default search action
CISIS 2020: Burgos, Spain
- Álvaro Herrero, Carlos Cambra, Daniel Urda, Javier Sedano, Héctor Quintián, Emilio Corchado:
13th International Conference on Computational Intelligence in Security for Information Systems, CISIS 2020, Burgos, Spain, September 2020. Advances in Intelligent Systems and Computing 1267, Springer 2021, ISBN 978-3-030-57804-6
Cryptocurrencies and Blockchain
- Dimitri Kamenski, Arash Shaghaghi, Matthew J. Warren, Salil S. Kanhere:
Attacking with Bitcoin: Using Bitcoin to Build Resilient Botnet Armies. 3-12 - Yeray Mezquita Martín, Javier Parra, Eugenia Pérez, Javier Prieto, Juan Manuel Corchado:
Blockchain-Based Systems in Land Registry, A Survey of Their Use and Economic Implications. 13-22 - Sergio Marciante, Álvaro Herrero:
The Evolution of Privacy in the Blockchain: A Historical Survey. 23-34 - Daniel Wilusz, Adam Wójtowicz:
Securing Cryptoasset Insurance Services with Multisignatures. 35-44 - Néstor García-Moreno, Pino Caballero-Gil, Cándido Caballero-Gil, Jezabel Molina-Gil:
Building an Ethereum-Based Decentralized Vehicle Rental System. 45-53
Machine Learning
- Verónica Aubin, Matilde Santos, Marco Mora:
Off-Line Writer Verification Using Segments of Handwritten Samples and SVM. 57-65 - Esteban Jove, José Luís Casteleiro-Roca, Héctor Quintián, Francisco Zayas-Gato, Paulo Novais, Juan Albino Méndez Pérez, José Luís Calvo-Rolle:
A Comparative Study to Detect Flowmeter Deviations Using One-Class Classifiers. 66-75 - Jaidip Kotak, Yuval Elovici:
IoT Device Identification Using Deep Learning. 76-86 - Manuel Sánchez-Paniagua, Eduardo Fidalgo, Víctor González-Castro, Enrique Alegre:
Impact of Current Phishing Strategies in Machine Learning Models for Phishing Detection. 87-96 - César Guevara, Matilde Santos:
Crime Prediction for Patrol Routes Generation Using Machine Learning. 97-107
Applications
- Zainab Abaid, Arash Shaghaghi, Ravin Gunawardena, Suranga Seneviratne, Aruna Seneviratne, Sanjay Jha:
Health Access Broker: Secure, Patient-Controlled Management of Personal Health Records in the Cloud. 111-121 - José Luis Salazar, Jose Saldana, Julián Fernández-Navajas, José Ruíz-Mas, Guillermo Azuara:
Short Message Multichannel Broadcast Encryption. 122-131 - Laura Fernández-Becerra, David Fernández González, Ángel Manuel Guerrero-Higueras, Francisco Javier Rodríguez-Lera, Camino Fernández Llamas:
Cybersecurity Overview of a Robot as a Service Platform. 132-141 - Olga Siedlecka-Lamch:
Probabilistic and Timed Analysis of Security Protocols. 142-151 - Suriyan Laohaprapanon, Gaurav Sood:
Domain Knowledge: Predicting the Kind of Content Hosted by a Domain. 152-162 - Saad Khalid Alabdulsalam, Trung Q. Duong, Kim-Kwang Raymond Choo, Nhien-An Le-Khac:
Evidence Identification and Acquisition Based on Network Link in an Internet of Things Environment. 163-173 - Rafal Kozik, Michal Choras, Marek Pawlicki, Aleksandra Pawlicka, Wojciech Warczak, Grzegorz Mazgaj:
Proposition of Innovative and Scalable Information System for Call Detail Records Analysis and Visualisation. 174-183 - Víctor Botti-Cebriá, Elena del Val, Ana García-Fornes:
Automatic Detection of Sensitive Information in Educative Social Networks. 184-194
Special Session: Fake News Detection and Prevention
- Mariusz Kubanek, Kamila Bartlomiejczyk, Janusz Bobulski:
Detection of Artificial Images and Changes in Real Images Using Convolutional Neural Networks. 197-207 - Rafal Kozik, Michal Choras, Sebastian Kula, Marek Pawlicki:
Distributed Architecture for Fake News Detection. 208-217 - Fuad Mire Hassan, Mark Lee:
Multi-stage News-Stance Classification Based on Lexical and Neural Features. 218-228 - Ignacio Palacio Marín, David Arroyo:
Fake News Detection - Do Complex Problems Need Complex Solutions? 229-238 - Sebastian Kula, Michal Choras, Rafal Kozik:
Application of the BERT-Based Architecture in Fake News Detection. 239-249
Special Session: Mathematical Methods and Models in Cybersecurity
- José Diamantino Hernández Guillén, Ángel Martín del Rey:
Simulating Malware Propagation with Different Infection Rates. 253-262 - Noemí DeCastro-García, Enrique Pinto:
A Data Quality Assessment Model and Its Application to Cybersecurity Data Sources. 263-272 - Miguel V. Carriegos, Ramón Ángel Fernández Díaz:
Towards Forecasting Time-Series of Cyber-Security Data Aggregates. 273-281 - Iago Núñez, Esteban Jove, José Luís Casteleiro-Roca, Héctor Quintián, Francisco Zayas-Gato, Dragan Simic, José Luís Calvo-Rolle:
Hybrid Approximate Convex Hull One-Class Classifier for an Industrial Plant. 282-292
Special Session: Measurements for a Dynamic Cyber-risk Assessment
- Francisco Javier Rodríguez-Lera, Miguel Ángel González Santamarta, Ángel Manuel Guerrero, Francisco Martín, Vicente Matellán:
Traceability and Accountability in Autonomous Agents. 295-305 - Juan Francisco Carias, Marcos R. S. Borges, Leire Labaka, Saioa Arrizabalaga, Josune Hernantes:
The Order of the Factors DOES Alter the Product: Cyber Resilience Policies' Implementation Order. 306-315 - Xabier Echeberria-Barrio, Amaia Gil-Lerchundi, Ines Goicoechea-Telleria, Raul Orduna Urrutia:
Deep Learning Defenses Against Adversarial Examples for Dynamic Risk Assessment. 316-326 - Lilian Adkinson-Orellana, Pablo Dago Casas, Marta Sestelo, Borja Pintos Castro:
A New Approach for Dynamic and Risk-Based Data Anonymization. 327-336
Special Session: Cybersecurity in a Hybrid Quantum World
- Sara Díaz Cardell, Amparo Fúster-Sabater, Amalia Beatriz Orúe López, Verónica Requena:
Randomness Analysis for GSS-sequences Concatenated. 350-360 - Victor Gayoso Martínez, Luis Hernández Encinas, Agustín Martín Muñoz:
Study of the Reconciliation Mechanism of NewHope. 361-370 - Veronica Fernandez, Amalia Beatriz Orúe López, David Arroyo:
Securing Blockchain with Quantum Safe Cryptography: When and How? 371-379 - Wilson Rojas, Victor Gayoso Martínez, Araceli Queiruga Dios:
Blockchain in Education: New Challenges. 380-389
Special Session: Anomaly/Intrusion Detection
- Maximilian Wolf, Markus Ring, Dieter Landes:
Impact of Generative Adversarial Networks on NetFlow-Based Traffic Classification. 393-404 - Vibekananda Dutta, Michal Choras, Rafal Kozik, Marek Pawlicki:
Hybrid Model for Improving the Classification Effectiveness of Network Intrusion Detection. 405-414 - Martin Flusser, Petr Somol:
Adaptive Approach for Density-Approximating Neural Network Models for Anomaly Detection. 415-425 - David Sobrín-Hidalgo, Adrián Campazas Vega, Ángel Manuel Guerrero-Higueras, Francisco Javier Rodríguez-Lera, Camino Fernández Llamas:
Systematic Mapping of Detection Techniques for Advanced Persistent Threats. 426-435 - Tomasz Andrysiak, Lukasz Saganowski:
Neural Network Analysis of PLC Traffic in Smart City Street Lighting Network. 436-445 - Héctor Quintián, Esteban Jove, José Luís Casteleiro-Roca, Daniel Urda, Ángel Arroyo, José Luís Calvo-Rolle, Álvaro Herrero, Emilio Corchado:
Beta-Hebbian Learning for Visualizing Intrusions in Flows. 446-459 - Gwang-Myong Go, Seok-Jun Bu, Sung-Bae Cho:
Detecting Intrusion via Insider Attack in Database Transactions by Learning Disentangled Representation with Deep Metric Neural Network. 460-469
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.