International Joint Conference CISIS'12, ICEUTE'12, SOCO'12 special sessions /

Saved in:
Bibliographic Details
Corporate Authors: International Conference on Computational Intelligence in Security for Information Systems Ostrava, Czech Republic); SpringerLink (Online service); ICEUTE 2012 Ostrava, Czech Republic); SOCO (Conference) Ostrava, Czech Republic)
Group Author: Herrero, Alvaro
Published: Springer,
Publisher Address: Berlin ; New York :
Publication Dates: 2013.
Literature type: eBook
Language: English
Series: Advances in intelligent systems and computing, 189
Subjects:
Online Access: http://dx.doi.org/10.1007/978-3-642-33018-6
Item Description: Includes author index.
Carrier Form: 1 online resource.
ISBN: 9783642330186 (electronic bk.)
3642330185 (electronic bk.)
Index Number: TK5105
CLC: TP393.08-532
Contents: Automatic Analysis of Web Service Honeypot Data Using Machine Learning Techniques /
A Security Pattern-Driven Approach toward the Automation of Risk Treatment in Business Processes /
Neural Network Ensembles Design with Self-Configuring Genetic Programming Algorithm for Solving Computer Security Problems /
Clustering for Intrusion Detection: Network Scans as a Case of Study /
Sensor Networks Security Based on Sensitive Robots Agents: A Conceptual Model /
Comments on a Cryptosystem Proposed by Wang and Hu /
Equivalent Inner Key Recovery Attack to NMAC /
Hybrid Compression of the Aho-Corasick Automaton for Static Analysis in Intrusion Detection Systems /
Tracking Traitors in Web Services via Blind Signatures /
C&C Techniques in Botnet Development /
How Political Illusions Harm National Stability: Fiscal Illusion as a Source of Taxation /
Software Implementation of Linear Feedback Shift Registers over Extended Fields /
Simulation Analysis of Static and Dynamic Intermediate Nodes and Performance Comparison of MANETS Routing Protocols /
On Fitness Function Based upon Quasigroups Power Sequences /
Investigation on Operating Systems Identification by Means of Fractal Geometry and OS Pseudorandom Number Generators /
Usability of Software Intrusion-Detection System in Web Applications /
A Genetic Algorithm for Solving RSA Problem in Elastic Optical Networks with Dedicated Path Protection /
Correlation Approach for SQL Injection Attacks Detection /
Information Exchange Mechanism between Federated Domains: P2P Approach /
Web Spam Detection Using MapReduce Approach to Collective Classification /
Analysis of Selected Aspects of "IBM I" Security /
Metaheuristic Approach for Survivable P2P Multicasting Flow Assignment in Dual Homing Networks /
A Tabu Search Algorithm for Optimization of Survivable Overlay Computing Systems /
Greedy Algorithms for Network Anomaly Detection /
Combined Classifiers with Neural Fuser for Spam Detection /
Combined Bayesian Classifiers Applied to Spam Filtering Problem /
Negobot: A Conversational Agent Based on Game Theory for the Detection of Paedophile Behaviour /
OPEM: A Static-Dynamic Approach for Machine-Learning-Based Malware Detection /
Adult Content Filtering through Compression-Based Text Classification /
PUMA: Permission Usage to Detect Malware in Android /
Application of Soft Computing Technologies toward Assessment and Skills Development /
An Interactive Mathematica Book /
Biorefinery Virtual Lab-Integrating E-learning Techniques and Theoretical Learning /
Approaching System Administration as a Group Project in Computer Engineering Higher Education /
Speed Control of A.C. Drive with Induction Motor Using Genetic Algorithm /
Applications of Artificial Neural Networks in Control of DC Drive /
Energy Optimization of a Dynamic System Controller /
Optimal Input Vector Based Fuzzy Controller Rules Design /
Correlation Methods of OCR Algorithm for Traffic Sign Detection Implementable in Microcontrollers /
Takagi-Sugeno Fuzzy Model in Task of Controllers Design /
Real-Time Estimation of Induction Motor Parameters Based on the Genetic Algorithm /
Comparison of Fuzzy Logic Based and Sliding Mode Based Controller for IM Drive Fed by Matrix Converter /
Discrete-Time Markov Chains in Reliability Analysis-Case Study /
Genetic Algorithm Based Optimization of MGP-FIR Current Reference Generator for Active Power Filters /
Correlation-Based Neural Gas for Visualizing Correlations between EEG Features /
Built-in Smartphone Accelerometer Motion Pattern Recognition Using Wavelet Transform /
Temporal Analysis of Remotely Sensed Data for the Assessment of COPD Patients' Health Status /
Encoding Time Series Data for Better Clustering Results /
Pattern Recognition in EEG Cognitive Signals Accelerated by GPU /
On the Potential of Fuzzy Rule-Based Ensemble Forecasting /
Recognition of Damaged Letters Based on Mathematical Fuzzy Logic Analysis /
Image Reconstruction with Usage of the F-Transform /
Image Compression with Artificial Neural Networks /
Image Compression Methodology Based on Fuzzy Transform /
Implementation of Background Knowledge and Properties Induced by Fuzzy Confirmation Measures in Apriori Algorithm /