


default search action
CISIS-ICEUTE-SOCO 2012: Ostrava, Czech Republic - Special Sessions
- Álvaro Herrero

, Václav Snásel, Ajith Abraham, Ivan Zelinka, Bruno Baruque, Héctor Quintián-Pardo, José Luís Calvo-Rolle, Javier Sedano, Emilio Corchado:
International Joint Conference CISIS'12-ICEUTE'12-SOCO'12 Special Sessions, Ostrava, Czech Republic, September 5th-7th, 2012. Advances in Intelligent Systems and Computing 189, Springer 2013, ISBN 978-3-642-33017-9 - Abdallah Ghourabi

, Tarek Abbes, Adel Bouhoula
:
Automatic Analysis of Web Service Honeypot Data Using Machine Learning Techniques. 1-11 - Angel Jesus Varela-Vaca

, Robert Warschofsky, Rafael M. Gasca
, Sergio Pozo
, Christoph Meinel:
A Security Pattern-Driven Approach toward the Automation of Risk Treatment in Business Processes. 13-23 - Eugene Semenkin

, Maria Semenkina
, Ilia Panfilov
:
Neural Network Ensembles Design with Self-Configuring Genetic Programming Algorithm for Solving Computer Security Problems. 25-32 - Raúl Sánchez, Álvaro Herrero

, Emilio Corchado:
Clustering for Intrusion Detection: Network Scans as a Case of Study. 33-45 - Camelia-Mihaela Pintea

, Petrica C. Pop
:
Sensor Networks Security Based on Sensitive Robots Agents: A Conceptual Model. 47-56 - Raúl Durán Díaz, Luis Hernández Encinas

, Jaime Muñoz Masqué:
Comments on a Cryptosystem Proposed by Wang and Hu. 57-65 - Fanbao Liu, Changxiang Shen, Tao Xie:

Equivalent Inner Key Recovery Attack to NMAC. 67-75 - Ciprian Pungila

:
Hybrid Compression of the Aho-Corasick Automaton for Static Analysis in Intrusion Detection Systems. 77-86 - José Antonio Álvarez-Bermejo

, Juan Antonio López Ramos:
Tracking Traitors in Web Services via Blind Signatures. 87-96 - Felix Brezo, José Gaviria de la Puerta, Igor Santos

, David Barroso, Pablo García Bringas
:
C&C Techniques in Botnet Development. 97-108 - Paulo Mourão

, José Pedro Cabral:
How Political Illusions Harm National Stability: Fiscal Illusion as a Source of Taxation. 109-115 - Oscar Delgado-Mohatar, Amparo Fúster-Sabater:

Software Implementation of Linear Feedback Shift Registers over Extended Fields. 117-126 - Jahangir Khan, Zoran S. Bojkovic, Syed Irfan Hayder, Gulam Ali Mallah, Abdul Haseeb, Fariha Atta:

Simulation Analysis of Static and Dynamic Intermediate Nodes and Performance Comparison of MANETS Routing Protocols. 127-140 - Eliska Ochodkova, Jiri Dvorský, Pavel Krömer

, Pavel Tucek
:
On Fitness Function Based upon Quasigroups Power Sequences. 141-150 - Ivan Zelinka, Filip Merhaut, Lenka Skanderová

:
Investigation on Operating Systems Identification by Means of Fractal Geometry and OS Pseudorandom Number Generators. 151-158 - Radek Vala

, David Malaník
, Roman Jasek
:
Usability of Software Intrusion-Detection System in Web Applications. 159-166 - Miroslaw Klinkowski

:
A Genetic Algorithm for Solving RSA Problem in Elastic Optical Networks with Dedicated Path Protection. 167-176 - Michal Choras, Rafal Kozik

, Damian Puchalski, Witold Holubowicz
:
Correlation Approach for SQL Injection Attacks Detection. 177-185 - Michal Choras, Rafal Kozik

, Rafal Renk, Witold Holubowicz
:
Information Exchange Mechanism between Federated Domains: P2P Approach. 187-196 - Wojciech Indyk, Tomasz Kajdanowicz

, Przemyslaw Kazienko
, Slawomir Plamowski:
Web Spam Detection Using MapReduce Approach to Collective Classification. 197-206 - Maciej Piec, Iwona Pozniak-Koszalka, Mariusz Koziol:

Analysis of Selected Aspects of "IBM I" Security. 207-214 - Wojciech Kmiecik

, Krzysztof Walkowiak
:
Metaheuristic Approach for Survivable P2P Multicasting Flow Assignment in Dual Homing Networks. 215-224 - Krzysztof Walkowiak

, Wojciech Charewicz, Maciej Donajski, Jacek Rak
:
A Tabu Search Algorithm for Optimization of Survivable Overlay Computing Systems. 225-234 - Tomasz Andrysiak, Lukasz Saganowski

, Michal Choras:
Greedy Algorithms for Network Anomaly Detection. 235-244 - Marcin Zmyslony, Bartosz Krawczyk, Michal Wozniak

:
Combined Classifiers with Neural Fuser for Spam Detection. 245-252 - Karol Wrótniak, Michal Wozniak

:
Combined Bayesian Classifiers Applied to Spam Filtering Problem. 253-260 - Carlos Laorden

, Patxi Galán-García, Igor Santos
, Borja Sanz, José María Gómez Hidalgo, Pablo García Bringas
:
Negobot: A Conversational Agent Based on Game Theory for the Detection of Paedophile Behaviour. 261-270 - Igor Santos

, Jaime Devesa, Felix Brezo, Javier Nieves, Pablo García Bringas
:
OPEM: A Static-Dynamic Approach for Machine-Learning-Based Malware Detection. 271-280 - Igor Santos

, Patxi Galán-García, Aitor Santamaría-Ibirika, Borja Alonso-Isla, Iker Alabau-Sarasola, Pablo García Bringas
:
Adult Content Filtering through Compression-Based Text Classification. 281-288 - Borja Sanz

, Igor Santos
, Carlos Laorden
, Xabier Ugarte-Pedrero, Pablo García Bringas
, Gonzalo Álvarez Marañón
:
PUMA: Permission Usage to Detect Malware in Android. 289-298 - Ignacio Aliaga, Vicente Vera

, Cristina González Losada, Alvaro Enrique Garcia
, Héctor Quintián-Pardo
, Emilio Corchado, Fanny Klett, Laura García-Hernández
:
Application of Soft Computing Technologies toward Assessment and Skills Development. 299-310 - José Antonio Álvarez-Bermejo

, J. Escoriza
, Juan Antonio López Ramos, J. Peralta:
An Interactive Mathematica Book. 311-319 - M. Dolores Redel-Macías

, Sara Pinzi
, Antonio J. Cubero-Atienza
, M. P. Dorado
, Maria del Pilar Martínez-Jiménez:
Biorefinery Virtual Lab-Integrating E-learning Techniques and Theoretical Learning. 321-330 - Pedro Antonio Gutiérrez

, Javier Sánchez-Monedero
, César Hervás-Martínez, Manuel Cruz-Ramírez
, Juan Carlos Fernández
, Francisco Fernández-Navarro
:
Approaching System Administration as a Group Project in Computer Engineering Higher Education. 331-340 - Pavel Brandstetter

, Marek Dobrovsky:
Speed Control of A.C. Drive with Induction Motor Using Genetic Algorithm. 341-350 - Pavel Brandstetter

, Pavel Bilek:
Applications of Artificial Neural Networks in Control of DC Drive. 351-360 - Pavol Fedor

, Daniela Perdukova
:
Energy Optimization of a Dynamic System Controller. 361-369 - Pavol Fedor

, Daniela Perdukova
, Zelmira Ferkova:
Optimal Input Vector Based Fuzzy Controller Rules Design. 371-380 - Radim Hercík

, Roman Slabý, Zdenek Machacek
, Jirí Koziorek
:
Correlation Methods of OCR Algorithm for Traffic Sign Detection Implementable in Microcontrollers. 381-389 - Jana Nowaková

, Miroslav Pokorný, Martin Pies
:
Takagi-Sugeno Fuzzy Model in Task of Controllers Design. 391-400 - Petr Palacky

, Petr Hudecek, Ales Havel
:
Real-Time Estimation of Induction Motor Parameters Based on the Genetic Algorithm. 401-409 - Jan Bauer

, Stanislav Fligl:
Comparison of Fuzzy Logic Based and Sliding Mode Based Controller for IM Drive Fed by Matrix Converter. 411-420 - Pavel Skalny

, Bohumil Krajc:
Discrete-Time Markov Chains in Reliability Analysis-Case Study. 421-427 - Jakub Talla, Zdenek Peroutka, Seppo J. Ovaska, Josef Stehlik:

Genetic Algorithm Based Optimization of MGP-FIR Current Reference Generator for Active Power Filters. 429-438 - Karla Stépánová, Martin Macas, Lenka Lhotská

:
Correlation-Based Neural Gas for Visualizing Correlations between EEG Features. 439-446 - Jakub Jirka, Michal Prauzek

:
Built-in Smartphone Accelerometer Motion Pattern Recognition Using Wavelet Transform. 447-455 - Sara Colantonio

, Ovidio Salvetti
:
Temporal Analysis of Remotely Sensed Data for the Assessment of COPD Patients' Health Status. 457-466 - Tomás Barton

, Pavel Kordík:
Encoding Time Series Data for Better Clustering Results. 467-475 - Pavel Dohnálek, Petr Gajdos

, Tomas Peterek, Marek Penhaker
:
Pattern Recognition in EEG Cognitive Signals Accelerated by GPU. 477-485 - David Sikora, Martin Stepnicka

, Lenka Vavrickova:
On the Potential of Fuzzy Rule-Based Ensemble Forecasting. 487-496 - Vilém Novák, Hashim Habiballa

:
Recognition of Damaged Letters Based on Mathematical Fuzzy Logic Analysis. 497-506 - Pavel Vlasánek

, Irina Perfilieva:
Image Reconstruction with Usage of the F-Transform. 507-514 - Stephane Kouamo, Claude Tangha:

Image Compression with Artificial Neural Networks. 515-524 - Petr Hurtík

, Irina Perfilieva:
Image Compression Methodology Based on Fuzzy Transform. 525-532 - Iva Tomanova, Jiri Kupka

:
Implementation of Background Knowledge and Properties Induced by Fuzzy Confirmation Measures in Apriori Algorithm. 533-542

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














