Wonder Club world wonders pyramid logo
×

Proceedings of the International Workshop on Computational Intelligence in Security for Information Systems CISIS 2008 [With CDROM] Book

Proceedings of the International Workshop on Computational Intelligence in Security for Information Systems CISIS 2008 [With CDROM]
Proceedings of the International Workshop on Computational Intelligence in Security for Information Systems CISIS 2008 [With CDROM], The International Workshop on Computational Intelligence for Security in Information Systems (CISIS) proposes a meeting ground to the various communities involved in building intelligent systems for security, namely: information security, data mining, ada, Proceedings of the International Workshop on Computational Intelligence in Security for Information Systems CISIS 2008 [With CDROM] has a rating of 4 stars
   2 Ratings
X
Proceedings of the International Workshop on Computational Intelligence in Security for Information Systems CISIS 2008 [With CDROM], The International Workshop on Computational Intelligence for Security in Information Systems (CISIS) proposes a meeting ground to the various communities involved in building intelligent systems for security, namely: information security, data mining, ada, Proceedings of the International Workshop on Computational Intelligence in Security for Information Systems CISIS 2008 [With CDROM]
4 out of 5 stars based on 2 reviews
5
0 %
4
100 %
3
0 %
2
0 %
1
0 %
Digital Copy
PDF format
1 available   for $236.61
Original Magazine
Physical Format

Sold Out

  • Proceedings of the International Workshop on Computational Intelligence in Security for Information Systems CISIS 2008 [With CDROM]
  • Written by author Emilio Corchado
  • Published by Springer-Verlag New York, LLC, November 2008
  • The International Workshop on Computational Intelligence for Security in Information Systems (CISIS) proposes a meeting ground to the various communities involved in building intelligent systems for security, namely: information security, data mining, ada
  • The International Workshop on Computational Intelligence for Security in Information Systems (CISIS) proposes a meeting ground to the various communities involved in building intelligent systems for security, namely: information security, data mining,
Buy Digital  USD$236.61

WonderClub View Cart Button

WonderClub Add to Inventory Button
WonderClub Add to Wishlist Button
WonderClub Add to Collection Button

Book Categories

Authors

Computational Intelligence Methods for Fighting Crime

An Artificial Neural Network for Bank Robbery Risk Management: The OS.SI.F Web On-Line Tool of the ABI Anti-crime Department Carlo Guazzoni Gaetano Bruno Ronsivalle 1

Secure Judicial Communication Exchange Using Soft-computing Methods and Biometric Authentication Mauro Cislaghi George Eleftherakis Roberto Mazzilli Francois Mohier Sara Ferri Valerio Giuffrida Elisa Negroni 11

Identity Resolution in Criminal Justice Data: An Application of NORA Queen E. Booker 19

PTK: An Alternative Advanced Interface for the Sleuth Kit Dario V. Forte Angelo Cavallini Cristiano Maruti Luca Losio Thomas Orlandi Michele Zambelli 27

Text Mining and Intelligence

Stalker, a Multilingual Text Mining Search Engine for Open Source Intelligence F. Neri M. Pettoni 35

Computational Intelligence Solutions for Homeland Security Enrico Appiani Giuseppe Buslacchi 43

Virtual Weapons for Real Wars: Text Mining for National Security Alessandro Zanasi 53

Hypermetric k-Means Clustering for Content-Based Document Management Sergio Decherchi Paolo Gastaldo Judith Redi Rodolfo Zunino 61

Critical Infrastructure Protection

Security Issues in Drinking Water Distribution Networks Demetrios G. Eliades Marios M. Polycarpou 69

Trusted-Computing Technologies for the Protection of Critical Information Systems Antonio Lioy Gianluca Ramunno Davide Vernizzi 77

A First Simulation of Attacks in the Automotive Network Communications Protocol FlexRay Dennis K. Nilsson Ulf E. Larson Francesco Picasso Erland Jonsson 84

Wireless Sensor Data Fusion for Critical Infrastructure Security Francesco Flammini Andrea Gaglione Nicola Mazzocca Vincenzo MoscatoConcetta Pragliola 92

Development of Anti Intruders Underwater Systems: Time Domain Evaluation of the Self-informed Magnetic Networks Performance Osvaldo Faggioni Maurizio Soldani Amleto Gabellone Paolo Maggiani Davide Leoncini 100

Monitoring and Diagnosing Railway Signalling with Logic-Based Distributed Agents Viviana Mascardi Daniela Briola Maurizio Martelli Riccardo Caccia Carlo Milani 108

SeSaR: Security for Safety Ermete Meda Francesco Picasso Andrea De Domenico Paolo Mazzaron Nadia Mazzino Lorenzo Motta Aldo Tamponi 116

Network Security

Automatic Verification of Firewall Configuration with Respect to Security Policy Requirements Soutaro Matsumoto Adel Bouhoula 123

Automated Framework for Policy Optimization in Firewalls and Security Gateways Gianluca Maiolini Lorenzo Cignini Andrea Baiocchi 131

An Intrusion Detection System Based on Hierarchical Self-Organization E.J. Palomo E. Dominguez R.M. Luque J. Munoz 139

Evaluating Sequential Combination of Two Genetic Algorithm-Based Solutions for Intrusion Detection Zorana Bankovic Slobodan Bojanic Octavio Nieto-Taladriz 147

Agents and Neural Networks for Intrusion Detection Alvaro Herrero Emilio Corchado 155

Cluster Analysis for Anomaly Detection Giuseppe Lieto Fabio Orsini Genoveffa Pagano 163

Statistical Anomaly Detection on Real e-Mail Traffic Maurizio Aiello Davide Chiarella Gianluca Papaleo 170

On-the-fly Statistical Classification of Internet Traffic at Application Layer Based on Cluster Analysis Andrea Baiocchi Gianluca Maiolini Giacomo Molina Antonello Rizzi 178

Flow Level Data Mining of DNS Query Streams for Email Worm Detection Nikolaos Chatzis Radu Popescu-Zeletin 186

Adaptable Text Filters and Unsupervised Neural Classifiers for Spam Detection Bogdan Vrusias Ian Golledge 195

A Preliminary Performance Comparison of Two Feature Sets for Encrypted Traffic Classification Riyad Alshammari A. Nur Zincir-Heywood 203

Dynamic Scheme for Packet Classification Using Splay Trees Nizar Ben-Neji Adel Bouhoula 211

A Novel Algorithm for Freeing Network from Points of Failure Rahul Gupta Suneeta Agarwal 219

Biometry

A Multi-biometric Verification System for the Privacy Protection of Iris Templates S. Cimato M. Gamassi V. Piuri R. Sassi F. Scotti 227

Score Information Decision Fusion Using Support Vector Machine for a Correlation Filter Based Speaker Authentication System Dzati Athiar Ramli Salina Abdul Samad Aini Hussain 235

Application of 2DPCA Based Techniques in DCT Domain for Face Recognition Messaoud Bengherabi Lamia Mezai Farid Harizi Abderrazak Guessoum Mohamed Cheriet 243

Fingerprint Based Male-Female Classification Manish Verma Suneeta Agarwal 251

BSDT Multi-valued Coding in Discrete Spaces Petro Gopych 258

A Fast and Distortion Tolerant Hashing for Fingerprint Image Authentication Thi Hoi Le The Duy Bui 266

The Concept of Application of Fuzzy Logic in Biometric Authentication Systems Anatoly Sachenko Arkadiusz Banasik Adrian Kapczynski 274

Information Protection

Bidirectional Secret Communication by Quantum Collisions Fabio Antonio Bovino 280

Semantic Region Protection Using Hu Moments and a Chaotic Pseudo-random Number Generator Paraskevi Tzouveli Klimis Ntalianis Stefanos Kollias 286

Random r-Continuous Matching Rule for Immune-Based Secure Storage System Cai Tao Ju ShiGuang Zhong Wei Niu DeJiao 294

Industrial Perspectives

nokLINK: A New Solution for Enterprise Security Francesco Pedersoli Massimiliano Cristiano 301

SLA & LAC: New Solutions for Security Monitoring in the Enterprise Bruno Giacometti 309

Author Index 317


Login

  |  

Complaints

  |  

Blog

  |  

Games

  |  

Digital Media

  |  

Souls

  |  

Obituary

  |  

Contact Us

  |  

FAQ

CAN'T FIND WHAT YOU'RE LOOKING FOR? CLICK HERE!!!

X
WonderClub Home

This item is in your Wish List

Proceedings of the International Workshop on Computational Intelligence in Security for Information Systems CISIS 2008 [With CDROM], The International Workshop on Computational Intelligence for Security in Information Systems (CISIS) proposes a meeting ground to the various communities involved in building intelligent systems for security, namely: information security, data mining, ada, Proceedings of the International Workshop on Computational Intelligence in Security for Information Systems CISIS 2008 [With CDROM]

X
WonderClub Home

This item is in your Collection

Proceedings of the International Workshop on Computational Intelligence in Security for Information Systems CISIS 2008 [With CDROM], The International Workshop on Computational Intelligence for Security in Information Systems (CISIS) proposes a meeting ground to the various communities involved in building intelligent systems for security, namely: information security, data mining, ada, Proceedings of the International Workshop on Computational Intelligence in Security for Information Systems CISIS 2008 [With CDROM]

Proceedings of the International Workshop on Computational Intelligence in Security for Information Systems CISIS 2008 [With CDROM]

X
WonderClub Home

This Item is in Your Inventory

Proceedings of the International Workshop on Computational Intelligence in Security for Information Systems CISIS 2008 [With CDROM], The International Workshop on Computational Intelligence for Security in Information Systems (CISIS) proposes a meeting ground to the various communities involved in building intelligent systems for security, namely: information security, data mining, ada, Proceedings of the International Workshop on Computational Intelligence in Security for Information Systems CISIS 2008 [With CDROM]

Proceedings of the International Workshop on Computational Intelligence in Security for Information Systems CISIS 2008 [With CDROM]

WonderClub Home

You must be logged in to review the products

E-mail address:

Password: