


default search action
CISIS 2020: Burgos, Spain
- Álvaro Herrero, Carlos Cambra, Daniel Urda, Javier Sedano, Héctor Quintián, Emilio Corchado:

13th International Conference on Computational Intelligence in Security for Information Systems, CISIS 2020, Burgos, Spain, September 2020. Advances in Intelligent Systems and Computing 1267, Springer 2021, ISBN 978-3-030-57804-6
Cryptocurrencies and Blockchain
- Dimitri Kamenski, Arash Shaghaghi, Matthew J. Warren

, Salil S. Kanhere
:
Attacking with Bitcoin: Using Bitcoin to Build Resilient Botnet Armies. 3-12 - Yeray Mezquita Martín

, Javier Parra
, Eugenia Pérez
, Javier Prieto
, Juan Manuel Corchado
:
Blockchain-Based Systems in Land Registry, A Survey of Their Use and Economic Implications. 13-22 - Sergio Marciante

, Álvaro Herrero
:
The Evolution of Privacy in the Blockchain: A Historical Survey. 23-34 - Daniel Wilusz

, Adam Wójtowicz
:
Securing Cryptoasset Insurance Services with Multisignatures. 35-44 - Néstor García-Moreno, Pino Caballero-Gil

, Cándido Caballero-Gil
, Jezabel Molina-Gil:
Building an Ethereum-Based Decentralized Vehicle Rental System. 45-53
Machine Learning
- Verónica Aubin, Matilde Santos

, Marco Mora:
Off-Line Writer Verification Using Segments of Handwritten Samples and SVM. 57-65 - Esteban Jove

, José Luís Casteleiro-Roca
, Héctor Quintián
, Francisco Zayas-Gato
, Paulo Novais
, Juan Albino Méndez Pérez, José Luís Calvo-Rolle
:
A Comparative Study to Detect Flowmeter Deviations Using One-Class Classifiers. 66-75 - Jaidip Kotak, Yuval Elovici:

IoT Device Identification Using Deep Learning. 76-86 - Manuel Sánchez-Paniagua

, Eduardo Fidalgo, Víctor González-Castro, Enrique Alegre:
Impact of Current Phishing Strategies in Machine Learning Models for Phishing Detection. 87-96 - César Guevara

, Matilde Santos
:
Crime Prediction for Patrol Routes Generation Using Machine Learning. 97-107
Applications
- Zainab Abaid, Arash Shaghaghi, Ravin Gunawardena, Suranga Seneviratne, Aruna Seneviratne, Sanjay Jha

:
Health Access Broker: Secure, Patient-Controlled Management of Personal Health Records in the Cloud. 111-121 - José Luis Salazar, Jose Saldana

, Julián Fernández-Navajas
, José Ruíz-Mas, Guillermo Azuara:
Short Message Multichannel Broadcast Encryption. 122-131 - Laura Fernández-Becerra

, David Fernández González, Ángel Manuel Guerrero-Higueras, Francisco Javier Rodríguez-Lera
, Camino Fernández Llamas:
Cybersecurity Overview of a Robot as a Service Platform. 132-141 - Olga Siedlecka-Lamch

:
Probabilistic and Timed Analysis of Security Protocols. 142-151 - Suriyan Laohaprapanon, Gaurav Sood:

Domain Knowledge: Predicting the Kind of Content Hosted by a Domain. 152-162 - Saad Khalid Alabdulsalam, Trung Q. Duong, Kim-Kwang Raymond Choo, Nhien-An Le-Khac

:
Evidence Identification and Acquisition Based on Network Link in an Internet of Things Environment. 163-173 - Rafal Kozik

, Michal Choras, Marek Pawlicki
, Aleksandra Pawlicka, Wojciech Warczak, Grzegorz Mazgaj:
Proposition of Innovative and Scalable Information System for Call Detail Records Analysis and Visualisation. 174-183 - Víctor Botti-Cebriá

, Elena del Val, Ana García-Fornes
:
Automatic Detection of Sensitive Information in Educative Social Networks. 184-194
Special Session: Fake News Detection and Prevention
- Mariusz Kubanek

, Kamila Bartlomiejczyk
, Janusz Bobulski
:
Detection of Artificial Images and Changes in Real Images Using Convolutional Neural Networks. 197-207 - Rafal Kozik

, Michal Choras, Sebastian Kula
, Marek Pawlicki
:
Distributed Architecture for Fake News Detection. 208-217 - Fuad Mire Hassan, Mark Lee

:
Multi-stage News-Stance Classification Based on Lexical and Neural Features. 218-228 - Ignacio Palacio Marín, David Arroyo:

Fake News Detection - Do Complex Problems Need Complex Solutions? 229-238 - Sebastian Kula

, Michal Choras, Rafal Kozik
:
Application of the BERT-Based Architecture in Fake News Detection. 239-249
Special Session: Mathematical Methods and Models in Cybersecurity
- José Diamantino Hernández Guillén

, Ángel Martín del Rey
:
Simulating Malware Propagation with Different Infection Rates. 253-262 - Noemí DeCastro-García

, Enrique Pinto:
A Data Quality Assessment Model and Its Application to Cybersecurity Data Sources. 263-272 - Miguel V. Carriegos

, Ramón Ángel Fernández Díaz
:
Towards Forecasting Time-Series of Cyber-Security Data Aggregates. 273-281 - Iago Núñez, Esteban Jove

, José Luís Casteleiro-Roca
, Héctor Quintián
, Francisco Zayas-Gato
, Dragan Simic, José Luís Calvo-Rolle
:
Hybrid Approximate Convex Hull One-Class Classifier for an Industrial Plant. 282-292
Special Session: Measurements for a Dynamic Cyber-risk Assessment
- Francisco Javier Rodríguez-Lera

, Miguel Ángel González Santamarta
, Ángel Manuel Guerrero, Francisco Martín
, Vicente Matellán:
Traceability and Accountability in Autonomous Agents. 295-305 - Juan Francisco Carias

, Marcos R. S. Borges
, Leire Labaka
, Saioa Arrizabalaga
, Josune Hernantes
:
The Order of the Factors DOES Alter the Product: Cyber Resilience Policies' Implementation Order. 306-315 - Xabier Echeberria-Barrio

, Amaia Gil-Lerchundi, Ines Goicoechea-Telleria, Raul Orduna Urrutia:
Deep Learning Defenses Against Adversarial Examples for Dynamic Risk Assessment. 316-326 - Lilian Adkinson-Orellana, Pablo Dago Casas, Marta Sestelo

, Borja Pintos Castro:
A New Approach for Dynamic and Risk-Based Data Anonymization. 327-336
Special Session: Cybersecurity in a Hybrid Quantum World
- Sara Díaz Cardell

, Amparo Fúster-Sabater
, Amalia Beatriz Orúe López
, Verónica Requena
:
Randomness Analysis for GSS-sequences Concatenated. 350-360 - Victor Gayoso Martínez, Luis Hernández Encinas

, Agustín Martín Muñoz
:
Study of the Reconciliation Mechanism of NewHope. 361-370 - Veronica Fernandez

, Amalia Beatriz Orúe López
, David Arroyo:
Securing Blockchain with Quantum Safe Cryptography: When and How? 371-379 - Wilson Rojas, Victor Gayoso Martínez, Araceli Queiruga Dios:

Blockchain in Education: New Challenges. 380-389
Special Session: Anomaly/Intrusion Detection
- Maximilian Wolf, Markus Ring, Dieter Landes

:
Impact of Generative Adversarial Networks on NetFlow-Based Traffic Classification. 393-404 - Vibekananda Dutta

, Michal Choras, Rafal Kozik
, Marek Pawlicki
:
Hybrid Model for Improving the Classification Effectiveness of Network Intrusion Detection. 405-414 - Martin Flusser

, Petr Somol:
Adaptive Approach for Density-Approximating Neural Network Models for Anomaly Detection. 415-425 - David Sobrín-Hidalgo

, Adrián Campazas Vega, Ángel Manuel Guerrero-Higueras, Francisco Javier Rodríguez-Lera
, Camino Fernández Llamas:
Systematic Mapping of Detection Techniques for Advanced Persistent Threats. 426-435 - Tomasz Andrysiak, Lukasz Saganowski

:
Neural Network Analysis of PLC Traffic in Smart City Street Lighting Network. 436-445 - Héctor Quintián

, Esteban Jove
, José Luís Casteleiro-Roca
, Daniel Urda
, Ángel Arroyo
, José Luís Calvo-Rolle
, Álvaro Herrero
, Emilio Corchado:
Beta-Hebbian Learning for Visualizing Intrusions in Flows. 446-459 - Gwang-Myong Go, Seok-Jun Bu

, Sung-Bae Cho:
Detecting Intrusion via Insider Attack in Database Transactions by Learning Disentangled Representation with Deep Metric Neural Network. 460-469

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














