Zum Hauptinhalt springen
Nicht aus der Schweiz? Besuchen Sie lehmanns.de

Computational Intelligence in Security for Information Systems 2010 (eBook)

Proceedings of the 3rd International Conference on Computational Intelligence in Security for Information Systems (CISIS’10)
eBook Download: PDF
2010
240 Seiten
Springer Berlin (Verlag)
9783642166266 (ISBN)

Lese- und Medienproben

Computational Intelligence in Security for Information Systems 2010 -
Systemvoraussetzungen
149,79 inkl. MwSt
(CHF 146,30)
Der eBook-Verkauf erfolgt durch die Lehmanns Media GmbH (Berlin) zum Preis in Euro inkl. MwSt.
  • Download sofort lieferbar
  • Zahlungsarten anzeigen
rd The 3 International Conference on Computational Intelligence in Security for Information Systems (CISIS 2010) provided a broad and interdisciplinary forum to present the most recent developments in several very active scientific areas such as Machine Learning, Infrastructure Protection, Intelligent Methods in Energy and Transportation, Network Security, Biometry, Cryptography, High-performance and Grid Computing, and Industrial Perspective among others. The global purpose of CISIS series of conferences has been to form a broad and interdisciplinary meeting ground offering the opportunity to interact with the leading research team and industries actively involved in the critical area of security, and have a picture of the current solutions adopted in practical domains. This volume of Advances in Intelligence and Soft Computing contains accepted papers presented at CISIS 2010, which was held in León, Spain, on November 11-12, 2010. CISIS 2010 received over 50 technical submissions. After a thorough peer-review process, the International Program Committee - lected 25 papers which are published in this conference proceedings. This allowed the Scientific Committee to verify the vital and crucial nature of the topics - volved in the event, and resulted in an acceptance rate close to 50% of the ori- nally submitted manuscripts.

Title 1
Preface 5
Organization 7
Contents 13
Chapter 1 Machine Learning and Intelligence 16
An Incremental Density-Based Clustering Technique for Large Datasets 17
Introduction 17
What Is DBSCAN? 18
Related Work 19
Incremental DBSCAN Algorithm 20
Dataset Sorting 20
Region Query 20
Cluster Merging 21
Computational Complexity 23
Experimental Details 23
Conclusion and Future Work 24
References 24
BSDT ROC and Cognitive Learning Hypothesis 26
Introduction 26
BSDT Coding-Decoding and Performance 27
BSDT Cognitive Learning Hypothesis 28
BSDT ROC Fitting Procedure 29
BSDT ROCs for Patients with Brain Damage 32
Discussion and Conclusions 33
References 35
Evolving Fuzzy Classifier for Data Mining - an Information Retrieval Approach 37
Introduction 37
Fuzzy Information Retrieval 38
Genetic Algorithms and Genetic Programming 39
GP for the Evolutionary Query Optimization 40
Genetic Evolution of Fuzzy Classifier 41
Conclusions 43
References 44
Mereotopological Analysis of Formal Concepts in Security Ontologies 45
Introduction 45
Knowledge Representation in Security Ontologies 46
Representability of Security Issues 47
Ontology Visualization Based on Reasoning Services 48
Paella Tool 49
Analysis with Paella of Ontologies on Security 51
Final Remarks and Future Work 51
References 52
Chapter 2 Agents and Multi-Agent Systems 53
A Multi-agent Data Mining System for Defect Forecasting in a Decentralized Manufacturing Environment 54
Introduction 55
Agents Devoted to Render the Internal and Superficial Defects Maps 56
Agents Devoted to Develop and Maintain the Learning Context 58
Agents Devoted to Evaluate the Coils Entering the Pickling Line and to Forecast the Remaining Defects 59
Conclusions 61
References 61
A Distributed Hierarchical Multi-agent Architecture for Detecting Injections in SQL Queries 62
Introduction 62
A Multi-agent Architecture for the Detection of SQL Injection 63
Classifier CBR Agent 65
Retrieve 66
Reuse 66
Revise 67
Retain 67
Results and Conclusions 68
References 69
Incorporating Temporal Constraints in the Analysis Task of a Hybrid Intelligent IDS 71
Introduction 71
MOVICAB-IDS 72
Time-Bounding the MOVICAB-IDS Analyzer Agents 74
Temporal Bounded CBR 75
Integrating TB-CBR into the MOVICAB-IDS Analyzer Agent 76
Experimental Results 77
Conclusions 78
References 78
Chapter 3 Image, Video and Speech Processing 80
Performances of Speech Signal Biometric Systems Based on Signal to Noise Ratio Degradation 81
Introduction 82
Methodology 83
Data Acquisition 83
Feature Extraction 84
Classification 84
Results and Discussions 85
Conclusion 87
References 88
Lipreading Using n–Gram Feature Vector 89
Introduction 89
Related Work 90
$n$–Gram Feature Vector 90
Proposed Lipreading Model 91
Lip Contour Detection and Feature Extraction 91
Building n–Gram Models and Speech Recognition 92
Experimental Setup and Result Analysis 93
Result Analysis 94
Conclusions 95
References 96
Face Processing for Security: A Short Review 97
Introduction 97
Face Detection 98
Face Recogntion 99
Template Matching Face Recognition Methods 99
Statistical Learning for Recognition Algorithms 100
Neural Network Approaches 100
Classifiers for Face Recognition 101
References 102
Chapter 4 Network Security 105
Ontologies-Based Automated Intrusion Response System 106
Introduction 106
Automated Intrusion Response Systems 107
Ontology-Based AIRS Architecture 108
Architecture Components 109
Response Inference Process 111
Experimental Results 111
Conclusions 112
References 113
Semi-supervised Fingerprinting of Protocol Messages 114
Introduction 114
Semi-supervised Clustering 115
Overview 115
Formal Definition 115
Fingerprinting Protocol State Machines 116
Behavioral Tree 116
Performance Evaluation and Experimental Datasets 117
Fingerprinting with Syntactic Information 118
Syntactic Trees 118
Evaluation 119
Related Work 120
Conclusion 121
References 121
Monitoring of Spatial-Aggregated IP-Flow Records 123
Introduction 123
Spatial and Temporal Correlation 124
Kernel Functions 125
Experimental Results 126
$/sigma$ Estimation by Grid Search 126
Quantitative Measurements 127
K.-T.R.A.C.E Evaluation 128
Related Work 129
Future Work and Conclusions 129
References 130
Improving Network Security through Traffic Log Anomaly Detection Using Time Series Analysis 131
Introduction 131
Related Work 132
Scenario and Data Analysis 133
Time Series Detector 134
Results and Discussions 136
Conclusion and Future Work 138
References 138
A Threat Model Approach to Threats and Vulnerabilities in On-line Social Networks 140
Introduction 140
Threat Modelling 141
Assets at Risk by OSN 142
Threats in OSN 143
Vulnerabilities in OSN 145
Conclusion 146
References 147
An SLA-Based Approach for Network Anomaly Detection 148
Introduction 148
Background and Related Works 149
Theory of Algorithm 150
Modeling Normal Behavior of ARP Traffic with SLA 150
The Reinforcement Scheme of the Proposed Model 151
Anomaly Detection 151
Evaluation 152
Conclusions 154
References 155
Understanding Honeypot Data by an Unsupervised Neural Visualization 156
Introduction 157
A Visualization-Based Approach 158
Principal Component Analysis 159
Cooperative Maximum Likelihood Hebbian Learning 159
Experimental Study 160
Euskalert Project 160
Experiments and Results 160
Comparative Study 163
Conclusions and Future Work 163
References 164
Chapter 5 Watermarking 166
Permuted Image DCTWatermarking 167
Introduction 167
Related Work 168
Watermarking Algorithm Based on DCT 169
DCT Based Watermark Embedding and Extraction Method 169
Permutation Based Watermaking 170
Permuting Strategy 170
Watermark Embedding and Extraction after Permutation 170
Simulation Results and Their Analysis 171
Result Analysis for PSNR and SM 171
Result Analysis on the Basis of Degree of Permutation 172
Conclusions 174
References 174
A Developed WaterMark Technique for Distributed Database Security 176
Introduction 176
Watermarking for Databases 177
The Proposed Technique 178
Fast Intrusion Detection Using Neural Networks 180
Conclusion 183
References 183
Chapter 6 Cryptography 184
Trident, a New Pseudo Random Number Generator Based on Coupled Chaotic Maps 185
Introduction 185
Family of Pseudorandom Generators Based on the Combination of Chaotic Maps 186
Chaotic Map with Dynamical Variation of Coefficients and Perturbation of the Least Significant Bits 187
Trident Combined Generator 190
Conclusion 192
References 192
The Impact of the SHA-3 Casting Cryptography Competition on the Spanish IT Market 193
Introduction 193
Current Status 194
Comparison and Casting 195
Conclusions 199
How Will SHA-3 Final Selection Affect the Spanish Cryptographic Market? 200
References 201
Chapter 7 Industrial and Commercial Applications of Intelligent Methods for Security 202
A New Task Engineering Approach for Workflow Access Control 203
Introduction 203
RBAC and Role Engineering Background 204
Main Workflow Access Control Requirements 205
SoD Principle 205
LP Principle 206
The Proposed ‘Task Engineering’ Approach for Workflow Access Control 206
Need for Task Engineering in Workflow Access Control 207
Assumptions and Prerequisites 207
Some Definitions 208
Applying the Task Engineering Process 209
Conclusion and Future Works 211
References 211
OPBUS: Fault Tolerance Against Integrity Attacks in Business Processes 213
Introduction 213
OPBUS Framework Description 214
Modeling Layer 215
Application Layer 216
Fault Tolerance Layer 216
Illustrative Example 217
Implementation Details 218
Performance Evaluation 219
Related Work 220
Conclusions and Future Work 220
References 221
A Key Distribution Scheme for Live Streaming Multi-tree Overlays 223
Introduction 223
Multi-tree Overlays 224
Mesh-Based Overlays 225
Mesh-Based + Multi-tree Overlays 225
Related Work 225
An Introduction to Secret Sharing 226
The Key Distribution Scheme 226
Scenario Considered 227
Distribution of CW 227
Distribution of SK 227
Efficiency Considerations 228
Security Considerations 229
Conclusions 229
References 229
Intelligent Methods for Scheduling in Transportation 231
Introduction 231
Analysis of the Problem to be Solved 232
Resolution of the Model Proposed with the Method Proposed. Analysis of the Results Obtained 234
Level 1 of Resolution: First Grasp 235
Level 2 of Resolution: Second Grasp 236
Level 3 of Resolution: Genetic Algorithm 236
Conclusions 237
References 238
Author Index 239

Erscheint lt. Verlag 7.10.2010
Reihe/Serie Advances in Intelligent and Soft Computing
Advances in Intelligent and Soft Computing
Zusatzinfo XV, 240 p.
Verlagsort Berlin
Sprache englisch
Themenwelt Informatik Theorie / Studium Künstliche Intelligenz / Robotik
Technik
Schlagworte Agents • Biometry • Computational Intelligence • Database • Data Mining • Environment • information system • information systems • learning • machine learning • Model • multi-agent system • Ontologie • proving • security • Speech processing • Transport
ISBN-13 9783642166266 / 9783642166266
Informationen gemäß Produktsicherheitsverordnung (GPSR)
Haben Sie eine Frage zum Produkt?
PDFPDF (Wasserzeichen)

DRM: Digitales Wasserzeichen
Dieses eBook enthält ein digitales Wasser­zeichen und ist damit für Sie persona­lisiert. Bei einer missbräuch­lichen Weiter­gabe des eBooks an Dritte ist eine Rück­ver­folgung an die Quelle möglich.

Dateiformat: PDF (Portable Document Format)
Mit einem festen Seiten­layout eignet sich die PDF besonders für Fach­bücher mit Spalten, Tabellen und Abbild­ungen. Eine PDF kann auf fast allen Geräten ange­zeigt werden, ist aber für kleine Displays (Smart­phone, eReader) nur einge­schränkt geeignet.

Systemvoraussetzungen:
PC/Mac: Mit einem PC oder Mac können Sie dieses eBook lesen. Sie benötigen dafür einen PDF-Viewer - z.B. den Adobe Reader oder Adobe Digital Editions.
eReader: Dieses eBook kann mit (fast) allen eBook-Readern gelesen werden. Mit dem amazon-Kindle ist es aber nicht kompatibel.
Smartphone/Tablet: Egal ob Apple oder Android, dieses eBook können Sie lesen. Sie benötigen dafür einen PDF-Viewer - z.B. die kostenlose Adobe Digital Editions-App.

Buying eBooks from abroad
For tax law reasons we can sell eBooks just within Germany and Switzerland. Regrettably we cannot fulfill eBook-orders from other countries.

Mehr entdecken
aus dem Bereich
Die Grundlage der Digitalisierung

von Knut Hildebrand; Michael Mielke; Marcus Gebauer

eBook Download (2025)
Springer Fachmedien Wiesbaden (Verlag)
CHF 29,30
Die materielle Wahrheit hinter den neuen Datenimperien

von Kate Crawford

eBook Download (2024)
C.H.Beck (Verlag)
CHF 17,55