did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

We're the #1 textbook rental company. Let us show you why.

9783642213229

Computational Intelligence in Security for Information Systems : 4th International Conference, CISIS 2011, Held at IWANN 2011, Torremolinos-Málaga, Spain, June 8-10, 2011, Proceedings

by ;
  • ISBN13:

    9783642213229

  • ISBN10:

    3642213227

  • Format: Paperback
  • Copyright: 2011-08-03
  • Publisher: Springer-Verlag New York Inc
  • Purchase Benefits
List Price: $99.00 Save up to $80.44
  • Digital
    $40.22
    Add to Cart

    DURATION
    PRICE

Supplemental Materials

What is included with this book?

Summary

This book constitutes the refereed proceedings of the 4th International Conference on Computational Intelligence in Security for Information Systems, CISIS 2011, held in Torremolinos-Málaga, in June 2011 as a satellite event of IWANN 2011, the International Work-conference on Artificial and Natural Neural Networks.The 38 revised full papers presented were carefully reviewed and selected from a total of 70 submissions. The papers are organized in topical sections on machine learning and intelligence, network security, cryptography, securing software, and applications of intelligent methods for security.

Table of Contents

Machine Learning and Intelligence
Collective Classification for Spam Filteringp. 1
Detecting Bad-Mouthing Attacks on Reputation Systems Using Self-Organizing Mapsp. 9
Approach Based Ensemble Methods for Better and Faster Intrusion Detectionp. 17
Application of the Generic Feature Selection Measure in Detection of Web Attacksp. 25
Data Aggregation Based on Fuzzy Logic for VANETsp. 33
Network Security
Digging into IP Flow Records with a Visual Kernel Methodp. 41
Opcode-Sequence-Based Semi-supervised Unknown Malware Detectionp. 50
A New Alert Correlation Algorithm Based on Attack Graphp. 58
A Qualitative Survey of Active TCP/IP Fingerprinting Tools and Techniques for Operating Systems Identificationp. 68
Security Alert Correlation Using Growing Neural Gasp. 76
A Comparative Performance Evaluation of DNS Tunneling Toolsp. 84
Security Analysis and Complexity Comparison of Some Recent Lightweight RFID Protocolsp. 92
A Secure and Efficient Searching Scheme for Trusted Nodes in a Peer-to-Peer Networkp. 100
Testing Ensembles for Intrusion Detection: On the Identification of Mutated Network Scansp. 109
An Intelligent Information Security Mechanism for the Network Layer of WSN: BIOSARPp. 118
Cryptography
Structural Properties of Cryptographic Sequencesp. 127
A Multisignature Scheme Based on the SDLP and on the IFPp. 135
A Group Signature Scheme Based on the Integer Factorization and the Subgroup Discrete Logarithm Problemsp. 143
Keeping Group Communications Private: An Up-to-Date Review on Centralized Secure Multicastp. 151
Java Car$mplementation of the Elliptic Curve Integrated Encryption Scheme Using Prime and Binary Finite Fieldsp. 160
Comprehensive Protection of RFID Traceability Information Systems Using Aggregate Signaturesp. 168
Cryptanalysis of Multicast Protocols with Key Refreshment Based on the Extended Euclidean Algorithmp. 177
Improving the Message Expansion of the Tangle Hash Functionp. 183
Cryptosystem with One Dimensional Chaotic Mapsp. 190
Securing Software
A Quantitative Analysis into the Economics of Correcting Software Bugsp. 198
Rationally Opting for the Insecure Alternative: Negative Externalities and the Selection of Security Controlsp. 206
An Approach for Adapting Moodle into a Secure Infrastructurep. 214
On Secure JAVA Application in SOA-Based PKI Mobile Government Systemsp. 222
Applications of Intelligent Methods for Security
Structural Feature Based Anomaly Detection for Packed Executable Identificationp. 230
Produre: A Novel Proximity Discovery Mechanism in Location Tagging Systemp. 238
Scientific Gateway and Visualization Toolp. 246
An Innovative Framework for Securing Unstructured Documentsp. 251
Use of Schema Associative Mapping for Synchronization of the Virtualp. 259
Enforcing Data Quality Rules for a Synchronized VM Log Audit Environment Using Transformation Mapping Techniquesp. 265
Evaluating User-Centered Privacy Model (UPM) in Pervasive Computing Systemsp. 272
An Innovative Linkage Learning Based on Differences in Local Optimumsp. 285
A New Particle Swarm Optimization for Dynamic Environmentsp. 293
A Classifier Ensemble for Face Recognition Using Gabor Wavelet Featuresp. 301
Author Indexp. 309
Table of Contents provided by Ingram. All Rights Reserved.

Supplemental Materials

What is included with this book?

The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.

The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.

Rewards Program