International Joint Conference CISIS'12, ICEUTE'12, SOCO'12 special sessions /
Saved in:
Corporate Authors: | ; ; ; |
---|---|
Group Author: | |
Published: |
Springer,
|
Publisher Address: | Berlin ; New York : |
Publication Dates: | 2013. |
Literature type: | eBook |
Language: | English |
Series: |
Advances in intelligent systems and computing,
189 |
Subjects: | |
Online Access: |
http://dx.doi.org/10.1007/978-3-642-33018-6 |
Item Description: | Includes author index. |
Carrier Form: | 1 online resource. |
ISBN: |
9783642330186 (electronic bk.) 3642330185 (electronic bk.) |
Index Number: | TK5105 |
CLC: | TP393.08-532 |
Contents: |
Automatic Analysis of Web Service Honeypot Data Using Machine Learning Techniques / A Security Pattern-Driven Approach toward the Automation of Risk Treatment in Business Processes / Neural Network Ensembles Design with Self-Configuring Genetic Programming Algorithm for Solving Computer Security Problems / Clustering for Intrusion Detection: Network Scans as a Case of Study / Sensor Networks Security Based on Sensitive Robots Agents: A Conceptual Model / Comments on a Cryptosystem Proposed by Wang and Hu / Equivalent Inner Key Recovery Attack to NMAC / Hybrid Compression of the Aho-Corasick Automaton for Static Analysis in Intrusion Detection Systems / Tracking Traitors in Web Services via Blind Signatures / C&C Techniques in Botnet Development / How Political Illusions Harm National Stability: Fiscal Illusion as a Source of Taxation / Software Implementation of Linear Feedback Shift Registers over Extended Fields / Simulation Analysis of Static and Dynamic Intermediate Nodes and Performance Comparison of MANETS Routing Protocols / On Fitness Function Based upon Quasigroups Power Sequences / Investigation on Operating Systems Identification by Means of Fractal Geometry and OS Pseudorandom Number Generators / Usability of Software Intrusion-Detection System in Web Applications / A Genetic Algorithm for Solving RSA Problem in Elastic Optical Networks with Dedicated Path Protection / Correlation Approach for SQL Injection Attacks Detection / Information Exchange Mechanism between Federated Domains: P2P Approach / Web Spam Detection Using MapReduce Approach to Collective Classification / Analysis of Selected Aspects of "IBM I" Security / Metaheuristic Approach for Survivable P2P Multicasting Flow Assignment in Dual Homing Networks / A Tabu Search Algorithm for Optimization of Survivable Overlay Computing Systems / Greedy Algorithms for Network Anomaly Detection / Combined Classifiers with Neural Fuser for Spam Detection / Combined Bayesian Classifiers Applied to Spam Filtering Problem / Negobot: A Conversational Agent Based on Game Theory for the Detection of Paedophile Behaviour / OPEM: A Static-Dynamic Approach for Machine-Learning-Based Malware Detection / Adult Content Filtering through Compression-Based Text Classification / PUMA: Permission Usage to Detect Malware in Android / Application of Soft Computing Technologies toward Assessment and Skills Development / An Interactive Mathematica Book / Biorefinery Virtual Lab-Integrating E-learning Techniques and Theoretical Learning / Approaching System Administration as a Group Project in Computer Engineering Higher Education / Speed Control of A.C. Drive with Induction Motor Using Genetic Algorithm / Applications of Artificial Neural Networks in Control of DC Drive / Energy Optimization of a Dynamic System Controller / Optimal Input Vector Based Fuzzy Controller Rules Design / Correlation Methods of OCR Algorithm for Traffic Sign Detection Implementable in Microcontrollers / Takagi-Sugeno Fuzzy Model in Task of Controllers Design / Real-Time Estimation of Induction Motor Parameters Based on the Genetic Algorithm / Comparison of Fuzzy Logic Based and Sliding Mode Based Controller for IM Drive Fed by Matrix Converter / Discrete-Time Markov Chains in Reliability Analysis-Case Study / Genetic Algorithm Based Optimization of MGP-FIR Current Reference Generator for Active Power Filters / Correlation-Based Neural Gas for Visualizing Correlations between EEG Features / Built-in Smartphone Accelerometer Motion Pattern Recognition Using Wavelet Transform / Temporal Analysis of Remotely Sensed Data for the Assessment of COPD Patients' Health Status / Encoding Time Series Data for Better Clustering Results / Pattern Recognition in EEG Cognitive Signals Accelerated by GPU / On the Potential of Fuzzy Rule-Based Ensemble Forecasting / Recognition of Damaged Letters Based on Mathematical Fuzzy Logic Analysis / Image Reconstruction with Usage of the F-Transform / Image Compression with Artificial Neural Networks / Image Compression Methodology Based on Fuzzy Transform / Implementation of Background Knowledge and Properties Induced by Fuzzy Confirmation Measures in Apriori Algorithm / |