


default search action
2. CISIS 2009: Burgos, Spain
- Álvaro Herrero

, Paolo Gastaldo, Rodolfo Zunino, Emilio Corchado:
Computational Intelligence in Security for Information Systems - CISIS'09, 2nd International Workshop, Burgos, Spain, 23-26 September 2009 Proceedings. Advances in Intelligent and Soft Computing 63, Springer 2009, ISBN 978-3-642-04090-0 - João Paulo S. Medeiros, Agostinho M. Brito Jr., Paulo S. Motta Pires:

A Data Mining Based Analysis of Nmap Operating System Fingerprint Database. 1-8 - Felipe Rolando Menchaca García, Salvador Contreras Hernández

:
Knowledge System for Application of Computer Security Rules. 9-17 - Rosa Basagoiti

, Urko Zurutuza
, Asier Aztiria, Guzmán Santafé, Mario Reyes:
Clustering of Windows Security Events by Means of Frequent Pattern Mining. 19-27 - Sergio Decherchi

, Simone Tacconi, Judith Redi, Alessio Leoncini, Fabio Sangiacomo, Rodolfo Zunino:
Text Clustering for Digital Forensics Analysis. 29-36 - Davide Leoncini, Sergio Decherchi

, Osvaldo Faggioni, Paolo Gastaldo
, Maurizio Soldani
, Rodolfo Zunino:
A Preliminary Study on SVM Based Analysis of Underwater Magnetic Signals for Port Protection. 37-44 - Joydeb Roy Choudhury, Tribeni Prasad Banerjee

, Swagatam Das
, Ajith Abraham, Václav Snásel:
Fuzzy Rule Based Intelligent Security and Fire Detector System. 45-51 - Andrés Ortiz

, Alberto Peinado, Jorge Munilla:
A Scaled Test Bench for Vanets with RFID Signalling. 53-59 - Y. Jiang, J. Jiang, Paolo Capodieci:

A SVM-Based Behavior Monitoring Algorithm towards Detection of Un-desired Events in Critical Infrastructures. 61-68 - T. Menakadevi

, M. Madheswaran:
Design and Implementation of High Performance Viterbi Decoder for Mobile Communication Data Security. 69-76 - Cristian Pinzón

, Juan Francisco de Paz
, Javier Bajo
, Juan M. Corchado
:
An Adaptive Multi-agent Solution to Detect DoS Attack in SOAP Messages. 77-84 - Carmen Torrano-Gimenez, Alejandro Pérez-Villegas, Gonzalo Álvarez

:
A Self-learning Anomaly-Based Web Application Firewall. 85-92 - Carlos Bacquet, Nur Zincir-Heywood

, Malcolm I. Heywood
:
An Investigation of Multi-objective Genetic Algorithms for Encrypted Traffic Identification. 93-100 - Hao Chen, John A. Clark, Juan E. Tapiador

, Siraj A. Shaikh
, Howard Chivers, Philip Nobles:
A Multi-objective Optimisation Approach to IDS Sensor Placement. 101-108 - Gustavo A. Isaza

, Andrés G. Castillo, Manuel López, Luis Fernando Castillo
:
Towards Ontology-Based Intelligent Model for Intrusion Detection and Prevention. 109-116 - Cataldo Basile

, Antonio Lioy
, Salvatore Scozzi, Marco Vallini:
Ontology-Based Policy Translation. 117-126 - Guillermo Suarez-Tangil, Esther Palomar

, José María de Fuentes
, Jorge Blasco Alís, Arturo Ribagorda:
Automatic Rule Generation Based on Genetic Programming for Event Correlation. 127-134 - Hira Agrawal, Clifford Behrens, Balakrishnan Dasarathy, Leslie Lee Fook:

Learning Program Behavior for Run-Time Software Assurance. 135-142 - Álvaro Herrero

, Emilio Corchado:
Multiagent Systems for Network Intrusion Detection: A Review. 143-154 - Luis A. Puente, Maria Jesús Poza, Juan Miguel Gómez, Diego Carrero:

Multimodal Biometrics: Topics in Score Fusion. 155-162 - Fernando Hernández Álvarez, Luis Hernández Encinas

:
Security Efficiency Analysis of a Biometric Fuzzy Extractor for Iris Templates. 163-170 - Slobodan Bojanic, Vukasin Pejovic, Gabriel Caffarena

, Vladimir M. Milovanovic, Carlos Carreras
, Jelena Popovic:
Behavioural Biometrics Hardware Based on Bioinformatics Matching. 171-178 - Paramveer S. Dhillon:

Robust Real-Time Face Tracking Using an Active Camera. 179-186 - Rosaura Palma-Orozco, Gisela Palma-Orozco

, José de Jesús Medel Juárez, José Alfredo Jiménez-Benítez:
An Approach to Centralized Control Systems Based on Cellular Automata. 187-191 - Maria Belén Vaquerizo García:

Intelligent Methods and Models in Transportation. 193-201 - Héctor Alaiz-Moretón

, José Luís Calvo-Rolle
, Javier Alfonso-Cendón
, Ángel Alonso, Ramón Ferreiro García:
Knowledge Based Expert System for PID Controller Tuning under Hazardous Operating Conditions. 203-210

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














