default search action
1. CISIS 2008: Genoa, Italy
- Emilio Corchado, Rodolfo Zunino, Paolo Gastaldo, Álvaro Herrero:
Proceedings of the International Workshop on Computational Intelligence in Security for Information Systems, CISIS'08, Genova, Italy, October 23-24, 2008. Advances in Soft Computing 53, Springer 2009, ISBN 978-3-540-88180-3
Computational Intelligence Methods for Fighting Crime
- Carlo Guazzoni, Gaetano Bruno Ronsivalle:
An Artificial Neural Network for Bank Robbery Risk Management: The OS.SI.F Web On-Line Tool of the ABI Anti-crime Department. 1-10 - Mauro Cislaghi, George Eleftherakis, Roberto Mazzilli, Francois Mohier, Sara Ferri, Valerio Giuffrida, Elisa Negroni:
Secure Judicial Communication Exchange Using Soft-computing Methods and Biometric Authentication. 11-18 - Queen Esther Booker:
Identity Resolution in Criminal Justice Data: An Application of NORA. 19-26 - Dario V. Forte, Angelo Cavallini, Cristiano Maruti, Luca Losio, Thomas Orlandi, Michele Zambelli:
PTK: An Alternative Advanced Interface for the Sleuth Kit. 27-34
Text Mining and Intelligence
- Federico Neri, Massimo Pettoni:
Stalker, a Multilingual Text Mining Search Engine for Open Source Intelligence. 35-42 - Enrico Appiani, Giuseppe Buslacchi:
Computational Intelligence Solutions for Homeland Security. 43-52 - Alessandro Zanasi:
Virtual Weapons for Real Wars: Text Mining for National Security. 53-60 - Sergio Decherchi, Paolo Gastaldo, Judith Redi, Rodolfo Zunino:
Hypermetric k-Means Clustering for Content-Based Document Management. 61-68
Critical Infrastructure Protection
- Demetrios G. Eliades, Marios M. Polycarpou:
Security Issues in Drinking Water Distribution Networks. 69-76 - Antonio Lioy, Gianluca Ramunno, Davide Vernizzi:
Trusted-Computing Technologies for the Protection of Critical Information Systems. 77-83 - Dennis K. Nilsson, Ulf Larson, Francesco Picasso, Erland Jonsson:
A First Simulation of Attacks in the Automotive Network Communications Protocol FlexRay. 84-91 - Francesco Flammini, Andrea Gaglione, Nicola Mazzocca, Vincenzo Moscato, Concetta Pragliola:
Wireless Sensor Data Fusion for Critical Infrastructure Security. 92-99 - Osvaldo Faggioni, Maurizio Soldani, Amleto Gabellone, Paolo Maggiani, Davide Leoncini:
Development of Anti Intruders Underwater Systems: Time Domain Evaluation of the Self-informed Magnetic Networks Performance. 100-107 - Viviana Mascardi, Daniela Briola, Maurizio Martelli, Riccardo Caccia, Carlo Milani:
Monitoring and Diagnosing Railway Signalling with Logic-Based Distributed Agents. 108-115 - Ermete Meda, Francesco Picasso, Andrea De Domenico, Paolo Mazzaron, Nadia Mazzino, Lorenzo Motta, Aldo Tamponi:
SeSaR: Security for Safety. 116-122
Network Security
- Soutaro Matsumoto, Adel Bouhoula:
Automatic Verification of Firewall Configuration with Respect to Security Policy Requirements. 123-130 - Gianluca Maiolini, Lorenzo Cignini, Andrea Baiocchi:
Automated Framework for Policy Optimization in Firewalls and Security Gateways. 131-138 - Esteban J. Palomo, Enrique Domínguez, Rafael Marcos Luque, José Muñoz:
An Intrusion Detection System Based on Hierarchical Self-Organization. 139-146 - Zorana Bankovic, Slobodan Bojanic, Octavio Nieto-Taladriz:
Evaluating Sequential Combination of Two Genetic Algorithm-Based Solutions for Intrusion Detection. 147-154 - Álvaro Herrero, Emilio Corchado:
Agents and Neural Networks for Intrusion Detection. 155-162 - Giuseppe Lieto, Fabio Orsini, Genoveffa Pagano:
Cluster Analysis for Anomaly Detection. 163-169 - Maurizio Aiello, Davide Chiarella, Gianluca Papaleo:
Statistical Anomaly Detection on Real e-Mail Traffic. 170-177 - Andrea Baiocchi, Gianluca Maiolini, Giacomo Molina, Antonello Rizzi:
On-the-fly Statistical Classification of Internet Traffic at Application Layer Based on Cluster Analysis. 178-185 - Nikolaos Chatzis, Radu Popescu-Zeletin:
Flow Level Data Mining of DNS Query Streams for Email Worm Detection. 186-194 - Bogdan Vrusias, Ian Golledge:
Adaptable Text Filters and Unsupervised Neural Classifiers for Spam Detection. 195-202 - Riyad Alshammari, Nur Zincir-Heywood:
A Preliminary Performance Comparison of Two Feature Sets for Encrypted Traffic Classification. 203-210 - Nizar Ben Neji, Adel Bouhoula:
Dynamic Scheme for Packet Classification Using Splay Trees. 211-218 - Rahul Gupta, Suneeta Agarwal:
A Novel Algorithm for Freeing Network from Points of Failure. 219-226
Biometry
- Stelvio Cimato, Marco Gamassi, Vincenzo Piuri, Roberto Sassi, Fabio Scotti:
A Multi-biometric Verification System for the Privacy Protection of Iris Templates. 227-234 - Dzati Athiar Ramli, Salina Abdul Samad, Aini Hussain:
Score Information Decision Fusion Using Support Vector Machine for a Correlation Filter Based Speaker Authentication System. 235-242 - Messaoud Bengherabi, Lamia Mezai, Farid Harizi, Abderrazak Guessoum, Mohamed Cheriet:
Application of 2DPCA Based Techniques in DCT Domain for Face Recognition. 243-250 - Manish Verma, Suneeta Agarwal:
Fingerprint Based Male-Female Classification. 251-257 - Petro M. Gopych:
BSDT Multi-valued Coding in Discrete Spaces. 258-265 - Thi Hoi Le, The Duy Bui:
A Fast and Distortion Tolerant Hashing for Fingerprint Image Authentication. 266-273 - Anatoly Sachenko, Arkadiusz Banasik, Adrian Kapczynski:
The Concept of Application of Fuzzy Logic in Biometric Authentication Systems. 274-279
Information Protection
- Fabio Antonio Bovino:
Bidirectional Secret Communication by Quantum Collisions. 280-285 - Paraskevi K. Tzouveli, Klimis S. Ntalianis, Stefanos D. Kollias:
Semantic Region Protection Using Hu Moments and a Chaotic Pseudo-random Number Generator. 286-293 - Tao Cai, Shiguang Ju, Wei Zhong, DeJiao Niu:
Random r-Continuous Matching Rule for Immune-Based Secure Storage System. 294-300
Industrial Perspectives
- Francesco Pedersoli, Massimiliano Cristiano:
nokLINK: A New Solution for Enterprise Security. 301-308 - Bruno Giacometti:
SLA and LAC: New Solutions for Security Monitoring in the Enterprise. 309-315
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.