Sold Out
Book Categories |
Computational Intelligence Methods for Fighting Crime
An Artificial Neural Network for Bank Robbery Risk Management: The OS.SI.F Web On-Line Tool of the ABI Anti-crime Department Carlo Guazzoni Gaetano Bruno Ronsivalle 1
Secure Judicial Communication Exchange Using Soft-computing Methods and Biometric Authentication Mauro Cislaghi George Eleftherakis Roberto Mazzilli Francois Mohier Sara Ferri Valerio Giuffrida Elisa Negroni 11
Identity Resolution in Criminal Justice Data: An Application of NORA Queen E. Booker 19
PTK: An Alternative Advanced Interface for the Sleuth Kit Dario V. Forte Angelo Cavallini Cristiano Maruti Luca Losio Thomas Orlandi Michele Zambelli 27
Text Mining and Intelligence
Stalker, a Multilingual Text Mining Search Engine for Open Source Intelligence F. Neri M. Pettoni 35
Computational Intelligence Solutions for Homeland Security Enrico Appiani Giuseppe Buslacchi 43
Virtual Weapons for Real Wars: Text Mining for National Security Alessandro Zanasi 53
Hypermetric k-Means Clustering for Content-Based Document Management Sergio Decherchi Paolo Gastaldo Judith Redi Rodolfo Zunino 61
Critical Infrastructure Protection
Security Issues in Drinking Water Distribution Networks Demetrios G. Eliades Marios M. Polycarpou 69
Trusted-Computing Technologies for the Protection of Critical Information Systems Antonio Lioy Gianluca Ramunno Davide Vernizzi 77
A First Simulation of Attacks in the Automotive Network Communications Protocol FlexRay Dennis K. Nilsson Ulf E. Larson Francesco Picasso Erland Jonsson 84
Wireless Sensor Data Fusion for Critical Infrastructure Security Francesco Flammini Andrea Gaglione Nicola Mazzocca Vincenzo MoscatoConcetta Pragliola 92
Development of Anti Intruders Underwater Systems: Time Domain Evaluation of the Self-informed Magnetic Networks Performance Osvaldo Faggioni Maurizio Soldani Amleto Gabellone Paolo Maggiani Davide Leoncini 100
Monitoring and Diagnosing Railway Signalling with Logic-Based Distributed Agents Viviana Mascardi Daniela Briola Maurizio Martelli Riccardo Caccia Carlo Milani 108
SeSaR: Security for Safety Ermete Meda Francesco Picasso Andrea De Domenico Paolo Mazzaron Nadia Mazzino Lorenzo Motta Aldo Tamponi 116
Network Security
Automatic Verification of Firewall Configuration with Respect to Security Policy Requirements Soutaro Matsumoto Adel Bouhoula 123
Automated Framework for Policy Optimization in Firewalls and Security Gateways Gianluca Maiolini Lorenzo Cignini Andrea Baiocchi 131
An Intrusion Detection System Based on Hierarchical Self-Organization E.J. Palomo E. Dominguez R.M. Luque J. Munoz 139
Evaluating Sequential Combination of Two Genetic Algorithm-Based Solutions for Intrusion Detection Zorana Bankovic Slobodan Bojanic Octavio Nieto-Taladriz 147
Agents and Neural Networks for Intrusion Detection Alvaro Herrero Emilio Corchado 155
Cluster Analysis for Anomaly Detection Giuseppe Lieto Fabio Orsini Genoveffa Pagano 163
Statistical Anomaly Detection on Real e-Mail Traffic Maurizio Aiello Davide Chiarella Gianluca Papaleo 170
On-the-fly Statistical Classification of Internet Traffic at Application Layer Based on Cluster Analysis Andrea Baiocchi Gianluca Maiolini Giacomo Molina Antonello Rizzi 178
Flow Level Data Mining of DNS Query Streams for Email Worm Detection Nikolaos Chatzis Radu Popescu-Zeletin 186
Adaptable Text Filters and Unsupervised Neural Classifiers for Spam Detection Bogdan Vrusias Ian Golledge 195
A Preliminary Performance Comparison of Two Feature Sets for Encrypted Traffic Classification Riyad Alshammari A. Nur Zincir-Heywood 203
Dynamic Scheme for Packet Classification Using Splay Trees Nizar Ben-Neji Adel Bouhoula 211
A Novel Algorithm for Freeing Network from Points of Failure Rahul Gupta Suneeta Agarwal 219
Biometry
A Multi-biometric Verification System for the Privacy Protection of Iris Templates S. Cimato M. Gamassi V. Piuri R. Sassi F. Scotti 227
Score Information Decision Fusion Using Support Vector Machine for a Correlation Filter Based Speaker Authentication System Dzati Athiar Ramli Salina Abdul Samad Aini Hussain 235
Application of 2DPCA Based Techniques in DCT Domain for Face Recognition Messaoud Bengherabi Lamia Mezai Farid Harizi Abderrazak Guessoum Mohamed Cheriet 243
Fingerprint Based Male-Female Classification Manish Verma Suneeta Agarwal 251
BSDT Multi-valued Coding in Discrete Spaces Petro Gopych 258
A Fast and Distortion Tolerant Hashing for Fingerprint Image Authentication Thi Hoi Le The Duy Bui 266
The Concept of Application of Fuzzy Logic in Biometric Authentication Systems Anatoly Sachenko Arkadiusz Banasik Adrian Kapczynski 274
Information Protection
Bidirectional Secret Communication by Quantum Collisions Fabio Antonio Bovino 280
Semantic Region Protection Using Hu Moments and a Chaotic Pseudo-random Number Generator Paraskevi Tzouveli Klimis Ntalianis Stefanos Kollias 286
Random r-Continuous Matching Rule for Immune-Based Secure Storage System Cai Tao Ju ShiGuang Zhong Wei Niu DeJiao 294
Industrial Perspectives
nokLINK: A New Solution for Enterprise Security Francesco Pedersoli Massimiliano Cristiano 301
SLA & LAC: New Solutions for Security Monitoring in the Enterprise Bruno Giacometti 309
Author Index 317
Login|Complaints|Blog|Games|Digital Media|Souls|Obituary|Contact Us|FAQ
CAN'T FIND WHAT YOU'RE LOOKING FOR? CLICK HERE!!! X
You must be logged in to add to WishlistX
This item is in your Wish ListX
This item is in your CollectionProceedings of the International Workshop on Computational Intelligence in Security for Information Systems CISIS 2008 [With CDROM]
X
This Item is in Your InventoryProceedings of the International Workshop on Computational Intelligence in Security for Information Systems CISIS 2008 [With CDROM]
X
You must be logged in to review the productsX
X
X
Add Proceedings of the International Workshop on Computational Intelligence in Security for Information Systems CISIS 2008 [With CDROM], The International Workshop on Computational Intelligence for Security in Information Systems (CISIS) proposes a meeting ground to the various communities involved in building intelligent systems for security, namely: information security, data mining, ada, Proceedings of the International Workshop on Computational Intelligence in Security for Information Systems CISIS 2008 [With CDROM] to the inventory that you are selling on WonderClubX
X
Add Proceedings of the International Workshop on Computational Intelligence in Security for Information Systems CISIS 2008 [With CDROM], The International Workshop on Computational Intelligence for Security in Information Systems (CISIS) proposes a meeting ground to the various communities involved in building intelligent systems for security, namely: information security, data mining, ada, Proceedings of the International Workshop on Computational Intelligence in Security for Information Systems CISIS 2008 [With CDROM] to your collection on WonderClub |