default search action
4. CISIS 2011: Torremolinos-Málaga, Spain
- Álvaro Herrero, Emilio Corchado:
Computational Intelligence in Security for Information Systems - 4th International Conference, CISIS 2011, Held at IWANN 2011, Torremolinos-Málaga, Spain, June 8-10, 2011. Proceedings. Lecture Notes in Computer Science 6694, Springer 2011, ISBN 978-3-642-21322-9
Machine Learning and Intelligence
- Carlos Laorden, Borja Sanz, Igor Santos, Patxi Galán-García, Pablo García Bringas:
Collective Classification for Spam Filtering. 1-8 - Zorana Bankovic, Juan Carlos Vallejo, David Fraga, José Manuel Moya:
Detecting Bad-Mouthing Attacks on Reputation Systems Using Self-Organizing Maps. 9-16 - Emna Bahri, Nouria Harbi, Hoa Nguyen Huu:
Approach Based Ensemble Methods for Better and Faster Intrusion Detection. 17-24 - Hai Thanh Nguyen, Carmen Torrano-Gimenez, Gonzalo Álvarez, Slobodan Petrovic, Katrin Franke:
Application of the Generic Feature Selection Measure in Detection of Web Attacks. 25-32 - Pino Caballero-Gil, Jezabel Molina-Gil, Cándido Caballero-Gil:
Data Aggregation Based on Fuzzy Logic for VANETs. 33-40
Network Security
- Cynthia Wagner, Gérard Wagener, Radu State, Thomas Engel:
Digging into IP Flow Records with a Visual Kernel Method. 41-49 - Igor Santos, Borja Sanz, Carlos Laorden, Felix Brezo, Pablo García Bringas:
Opcode-Sequence-Based Semi-supervised Unknown Malware Detection. 50-57 - Sebastian Roschke, Feng Cheng, Christoph Meinel:
A New Alert Correlation Algorithm Based on Attack Graph. 58-67 - João Paulo S. Medeiros, Agostinho de Medeiros Brito Júnior, Paulo S. Motta Pires:
A Qualitative Survey of Active TCP/IP Fingerprinting Tools and Techniques for Operating Systems Identification. 68-75 - Francisco José Mora-Gimeno, Francisco Maciá Pérez, Iren Lorenzo-Fonseca, Juan Antonio Gil-Martínez-Abarca, Diego Marcos-Jorquera, Virgilio Gilart-Iglesias:
Security Alert Correlation Using Growing Neural Gas. 76-83 - Alessio Merlo, Gianluca Papaleo, Stefano Veneziano, Maurizio Aiello:
A Comparative Performance Evaluation of DNS Tunneling Tools. 84-91 - Ehsan Vahedi, Rabab K. Ward, Ian F. Blake:
Security Analysis and Complexity Comparison of Some Recent Lightweight RFID Protocols. 92-99 - Jaydip Sen:
A Secure and Efficient Searching Scheme for Trusted Nodes in a Peer-to-Peer Network. 100-108 - Silvia González, Javier Sedano, Álvaro Herrero, Bruno Baruque, Emilio Corchado:
Testing Ensembles for Intrusion Detection: On the Identification of Mutated Network Scans. 109-117 - Kashif Saleem, Norsheila Fisal, Sharifah Hafizah Syed Ariffin, Rozeha A. Rashid:
An Intelligent Information Security Mechanism for the Network Layer of WSN: BIOSARP. 118-126
Cryptography
- Amparo Fúster-Sabater:
Structural Properties of Cryptographic Sequences. 127-134 - Raúl Durán Díaz, Luis Hernández Encinas, Jaime Muñoz Masqué:
A Multisignature Scheme Based on the SDLP and on the IFP. 135-142 - Raúl Durán Díaz, Luis Hernández Encinas, Jaime Muñoz Masqué:
A Group Signature Scheme Based on the Integer Factorization and the Subgroup Discrete Logarithm Problems. 143-150 - J. A. M. Naranjo, Leocadio G. Casado:
Keeping Group Communications Private: An Up-to-Date Review on Centralized Secure Multicast. 151-159 - Victor Gayoso Martínez, Luis Hernández Encinas, Carmen Sánchez Ávila:
Java Card Implementation of the Elliptic Curve Integrated Encryption Scheme Using Prime and Binary Finite Fields. 160-167 - Guillermo Azuara, José Luis Salazar:
Comprehensive Protection of RFID Traceability Information Systems Using Aggregate Signatures. 168-176 - Alberto Peinado, Andrés Ortiz:
Cryptanalysis of Multicast Protocols with Key Refreshment Based on the Extended Euclidean Algorithm. 177-182 - Rafael Álvarez, José-Francisco Vicent, Antonio Zamora:
Improving the Message Expansion of the Tangle Hash Function. 183-189 - Jorge A. Martínez-Ñonthe, A. Díaz-Méndez, Miguel Cruz-Irisson, Leonardo Palacios-Luengas, José Luis Del-Río-Correa, Ruben Vázquez-Medina:
Cryptosystem with One Dimensional Chaotic Maps. 190-197
Securing Software
- Craig S. Wright, Tanveer A. Zia:
A Quantitative Analysis into the Economics of Correcting Software Bugs. 198-205 - Craig S. Wright, Tanveer A. Zia:
Rationally Opting for the Insecure Alternative: Negative Externalities and the Selection of Security Controls. 206-213 - Jesus Diaz, David Arroyo, Francisco de Borja Rodríguez:
An Approach for Adapting Moodle into a Secure Infrastructure. 214-221 - Milan Markovic, Goran Dordevic:
On Secure JAVA Application in SOA-Based PKI Mobile Government Systems. 222-229
Applications of Intelligent Methods for Security
- Xabier Ugarte-Pedrero, Igor Santos, Pablo García Bringas:
Structural Feature Based Anomaly Detection for Packed Executable Identification. 230-237 - Jian-bin Hu, Yonggang Wang, Tao Yang, Zhi Guan, Nike Gui, Zhong Chen:
Produre: A Novel Proximity Discovery Mechanism in Location Tagging System. 238-245 - Eva Pajorová, Ladislav Hluchý:
Scientific Gateway and Visualization Tool. 246-250 - Flora Amato, Valentina Casola, Antonino Mazzeo, Sara Romano:
An Innovative Framework for Securing Unstructured Documents. 251-258 - Sean S. E. Thorpe, Indrajit Ray, Tyrone Grandison:
Use of Schema Associative Mapping for Synchronization of the Virtual Machine Audit Logs. 259-264 - Sean S. E. Thorpe, Indrajit Ray, Tyrone Grandison:
Enforcing Data Quality Rules for a Synchronized VM Log Audit Environment Using Transformation Mapping Techniques. 265-271 - Ali Dehghantanha, Nur Izura Udzir, Ramlan Mahmod:
Evaluating User-Centered Privacy Model (UPM) in Pervasive Computing Systems. 272-284 - Hamid Parvin, Behrouz Minaei-Bidgoli, B. Hoda Helmi:
An Innovative Linkage Learning Based on Differences in Local Optimums. 285-292 - Hamid Parvin, Behrouz Minaei, Sajjad Ghatei:
A New Particle Swarm Optimization for Dynamic Environments. 293-300 - Hamid Parvin, Nasser Mozayani, Akram Beigi:
A Classifier Ensemble for Face Recognition Using Gabor Wavelet Features. 301-307
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.