Login

Herrero, Álvaro

Computational Intelligence in Security for Information Systems 2010

Herrero, Álvaro - Computational Intelligence in Security for Information Systems 2010, ebook

173,60€

Ebook, PDF with Adobe DRM
ISBN: 9783642166266
DRM Restrictions

PrintingNot allowed
Copy to clipboardNot allowed

Table of contents

1. An Incremental Density-Based Clustering Technique for Large Datasets
Saif ur Rehman, Muhammed Naeem Ahmed Khan

2. BSDT ROC and Cognitive Learning Hypothesis
Petro Gopych, Ivan Gopych

3. Evolving Fuzzy Classifier for Data Mining - an Information Retrieval Approach
Pavel Krömer, Václav Snášel, Jan Platoš, Ajith Abraham

4. Mereotopological Analysis of Formal Concepts in Security Ontologies
Gonzalo A. Aranda-Corral, Joaquín Borrego-Díaz

5. A Multi-agent Data Mining System for Defect Forecasting in a Decentralized Manufacturing Environment
Javier Alfonso Cendón, Ana González Marcos, Manuel Castejón Limas, Joaquín Ordieres Meré

6. A Distributed Hierarchical Multi-agent Architecture for Detecting Injections in SQL Queries
Cristian Pinzón, Juan F. Paz, Álvaro Herrero, Emilio Corchado, Javier Bajo

7. Incorporating Temporal Constraints in the Analysis Task of a Hybrid Intelligent IDS
Martí Navarro, Emilio Corchado, Vicente Julián, Álvaro Herrero

8. Performances of Speech Signal Biometric Systems Based on Signal to Noise Ratio Degradation
Dzati Athiar Ramli, Salina Abdul Samad, Aini Hussain

9. Lipreading Using n–Gram Feature Vector
Preety Singh, Vijay Laxmi, Deepika Gupta, M. S. Gaur

10. Face Processing for Security: A Short Review
Ion Marqués, Manuel Graña

11. Ontologies-Based Automated Intrusion Response System
Verónica Mateos Lanchas, Víctor A. Villagrá González, Francisco Romero Bueno

12. Semi-supervised Fingerprinting of Protocol Messages
Jérôme François, Humberto Abdelnur, Radu State, Olivier Festor

13. Monitoring of Spatial-Aggregated IP-Flow Records
Cynthia Wagner, Gerard Wagener, Radu State, Thomas Engel

14. Improving Network Security through Traffic Log Anomaly Detection Using Time Series Analysis
Aitor Corchero Rodriguez, Mario Reyes Mozos

15. A Threat Model Approach to Threats and Vulnerabilities in On-line Social Networks
Carlos Laorden, Borja Sanz, Gonzalo Alvarez, Pablo G. Bringas

16. An SLA-Based Approach for Network Anomaly Detection
Yasser Yasami

17. Understanding Honeypot Data by an Unsupervised Neural Visualization
Álvaro Alonso, Santiago Porras, Enaitz Ezpeleta, Ekhiotz Vergara, Ignacio Arenaza, Roberto Uribeetxeberria, Urko Zurutuza, Álvaro Herrero, Emilio Corchado

18. Permuted Image DCT Watermarking
Reena Gunjan, Saurabh Maheshwari, M. S. Gaur, Vijay Laxmi

19. A Developed WaterMark Technique for Distributed Database Security
Hazem M. El-Bakry, Mohamed Hamada

20. Trident, a New Pseudo Random Number Generator Based on Coupled Chaotic Maps
Amalia Beatriz Orúe López, Gonzalo Álvarez Marañon, Alberto Guerra Estévez, Gerardo Pastor Dégano, Miguel Romera García, Fausto Montoya Vitini

21. The Impact of the SHA-3 Casting Cryptography Competition on the Spanish IT Market
Manuel J. Martínez, Roberto Uribeetxeberria, Urko Zurutuza, Miguel Fernández

22. A New Task Engineering Approach for Workflow Access Control
Hanan Bakkali, Hamid Hatim, Ilham Berrada

23. OPBUS: Fault Tolerance Against Integrity Attacks in Business Processes
Angel Jesus Varela Vaca, Rafael Martínez Gasca

24. A Key Distribution Scheme for Live Streaming Multi-tree Overlays
Juan Álvaro Muñoz Naranjo, Juan Antonio López Ramos, Leocadio González Casado

25. Intelligent Methods for Scheduling in Transportation
Ma Belén Vaquerizo García

Keywords: Engineering, Computational Intelligence, Artificial Intelligence (incl. Robotics)

Author(s)
 
 
 
Publisher
Springer
Publication year
2010
Language
en
Edition
1
Series
Advances in Intelligent and Soft Computing
Category
Technology, Energy, Traffic
Format
Ebook
eISBN (PDF)
9783642166266

Similar titles