000 05120nam a22004815i 4500
001 978-3-642-16626-6
003 DE-He213
005 20140220084549.0
007 cr nn 008mamaa
008 101007s2010 gw | s |||| 0|eng d
020 _a9783642166266
_9978-3-642-16626-6
024 7 _a10.1007/978-3-642-16626-6
_2doi
050 4 _aQ342
072 7 _aUYQ
_2bicssc
072 7 _aCOM004000
_2bisacsh
082 0 4 _a006.3
_223
100 1 _aHerrero, Álvaro.
_eeditor.
245 1 0 _aComputational Intelligence in Security for Information Systems 2010
_h[electronic resource] :
_bProceedings of the 3rd International Conference on Computational Intelligence in Security for Information Systems (CISIS’10) /
_cedited by Álvaro Herrero, Emilio Corchado, Carlos Redondo, Ángel Alonso.
264 1 _aBerlin, Heidelberg :
_bSpringer Berlin Heidelberg,
_c2010.
300 _a230p. 70 illus.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
490 1 _aAdvances in Intelligent and Soft Computing,
_x1867-5662 ;
_v85
505 0 _a1: Machine Learning and Intelligence -- An Incremental Density-Based Clustering Technique for Large Datasets -- BSDT ROC and Cognitive Learning Hypothesis -- Evolving Fuzzy Classifier for Data Mining - an Information Retrieval Approach -- Mereotopological Analysis of Formal Concepts in Security Ontologies -- 2: Agents and Multi-Agent Systems -- A Multi-agent Data Mining System for Defect Forecasting in a Decentralized Manufacturing Environment -- A Distributed Hierarchical Multi-agent Architecture for Detecting Injections in SQL Queries -- Incorporating Temporal Constraints in the Analysis Task of a Hybrid Intelligent IDS -- 3: Image, Video and Speech Processing -- Performances of Speech Signal Biometric Systems Based on Signal to Noise Ratio Degradation -- Lipreading Using n–Gram Feature Vector -- Face Processing for Security: A Short Review -- 4: Network Security -- Ontologies-Based Automated Intrusion Response System -- Semi-supervised Fingerprinting of Protocol Messages -- Monitoring of Spatial-Aggregated IP-Flow Records -- Improving Network Security through Traffic Log Anomaly Detection Using Time Series Analysis -- A Threat Model Approach to Threats and Vulnerabilities in On-line Social Networks -- An SLA-Based Approach for Network Anomaly Detection -- Understanding Honeypot Data by an Unsupervised Neural Visualization -- 5: Watermarking -- Permuted Image DCT Watermarking -- A Developed WaterMark Technique for Distributed Database Security -- 6: Cryptography -- Trident, a New Pseudo Random Number Generator Based on Coupled Chaotic Maps -- The Impact of the SHA-3 Casting Cryptography Competition on the Spanish IT Market -- 7: Industrial and Commercial Applications of Intelligent Methods for Security -- A New Task Engineering Approach for Workflow Access Control -- OPBUS: Fault Tolerance Against Integrity Attacks in Business Processes -- A Key Distribution Scheme for Live Streaming Multi-tree Overlays -- Intelligent Methods for Scheduling in Transportation.
520 _aThis volume of Advances in Intelligent and Soft Computing contains accepted papers presented at the 3rd International Conference on Computational Intelligence in Security for Information Systems (CISIS'10), which was held in the beautiful and historic city of León, Spain, in November, 2010.   Since it origin, the main aim of CISIS conferences has been to establish a broad and interdisciplinary forum for Computational Intelligence and Associated Learning Paradigms, which are playing increasingly important roles in a large number of application areas related to Security in Information Systems.   CISIS'10  provided a broad and interdisciplinary forum to present the most recent developments in several very active scientific areas such as Machine Learning, Infrastructure Protection, Intelligent Methods in Energy and Transportation, Network Security, Biometry, Cryptography, High-performance and Grid Computing, and Industrial Perspective among others. The global purpose of the CISIS series of conferences has been to form a broad and interdisciplinary meeting ground offering the opportunity to interact with the leading research team and industries actively involved in the critical area of security, and have a picture of the current solutions adopted in practical domains.
650 0 _aEngineering.
650 0 _aArtificial intelligence.
650 1 4 _aEngineering.
650 2 4 _aComputational Intelligence.
650 2 4 _aArtificial Intelligence (incl. Robotics).
700 1 _aCorchado, Emilio.
_eeditor.
700 1 _aRedondo, Carlos.
_eeditor.
700 1 _aAlonso, Ángel.
_eeditor.
710 2 _aSpringerLink (Online service)
773 0 _tSpringer eBooks
776 0 8 _iPrinted edition:
_z9783642166259
830 0 _aAdvances in Intelligent and Soft Computing,
_x1867-5662 ;
_v85
856 4 0 _uhttp://dx.doi.org/10.1007/978-3-642-16626-6
912 _aZDB-2-ENG
999 _c112854
_d112854