did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

We're the #1 textbook rental company. Let us show you why.

9783642166259

Computational Intelligence in Security for Information Systems 2010

by ; ; ;
  • ISBN13:

    9783642166259

  • ISBN10:

    3642166253

  • Format: Paperback
  • Copyright: 2010-10-01
  • Publisher: Springer-Nature New York Inc
  • Purchase Benefits
  • Free Shipping Icon Free Shipping On Orders Over $35!
    Your order must be $35 or more to qualify for free economy shipping. Bulk sales, PO's, Marketplace items, eBooks and apparel do not qualify for this offer.
  • eCampus.com Logo Get Rewarded for Ordering Your Textbooks! Enroll Now
List Price: $249.99

Summary

This volume of Advances in Intelligent and Soft Computing contains accepted papers presented at the 3rd International Conference on Computational Intelligence in Security for Information Systems (CISIS'10), which was held in the beautiful and historic city of León, Spain, in November, 2010.Since it origin, the main aim of CISIS conferences has been to establish a broad and interdisciplinary forum for Computational Intelligence and Associated Learning Paradigms, which are playing increasingly important roles in a large number of application areas related to Security in Information Systems.CISIS'10  provided a broad and interdisciplinary forum to present the most recent developments in several very active scientific areas such as Machine Learning, Infrastructure Protection, Intelligent Methods in Energy and Transportation, Network Security, Biometry, Cryptography, High-performance and Grid Computing, and Industrial Perspective among others. The global purpose of the CISIS series of conferences has been to form a broad and interdisciplinary meeting ground offering the opportunity to interact with the leading research team and industries actively involved in the critical area of security, and have a picture of the current solutions adopted in practical domains.

Table of Contents

Machine Learning and Intelligence
An Incremental Density-Based Clustering Technique for Large Datasetsp. 3
BSDT ROC and Cognitive Learning Hypothesisp. 13
Evolving Fuzzy Classifier for Data Mining - An Information Retrieval Approachp. 25
Mereotopological Analysis of Formal Concepts in Security Ontologiesp. 33
Agents and Multi-Agent Systems
A Multi-agent Data Mining System for Defect Forecasting in a Decentralized Manufacturing Environmentp. 43
A Distributed Hierarchical Multi-agent Architecture for Detecting Injections in SQL Queriesp. 51
Incorporating Temporal Constraints in the Analysis Task of a Hybrid Intelligent IDSp. 61
Image, Video and Speech Processing
Performances of Speech Signal Biometric Systems Based on Signal to Noise Ratio Degradationp. 73
Lipreading Using n-Gram Feature Vectorp. 81
Face Processing for Security: A Short Reviewp. 89
Network Security
Ontologies-Based Automated Intrusion Response Systemp. 99
Semi-supervised Fingerprinting of Protocol Messagesp. 107
Monitoring of Spatial-Aggregated IP-Flow Recordsp. 117
Improving Network Security through Traffic Log Anomaly Detection Using Time Series Analysisp. 125
A Threat Model Approach to Threats and Vulnerabilities in On-line Social Networksp. 135
An SLA-Based Approach for Network Anomaly Detectionp. 143
Understanding Honeypot Data by an Unsupervised Neural Visualizationp. 151
Watermarking
Permuted Image DCT Watermarkingp. 163
A Developed Watermark Technique for Distributed Database Securityp. 173
Cryptography
Trident, a New Pseudo Random Number Generator on Coupled Chaotic Mapsp. 183
The Impact of the SHA-3 Casting Cryptography Competition on the Spanish IT Marketp. 191
Industrial and Commercial Applications of Intelligent Methods for Security
A New Task Engineering Approach for Workflow Access Controlp. 203
OPBUS: Fault Tolerance Against Integrity Attacks in Business Processesp. 213
A Key Distribution Scheme for Live Streaming Multi-tree Overlaysp. 223
Intelligent Methods for Scheduling in Transportationp. 231
Author Indexp. 239
Table of Contents provided by Ingram. All Rights Reserved.

Supplemental Materials

What is included with this book?

The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.

The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.

Rewards Program