libri scuola books Fumetti ebook dvd top ten sconti 0 Carrello


Torna Indietro

herrero Álvaro (curatore); corchado emilio (curatore); redondo gil carlos (curatore); alonso alvarez Ángel (curatore) - computational intelligence in security for information systems 2010

Computational Intelligence in Security for Information Systems 2010 Proceedings of the 3rd International Conference on Computational Intelligence in Security for Information Systems (CISIS’10)

; ; ;




Disponibilità: Normalmente disponibile in 15 giorni


PREZZO
162,98 €
NICEPRICE
154,83 €
SCONTO
5%



Questo prodotto usufruisce delle SPEDIZIONI GRATIS
selezionando l'opzione Corriere Veloce in fase di ordine.


Pagabile anche con Carta della cultura giovani e del merito, 18App Bonus Cultura e Carta del Docente


Facebook Twitter Aggiungi commento


Spese Gratis

Dettagli

Genere:Libro
Lingua: Inglese
Editore:

Springer

Pubblicazione: 10/2010
Edizione: 2010





Trama

rd The 3 International Conference on Computational Intelligence in Security for Information Systems (CISIS 2010) provided a broad and interdisciplinary forum to present the most recent developments in several very active scientific areas such as Machine Learning, Infrastructure Protection, Intelligent Methods in Energy and Transportation, Network Security, Biometry, Cryptography, High-performance and Grid Computing, and Industrial Perspective among others. The global purpose of CISIS series of conferences has been to form a broad and interdisciplinary meeting ground offering the opportunity to interact with the leading research team and industries actively involved in the critical area of security, and have a picture of the current solutions adopted in practical domains. This volume of Advances in Intelligence and Soft Computing contains accepted papers presented at CISIS 2010, which was held in León, Spain, on November 11–12, 2010. CISIS 2010 received over 50 technical submissions. After a thorough peer-review process, the International Program Committee - lected 25 papers which are published in this conference proceedings. This allowed the Scientific Committee to verify the vital and crucial nature of the topics - volved in the event, and resulted in an acceptance rate close to 50% of the ori- nally submitted manuscripts.




Sommario

1: Machine Learning and Intelligence.- An Incremental Density-Based Clustering Technique for Large Datasets.- BSDT ROC and Cognitive Learning Hypothesis.- Evolving Fuzzy Classifier for Data Mining - an Information Retrieval Approach.- Mereotopological Analysis of Formal Concepts in Security Ontologies.- 2: Agents and Multi-Agent Systems.- A Multi-agent Data Mining System for Defect Forecasting in a Decentralized Manufacturing Environment.- A Distributed Hierarchical Multi-agent Architecture for Detecting Injections in SQL Queries.- Incorporating Temporal Constraints in the Analysis Task of a Hybrid Intelligent IDS.- 3: Image, Video and Speech Processing.- Performances of Speech Signal Biometric Systems Based on Signal to Noise Ratio Degradation.- Lipreading Using n–Gram Feature Vector.- Face Processing for Security: A Short Review.- 4: Network Security.- Ontologies-Based Automated Intrusion Response System.- Semi-supervised Fingerprinting of Protocol Messages.- Monitoring of Spatial-Aggregated IP-Flow Records.- Improving Network Security through Traffic Log Anomaly Detection Using Time Series Analysis.- A Threat Model Approach to Threats and Vulnerabilities in On-line Social Networks.- An SLA-Based Approach for Network Anomaly Detection.- Understanding Honeypot Data by an Unsupervised Neural Visualization.- 5: Watermarking.- Permuted Image DCT Watermarking.- A Developed WaterMark Technique for Distributed Database Security.- 6: Cryptography.- Trident, a New Pseudo Random Number Generator Based on Coupled Chaotic Maps.- The Impact of the SHA-3 Casting Cryptography Competition on the Spanish IT Market.- 7: Industrial and Commercial Applications of Intelligent Methods for Security.- A New Task Engineering Approach for Workflow Access Control.- OPBUS: Fault ToleranceAgainst Integrity Attacks in Business Processes.- A Key Distribution Scheme for Live Streaming Multi-tree Overlays.- Intelligent Methods for Scheduling in Transportation.










Altre Informazioni

ISBN:

9783642166259

Condizione: Nuovo
Collana: Advances in Intelligent and Soft Computing
Dimensioni: 235 x 155 mm
Formato: Brossura
Illustration Notes:XV, 240 p.
Pagine Arabe: 240
Pagine Romane: xv


Dicono di noi