scheme Based on the Integer Factorization and the Subgroup Discrete Logarithm Problems / J. Munoz Masque -- Keeping Group Communications Private: An Up-to-Date Review on Centralized Secure Multicast / L.G. Casado
Note continued: Java Card Implementation of the Elliptic Curve Integrated Encryption Scheme Using Prime and Binary Finite Fields / C. Sanchez Avila -- Comprehensive Protection of RFID Traceability Information Systems Using Aggregate Signatures / Jose Luis Salazar -- Cryptanalysis of Multicast Protocols with Key Refreshment Based on the Extended Euclidean Algorithm / Andres Ortiz -- Improving the Message Expansion of the Tangle Hash Function / Antonio Zamora -- Cryptosystem with One Dimensional Chaotic Maps / R. Vazquez-Medina -- ch. 4 Securing Software -- Quantitative Analysis into the Economics of Correcting Software Bugs / Tanveer A. Zia -- Rationally Opting for the Insecure Alternative: Negative Externalities and the Selection of Security Controls / Tanveer A. Zia -- Approach for Adapting Moodle into a Secure Infrastructure / Francisco B. Rodriguez -- On Secure JAVA Application in SOA-Based PKI Mobile Government Systems / Goran Dordevic -- ch. 5 Applications of Intelligent Methods for Security -- Structural Feature Based Anomaly Detection for Packed Executable Identification / Pablo G. Bringas -- Produre: A Novel Proximity Discovery Mechanism in Location Tagging System / Zhong Chen -- Scientific Gateway and Visualization Tool / Ladislav Hluchy -- Innovative Framework for Securing Unstructured Documents / Sara Romano -- Use of Schema Associative Mapping for Synchronization of the Virtual Machine Audit Logs / Tyrone Grandison -- Enforcing Data Quality Rules for a Synchronized VM Log Audit Environment Using Transformation Mapping Techniques / Tyrone Grandison -- Evaluating User-Centered Privacy Model (UPM) in Pervasive Computing Systems / Ramlan Mahmod -- Innovative Linkage Learning Based on Differences in Local Optimums / B. Hoda Helmi -- New Particle Swarm Optimization for Dynamic Environments / Sajjad Ghatei
Note continued: Classifier Ensemble for Face Recognition Using Gabor Wavelet Features / Akram Beigi
Summary This book constitutes the refereed proceedings of the 4th International Conference on Computational Intelligence in Security for Information Systems, CISIS 2011, held in Torremolinos-Málaga, in June 2011 as a satellite event of IWANN 2011, the International Work-Conference on Artificial and Natural Neural Networks. The 38 revised full papers presented were carefully reviewed and selected from a total of 70 submissions. The papers are organized in topical sections on machine learning and intelligence, network security, cryptography, securing software, and applications of intelligent methods for security
Bibliography Includes bibliographical references and author index
Notes Print version record
In Springer eBooks
Subject Computer security -- Congresses
Computational intelligence -- Congresses
Computer security.
Information storage and retrieval systems.
Computer Security
Software
Information Systems
software.
Informatique.
Computational intelligence
Computer security
Genre/Form proceedings (reports)
Conference papers and proceedings
Conference papers and proceedings.
Actes de congrès.
Form Electronic book
Author Herrero, Alvaro.
Corchado, Emilio.
ISBN 9783642213236
3642213235
Other Titles CISIS 2011