Herrero, Álvaro
Computational Intelligence in Security for Information Systems 2010
1. An Incremental Density-Based Clustering Technique for Large Datasets
Saif ur Rehman, Muhammed Naeem Ahmed Khan
2. BSDT ROC and Cognitive Learning Hypothesis
Petro Gopych, Ivan Gopych
3. Evolving Fuzzy Classifier for Data Mining - an Information Retrieval Approach
Pavel Krömer, Václav Snášel, Jan Platoš, Ajith Abraham
4. Mereotopological Analysis of Formal Concepts in Security Ontologies
Gonzalo A. Aranda-Corral, Joaquín Borrego-Díaz
5. A Multi-agent Data Mining System for Defect Forecasting in a Decentralized Manufacturing Environment
Javier Alfonso Cendón, Ana González Marcos, Manuel Castejón Limas, Joaquín Ordieres Meré
6. A Distributed Hierarchical Multi-agent Architecture for Detecting Injections in SQL Queries
Cristian Pinzón, Juan F. Paz, Álvaro Herrero, Emilio Corchado, Javier Bajo
7. Incorporating Temporal Constraints in the Analysis Task of a Hybrid Intelligent IDS
Martí Navarro, Emilio Corchado, Vicente Julián, Álvaro Herrero
8. Performances of Speech Signal Biometric Systems Based on Signal to Noise Ratio Degradation
Dzati Athiar Ramli, Salina Abdul Samad, Aini Hussain
9. Lipreading Using
Preety Singh, Vijay Laxmi, Deepika Gupta, M. S. Gaur
10. Face Processing for Security: A Short Review
Ion Marqués, Manuel Graña
11. Ontologies-Based Automated Intrusion Response System
Verónica Mateos Lanchas, Víctor A. Villagrá González, Francisco Romero Bueno
12. Semi-supervised Fingerprinting of Protocol Messages
Jérôme François, Humberto Abdelnur, Radu State, Olivier Festor
13. Monitoring of Spatial-Aggregated IP-Flow Records
Cynthia Wagner, Gerard Wagener, Radu State, Thomas Engel
14. Improving Network Security through Traffic Log Anomaly Detection Using Time Series Analysis
Aitor Corchero Rodriguez, Mario Reyes Mozos
15. A Threat Model Approach to Threats and Vulnerabilities in On-line Social Networks
Carlos Laorden, Borja Sanz, Gonzalo Alvarez, Pablo G. Bringas
16. An SLA-Based Approach for Network Anomaly Detection
Yasser Yasami
17. Understanding Honeypot Data by an Unsupervised Neural Visualization
Álvaro Alonso, Santiago Porras, Enaitz Ezpeleta, Ekhiotz Vergara, Ignacio Arenaza, Roberto Uribeetxeberria, Urko Zurutuza, Álvaro Herrero, Emilio Corchado
18. Permuted Image DCT Watermarking
Reena Gunjan, Saurabh Maheshwari, M. S. Gaur, Vijay Laxmi
19. A Developed WaterMark Technique for Distributed Database Security
Hazem M. El-Bakry, Mohamed Hamada
20. Trident, a New Pseudo Random Number Generator Based on Coupled Chaotic Maps
Amalia Beatriz Orúe López, Gonzalo Álvarez Marañon, Alberto Guerra Estévez, Gerardo Pastor Dégano, Miguel Romera García, Fausto Montoya Vitini
21. The Impact of the SHA-3 Casting Cryptography Competition on the Spanish IT Market
Manuel J. Martínez, Roberto Uribeetxeberria, Urko Zurutuza, Miguel Fernández
22. A New Task Engineering Approach for Workflow Access Control
Hanan Bakkali, Hamid Hatim, Ilham Berrada
23. OPBUS: Fault Tolerance Against Integrity Attacks in Business Processes
Angel Jesus Varela Vaca, Rafael Martínez Gasca
24. A Key Distribution Scheme for Live Streaming Multi-tree Overlays
Juan Álvaro Muñoz Naranjo, Juan Antonio López Ramos, Leocadio González Casado
25. Intelligent Methods for Scheduling in Transportation
Ma Belén Vaquerizo García
Keywords: Engineering, Computational Intelligence, Artificial Intelligence (incl. Robotics)
- Author(s)
- Herrero, Álvaro
- Corchado, Emilio
- Redondo, Carlos
- Alonso, Ángel
- Publisher
- Springer
- Publication year
- 2010
- Language
- en
- Edition
- 1
- Series
- Advances in Intelligent and Soft Computing
- Category
- Technology, Energy, Traffic
- Format
- Ebook
- eISBN (PDF)
- 9783642166266