Proceedings of the International Workshop on Computational Intelligence in Security for Information Systems CISIS 2008 (eBook, PDF)
157,95 €
inkl. MwSt.
Sofort per Download lieferbar
79 °P sammeln
Proceedings of the International Workshop on Computational Intelligence in Security for Information Systems CISIS 2008 (eBook, PDF)
- Format: PDF
- Merkliste
- Auf die Merkliste
- Bewerten Bewerten
- Teilen
- Produkt teilen
- Produkterinnerung
- Produkterinnerung
![](https://bilder.buecher.de/images/aktion/tolino/tolino-select-logo.png)
Bitte loggen Sie sich zunächst in Ihr Kundenkonto ein oder registrieren Sie sich bei
bücher.de, um das eBook-Abo tolino select nutzen zu können.
Hier können Sie sich einloggen
Hier können Sie sich einloggen
Sie sind bereits eingeloggt. Klicken Sie auf 2. tolino select Abo, um fortzufahren.
![](https://bilder.buecher.de/images/aktion/tolino/tolino-select-logo.png)
Bitte loggen Sie sich zunächst in Ihr Kundenkonto ein oder registrieren Sie sich bei bücher.de, um das eBook-Abo tolino select nutzen zu können.
The research scenario in advanced systems for protecting critical infrastructures and for deeply networked information tools highlights a growing link between security issues and the need for intelligent processing abilities in the area of information s- tems. To face the ever-evolving nature of cyber-threats, monitoring systems must have adaptive capabilities for continuous adjustment and timely, effective response to modifications in the environment. Moreover, the risks of improper access pose the need for advanced identification methods, including protocols to enforce comput- security…mehr
- Geräte: PC
- ohne Kopierschutz
- eBook Hilfe
- Größe: 12.8MB
- Upload möglich
Andere Kunden interessierten sich auch für
- Applications of Soft Computing (eBook, PDF)157,95 €
- The Sixth International Symposium on Neural Networks (ISNN 2009) (eBook, PDF)227,95 €
- Soft Computing in Industrial Applications (eBook, PDF)157,95 €
- Soft Computing: Methodologies and Applications (eBook, PDF)157,95 €
- Advances in Computational Intelligence (eBook, PDF)385,95 €
- Soft Computing as Transdisciplinary Science and Technology (eBook, PDF)157,95 €
- -29%11Applied Soft Computing Technologies: The Challenge of Complexity (eBook, PDF)227,95 €
-
-
-
The research scenario in advanced systems for protecting critical infrastructures and for deeply networked information tools highlights a growing link between security issues and the need for intelligent processing abilities in the area of information s- tems. To face the ever-evolving nature of cyber-threats, monitoring systems must have adaptive capabilities for continuous adjustment and timely, effective response to modifications in the environment. Moreover, the risks of improper access pose the need for advanced identification methods, including protocols to enforce comput- security policies and biometry-related technologies for physical authentication. C- putational Intelligence methods offer a wide variety of approaches that can be fruitful in those areas, and can play a crucial role in the adaptive process by their ability to learn empirically and adapt a system’s behaviour accordingly. The International Workshop on Computational Intelligence for Security in Inf- mation Systems (CISIS) proposes a meeting ground to the various communities - volved in building intelligent systems for security, namely: information security, data mining, adaptive learning methods and soft computing among others. The main goal is to allow experts and researchers to assess the benefits of learning methods in the data-mining area for information-security applications. The Workshop offers the opportunity to interact with the leading industries actively involved in the critical area of security, and have a picture of the current solutions adopted in practical domains. This volume of Advances in Soft Computing contains accepted papers presented at CISIS’08, which was held in Genova, Italy, on October 23rd–24th, 2008.
Produktdetails
- Produktdetails
- Verlag: Springer Berlin
- Erscheinungstermin: 24. Oktober 2008
- Englisch
- ISBN-13: 9783540881810
- Artikelnr.: 37372392
- Verlag: Springer Berlin
- Erscheinungstermin: 24. Oktober 2008
- Englisch
- ISBN-13: 9783540881810
- Artikelnr.: 37372392
Computational Intelligence Methods for Fighting Crime.- An Artificial Neural Network for Bank Robbery Risk Management: The OS.SI.F Web On-Line Tool of the ABI Anti-crime Department.- Secure Judicial Communication Exchange Using Soft-computing Methods and Biometric Authentication.- Identity Resolution in Criminal Justice Data: An Application of NORA.- PTK: An Alternative Advanced Interface for the Sleuth Kit.- Text Mining and Intelligence.- Stalker, a Multilingual Text Mining Search Engine for Open Source Intelligence.- Computational Intelligence Solutions for Homeland Security.- Virtual Weapons for Real Wars: Text Mining for National Security.- Hypermetric k-Means Clustering for Content-Based Document Management.- Critical Infrastructure Protection.- Security Issues in Drinking Water Distribution Networks.- Trusted-Computing Technologies for the Protection of Critical Information Systems.- A First Simulation of Attacks in the Automotive Network Communications Protocol FlexRay.- Wireless Sensor Data Fusion for Critical Infrastructure Security.- Development of Anti Intruders Underwater Systems: Time Domain Evaluation of the Self-informed Magnetic Networks Performance.- Monitoring and Diagnosing Railway Signalling with Logic-Based Distributed Agents.- SeSaR: Security for Safety.- Network Security.- Automatic Verification of Firewall Configuration with Respect to Security Policy Requirements.- Automated Framework for Policy Optimization in Firewalls and Security Gateways.- An Intrusion Detection System Based on Hierarchical Self-Organization.- Evaluating Sequential Combination of Two Genetic Algorithm-Based Solutions for Intrusion Detection.- Agents and Neural Networks for Intrusion Detection.- Cluster Analysis for Anomaly Detection.- Statistical Anomaly Detection on Real e-Mail Traffic.- On-the-fly Statistical Classification of Internet Traffic at Application Layer Based on Cluster Analysis.- Flow Level Data Mining of DNS Query Streams for Email Worm Detection.- Adaptable Text Filters and Unsupervised Neural Classifiers for Spam Detection.- A Preliminary Performance Comparison of Two Feature Sets for Encrypted Traffic Classification.- Dynamic Scheme for Packet Classification Using Splay Trees.- A Novel Algorithm for Freeing Network from Points of Failure.- Biometry.- A Multi-biometric Verification System for the Privacy Protection of Iris Templates.- Score Information Decision Fusion Using Support Vector Machine for a Correlation Filter Based Speaker Authentication System.- Application of 2DPCA Based Techniques in DCT Domain for Face Recognition.- Fingerprint Based Male-Female Classification.- BSDT Multi-valued Coding in Discrete Spaces.- A Fast and Distortion Tolerant Hashing for Fingerprint Image Authentication.- The Concept of Application of Fuzzy Logic in Biometric Authentication Systems.- Information Protection.- Bidirectional Secret Communication by Quantum Collisions.- Semantic Region Protection Using Hu Moments and a Chaotic Pseudo-random Number Generator.- Random r-Continuous Matching Rule for Immune-Based Secure Storage System.- Industrial Perspectives.- nokLINK: A New Solution for Enterprise Security.- SLA and LAC: New Solutions for Security Monitoring in the Enterprise.
Computational Intelligence Methods for Fighting Crime.- An Artificial Neural Network for Bank Robbery Risk Management: The OS.SI.F Web On-Line Tool of the ABI Anti-crime Department.- Secure Judicial Communication Exchange Using Soft-computing Methods and Biometric Authentication.- Identity Resolution in Criminal Justice Data: An Application of NORA.- PTK: An Alternative Advanced Interface for the Sleuth Kit.- Text Mining and Intelligence.- Stalker, a Multilingual Text Mining Search Engine for Open Source Intelligence.- Computational Intelligence Solutions for Homeland Security.- Virtual Weapons for Real Wars: Text Mining for National Security.- Hypermetric k-Means Clustering for Content-Based Document Management.- Critical Infrastructure Protection.- Security Issues in Drinking Water Distribution Networks.- Trusted-Computing Technologies for the Protection of Critical Information Systems.- A First Simulation of Attacks in the Automotive Network Communications Protocol FlexRay.- Wireless Sensor Data Fusion for Critical Infrastructure Security.- Development of Anti Intruders Underwater Systems: Time Domain Evaluation of the Self-informed Magnetic Networks Performance.- Monitoring and Diagnosing Railway Signalling with Logic-Based Distributed Agents.- SeSaR: Security for Safety.- Network Security.- Automatic Verification of Firewall Configuration with Respect to Security Policy Requirements.- Automated Framework for Policy Optimization in Firewalls and Security Gateways.- An Intrusion Detection System Based on Hierarchical Self-Organization.- Evaluating Sequential Combination of Two Genetic Algorithm-Based Solutions for Intrusion Detection.- Agents and Neural Networks for Intrusion Detection.- Cluster Analysis for Anomaly Detection.- Statistical Anomaly Detection on Real e-Mail Traffic.- On-the-fly Statistical Classification of Internet Traffic at Application Layer Based on Cluster Analysis.- Flow Level Data Mining of DNS Query Streams for Email Worm Detection.- Adaptable Text Filters and Unsupervised Neural Classifiers for Spam Detection.- A Preliminary Performance Comparison of Two Feature Sets for Encrypted Traffic Classification.- Dynamic Scheme for Packet Classification Using Splay Trees.- A Novel Algorithm for Freeing Network from Points of Failure.- Biometry.- A Multi-biometric Verification System for the Privacy Protection of Iris Templates.- Score Information Decision Fusion Using Support Vector Machine for a Correlation Filter Based Speaker Authentication System.- Application of 2DPCA Based Techniques in DCT Domain for Face Recognition.- Fingerprint Based Male-Female Classification.- BSDT Multi-valued Coding in Discrete Spaces.- A Fast and Distortion Tolerant Hashing for Fingerprint Image Authentication.- The Concept of Application of Fuzzy Logic in Biometric Authentication Systems.- Information Protection.- Bidirectional Secret Communication by Quantum Collisions.- Semantic Region Protection Using Hu Moments and a Chaotic Pseudo-random Number Generator.- Random r-Continuous Matching Rule for Immune-Based Secure Storage System.- Industrial Perspectives.- nokLINK: A New Solution for Enterprise Security.- SLA and LAC: New Solutions for Security Monitoring in the Enterprise.
Computational Intelligence Methods for Fighting Crime.- An Artificial Neural Network for Bank Robbery Risk Management: The OS.SI.F Web On-Line Tool of the ABI Anti-crime Department.- Secure Judicial Communication Exchange Using Soft-computing Methods and Biometric Authentication.- Identity Resolution in Criminal Justice Data: An Application of NORA.- PTK: An Alternative Advanced Interface for the Sleuth Kit.- Text Mining and Intelligence.- Stalker, a Multilingual Text Mining Search Engine for Open Source Intelligence.- Computational Intelligence Solutions for Homeland Security.- Virtual Weapons for Real Wars: Text Mining for National Security.- Hypermetric k-Means Clustering for Content-Based Document Management.- Critical Infrastructure Protection.- Security Issues in Drinking Water Distribution Networks.- Trusted-Computing Technologies for the Protection of Critical Information Systems.- A First Simulation of Attacks in the Automotive Network Communications Protocol FlexRay.- Wireless Sensor Data Fusion for Critical Infrastructure Security.- Development of Anti Intruders Underwater Systems: Time Domain Evaluation of the Self-informed Magnetic Networks Performance.- Monitoring and Diagnosing Railway Signalling with Logic-Based Distributed Agents.- SeSaR: Security for Safety.- Network Security.- Automatic Verification of Firewall Configuration with Respect to Security Policy Requirements.- Automated Framework for Policy Optimization in Firewalls and Security Gateways.- An Intrusion Detection System Based on Hierarchical Self-Organization.- Evaluating Sequential Combination of Two Genetic Algorithm-Based Solutions for Intrusion Detection.- Agents and Neural Networks for Intrusion Detection.- Cluster Analysis for Anomaly Detection.- Statistical Anomaly Detection on Real e-Mail Traffic.- On-the-fly Statistical Classification of Internet Traffic at Application Layer Based on Cluster Analysis.- Flow Level Data Mining of DNS Query Streams for Email Worm Detection.- Adaptable Text Filters and Unsupervised Neural Classifiers for Spam Detection.- A Preliminary Performance Comparison of Two Feature Sets for Encrypted Traffic Classification.- Dynamic Scheme for Packet Classification Using Splay Trees.- A Novel Algorithm for Freeing Network from Points of Failure.- Biometry.- A Multi-biometric Verification System for the Privacy Protection of Iris Templates.- Score Information Decision Fusion Using Support Vector Machine for a Correlation Filter Based Speaker Authentication System.- Application of 2DPCA Based Techniques in DCT Domain for Face Recognition.- Fingerprint Based Male-Female Classification.- BSDT Multi-valued Coding in Discrete Spaces.- A Fast and Distortion Tolerant Hashing for Fingerprint Image Authentication.- The Concept of Application of Fuzzy Logic in Biometric Authentication Systems.- Information Protection.- Bidirectional Secret Communication by Quantum Collisions.- Semantic Region Protection Using Hu Moments and a Chaotic Pseudo-random Number Generator.- Random r-Continuous Matching Rule for Immune-Based Secure Storage System.- Industrial Perspectives.- nokLINK: A New Solution for Enterprise Security.- SLA and LAC: New Solutions for Security Monitoring in the Enterprise.
Computational Intelligence Methods for Fighting Crime.- An Artificial Neural Network for Bank Robbery Risk Management: The OS.SI.F Web On-Line Tool of the ABI Anti-crime Department.- Secure Judicial Communication Exchange Using Soft-computing Methods and Biometric Authentication.- Identity Resolution in Criminal Justice Data: An Application of NORA.- PTK: An Alternative Advanced Interface for the Sleuth Kit.- Text Mining and Intelligence.- Stalker, a Multilingual Text Mining Search Engine for Open Source Intelligence.- Computational Intelligence Solutions for Homeland Security.- Virtual Weapons for Real Wars: Text Mining for National Security.- Hypermetric k-Means Clustering for Content-Based Document Management.- Critical Infrastructure Protection.- Security Issues in Drinking Water Distribution Networks.- Trusted-Computing Technologies for the Protection of Critical Information Systems.- A First Simulation of Attacks in the Automotive Network Communications Protocol FlexRay.- Wireless Sensor Data Fusion for Critical Infrastructure Security.- Development of Anti Intruders Underwater Systems: Time Domain Evaluation of the Self-informed Magnetic Networks Performance.- Monitoring and Diagnosing Railway Signalling with Logic-Based Distributed Agents.- SeSaR: Security for Safety.- Network Security.- Automatic Verification of Firewall Configuration with Respect to Security Policy Requirements.- Automated Framework for Policy Optimization in Firewalls and Security Gateways.- An Intrusion Detection System Based on Hierarchical Self-Organization.- Evaluating Sequential Combination of Two Genetic Algorithm-Based Solutions for Intrusion Detection.- Agents and Neural Networks for Intrusion Detection.- Cluster Analysis for Anomaly Detection.- Statistical Anomaly Detection on Real e-Mail Traffic.- On-the-fly Statistical Classification of Internet Traffic at Application Layer Based on Cluster Analysis.- Flow Level Data Mining of DNS Query Streams for Email Worm Detection.- Adaptable Text Filters and Unsupervised Neural Classifiers for Spam Detection.- A Preliminary Performance Comparison of Two Feature Sets for Encrypted Traffic Classification.- Dynamic Scheme for Packet Classification Using Splay Trees.- A Novel Algorithm for Freeing Network from Points of Failure.- Biometry.- A Multi-biometric Verification System for the Privacy Protection of Iris Templates.- Score Information Decision Fusion Using Support Vector Machine for a Correlation Filter Based Speaker Authentication System.- Application of 2DPCA Based Techniques in DCT Domain for Face Recognition.- Fingerprint Based Male-Female Classification.- BSDT Multi-valued Coding in Discrete Spaces.- A Fast and Distortion Tolerant Hashing for Fingerprint Image Authentication.- The Concept of Application of Fuzzy Logic in Biometric Authentication Systems.- Information Protection.- Bidirectional Secret Communication by Quantum Collisions.- Semantic Region Protection Using Hu Moments and a Chaotic Pseudo-random Number Generator.- Random r-Continuous Matching Rule for Immune-Based Secure Storage System.- Industrial Perspectives.- nokLINK: A New Solution for Enterprise Security.- SLA and LAC: New Solutions for Security Monitoring in the Enterprise.