Proceedings of the International Workshop on Computational Intelligence in Security for Information Systems CISIS 2008
Springer Berlin (Verlag)
978-3-540-88180-3 (ISBN)
Computational Intelligence Methods for Fighting Crime.- An Artificial Neural Network for Bank Robbery Risk Management: The OS.SI.F Web On-Line Tool of the ABI Anti-crime Department.- Secure Judicial Communication Exchange Using Soft-computing Methods and Biometric Authentication.- Identity Resolution in Criminal Justice Data: An Application of NORA.- PTK: An Alternative Advanced Interface for the Sleuth Kit.- Text Mining and Intelligence.- Stalker, a Multilingual Text Mining Search Engine for Open Source Intelligence.- Computational Intelligence Solutions for Homeland Security.- Virtual Weapons for Real Wars: Text Mining for National Security.- Hypermetric k-Means Clustering for Content-Based Document Management.- Critical Infrastructure Protection.- Security Issues in Drinking Water Distribution Networks.- Trusted-Computing Technologies for the Protection of Critical Information Systems.- A First Simulation of Attacks in the Automotive Network Communications Protocol FlexRay.- Wireless Sensor Data Fusion for Critical Infrastructure Security.- Development of Anti Intruders Underwater Systems: Time Domain Evaluation of the Self-informed Magnetic Networks Performance.- Monitoring and Diagnosing Railway Signalling with Logic-Based Distributed Agents.- SeSaR: Security for Safety.- Network Security.- Automatic Verification of Firewall Configuration with Respect to Security Policy Requirements.- Automated Framework for Policy Optimization in Firewalls and Security Gateways.- An Intrusion Detection System Based on Hierarchical Self-Organization.- Evaluating Sequential Combination of Two Genetic Algorithm-Based Solutions for Intrusion Detection.- Agents and Neural Networks for Intrusion Detection.- Cluster Analysis for Anomaly Detection.- Statistical Anomaly Detection on Real e-Mail Traffic.- On-the-fly Statistical Classification of Internet Traffic at Application Layer Based on Cluster Analysis.- Flow Level Data Mining of DNS Query Streams for Email Worm Detection.- Adaptable Text Filters and Unsupervised Neural Classifiers for Spam Detection.- A Preliminary Performance Comparison of Two Feature Sets for Encrypted Traffic Classification.- Dynamic Scheme for Packet Classification Using Splay Trees.- A Novel Algorithm for Freeing Network from Points of Failure.- Biometry.- A Multi-biometric Verification System for the Privacy Protection of Iris Templates.- Score Information Decision Fusion Using Support Vector Machine for a Correlation Filter Based Speaker Authentication System.- Application of 2DPCA Based Techniques in DCT Domain for Face Recognition.- Fingerprint Based Male-Female Classification.- BSDT Multi-valued Coding in Discrete Spaces.- A Fast and Distortion Tolerant Hashing for Fingerprint Image Authentication.- The Concept of Application of Fuzzy Logic in Biometric Authentication Systems.- Information Protection.- Bidirectional Secret Communication by Quantum Collisions.- Semantic Region Protection Using Hu Moments and a Chaotic Pseudo-random Number Generator.- Random r-Continuous Matching Rule for Immune-Based Secure Storage System.- Industrial Perspectives.- nokLINK: A New Solution for Enterprise Security.- SLA and LAC: New Solutions for Security Monitoring in the Enterprise.
| Erscheint lt. Verlag | 16.10.2008 |
|---|---|
| Reihe/Serie | Advances in Intelligent and Soft Computing |
| Zusatzinfo | XIII, 318 p. |
| Verlagsort | Berlin |
| Sprache | englisch |
| Gewicht | 509 g |
| Themenwelt | Informatik ► Theorie / Studium ► Künstliche Intelligenz / Robotik |
| Mathematik / Informatik ► Mathematik ► Angewandte Mathematik | |
| Technik | |
| Schlagworte | Agents • algorithms • Artificial Neural Network • Cognition • Computational Intelligence • Data Mining • Fuzzy Logic • Genetic Algorithm • Hardcover, Softcover / Technik/Allgemeines, Lexika • HC/Technik/Allgemeines, Lexika • information systems • learning • neural network • Optimization • security • Simulation • Spam • verification |
| ISBN-10 | 3-540-88180-8 / 3540881808 |
| ISBN-13 | 978-3-540-88180-3 / 9783540881803 |
| Zustand | Neuware |
| Informationen gemäß Produktsicherheitsverordnung (GPSR) | |
| Haben Sie eine Frage zum Produkt? |
aus dem Bereich