標題: Titlebook: Computational Intelligence in Security for Information Systems; CISIS‘09, 2nd Intern álvaro Herrero,Paolo Gastaldo,Emilio Corchado Conferen [打印本頁] 作者: centipede 時間: 2025-3-21 19:00
書目名稱Computational Intelligence in Security for Information Systems影響因子(影響力)
書目名稱Computational Intelligence in Security for Information Systems影響因子(影響力)學科排名
書目名稱Computational Intelligence in Security for Information Systems網(wǎng)絡公開度
書目名稱Computational Intelligence in Security for Information Systems網(wǎng)絡公開度學科排名
書目名稱Computational Intelligence in Security for Information Systems被引頻次
書目名稱Computational Intelligence in Security for Information Systems被引頻次學科排名
書目名稱Computational Intelligence in Security for Information Systems年度引用
書目名稱Computational Intelligence in Security for Information Systems年度引用學科排名
書目名稱Computational Intelligence in Security for Information Systems讀者反饋
書目名稱Computational Intelligence in Security for Information Systems讀者反饋學科排名
作者: 間諜活動 時間: 2025-3-21 21:40
A SVM-Based Behavior Monitoring Algorithm towards Detection of Un-desired Events in Critical Infrast to the statistics of the input data. Experiments on telecommunication network data sets support that the proposed algorithm is able to detect undesired events effectively, presenting a good potential for development of computer-aided monitoring software tools for protection of critical infrastructures.作者: CLAY 時間: 2025-3-22 03:59 作者: 雜役 時間: 2025-3-22 05:51
Towards Ontology-Based Intelligent Model for Intrusion Detection and Preventioning Ontology Web Language with Description Logic (OWL-DL) with event communication and correlation integrated on Multi-Agent Systems, incorporating supervised and unsupervised models and generating intelligent reasoning.作者: 臭名昭著 時間: 2025-3-22 09:19
1867-5662 eptember, 2009 held in BurgosThe Second International Workshop on Computational Intelligence for Security in Information Systems (CISIS’09) presented the most recent developments in the - namically expanding realm of several fields such as Data Mining and Intelligence, Infrastructure Protection, Net作者: 脖子 時間: 2025-3-22 15:59
Dieter Specht,Christian M. F. Gru?entation of . that can express how operating systems are similar among them according to their TCP/IP stack implementation. This approach can improve the capability of identifying devices running unknown OSes. Other applications are also presented.作者: 脖子 時間: 2025-3-22 19:35
https://doi.org/10.1007/978-3-658-44736-6rity rules is discussed. The system is defined by axioms and rules, and the concepts of the security models are then considered in order to evaluate the rules. It is showed how to lead to certain formulas in order to determine the validity of the set of fundamental expressions that constitute the security models. It uses a system S5.作者: bourgeois 時間: 2025-3-23 01:00
Grundaspekte des Strategischen Controllings,ls used for investigation constitute a central concern. In this paper a clustering-based text mining technique is introduced for investigational purposes. The proposed methodology is experimentally applied to the publicly available Enron dataset that well fits a plausible forensics analysis context.作者: 偽書 時間: 2025-3-23 02:57
Strategische Entwicklung von Sportvereinenching process, and implement by using a microprocessor based hardware and intelligent fire recognition software. In this paper, we also implement a fuzzy rule based intelligent early fire detection warning system. The early warning prior to the fault without any ambiguity can avoid the disaster against the fault taking some preventive measures.作者: 竊喜 時間: 2025-3-23 06:53
,Gestaltungsorientiertes Resümee,ptimization under a flow based representation. Solutions do not use port numbers, IP address or payload. Performance of the resulting model provides 90% detection 0.8% false positive rates with 13 clusters supported by 14 of the original 38 features.作者: ACME 時間: 2025-3-23 10:59 作者: 擁護 時間: 2025-3-23 16:56
A Data Mining Based Analysis of Nmap Operating System Fingerprint Databaseentation of . that can express how operating systems are similar among them according to their TCP/IP stack implementation. This approach can improve the capability of identifying devices running unknown OSes. Other applications are also presented.作者: 侵蝕 時間: 2025-3-23 21:18 作者: 輕彈 時間: 2025-3-24 01:29
Text Clustering for Digital Forensics Analysisls used for investigation constitute a central concern. In this paper a clustering-based text mining technique is introduced for investigational purposes. The proposed methodology is experimentally applied to the publicly available Enron dataset that well fits a plausible forensics analysis context.作者: RENIN 時間: 2025-3-24 05:22
Fuzzy Rule Based Intelligent Security and Fire Detector Systemching process, and implement by using a microprocessor based hardware and intelligent fire recognition software. In this paper, we also implement a fuzzy rule based intelligent early fire detection warning system. The early warning prior to the fault without any ambiguity can avoid the disaster against the fault taking some preventive measures.作者: Foolproof 時間: 2025-3-24 08:00
An Investigation of Multi-objective Genetic Algorithms for Encrypted Traffic Identificationptimization under a flow based representation. Solutions do not use port numbers, IP address or payload. Performance of the resulting model provides 90% detection 0.8% false positive rates with 13 clusters supported by 14 of the original 38 features.作者: 虛情假意 時間: 2025-3-24 13:23 作者: Gleason-score 時間: 2025-3-24 15:36
Conference proceedings 2009in the - namically expanding realm of several fields such as Data Mining and Intelligence, Infrastructure Protection, Network Security, Biometry and Industrial Perspectives. The International Workshop on Computational Intelligence for Security in Infor- tion Systems (CISIS) proposes a forum to the d作者: 減弱不好 時間: 2025-3-24 21:33
Strategische Entwicklung von Sportvereinenlated with success. In this paper, we present a real framework for vanets that use wireless communication among vehicles and RFID for different traffic signalling information, such as bus stop or semaphore location, speed limit information, etc.作者: 刺耳 時間: 2025-3-25 02:30
https://doi.org/10.1007/978-3-322-86904-3he administrator is guided to provide the missing data. The configurations generated by our approach are represented in a vendor-independent format and therefore can be used with several real devices.作者: 地名詞典 時間: 2025-3-25 06:27
https://doi.org/10.1007/978-3-8349-3640-0itioning paper poses an optimization challenge in the design of such correlation engine and a number of directions for research. We present a novel approach for automatic generation of security event correlation rules based on Genetic Programming which has been already used at sensor level.作者: SOW 時間: 2025-3-25 10:31
https://doi.org/10.1007/978-3-8349-3640-0tives. We leverage state information in event data to summarize loop structures in sequences which, in turn, leads to better classification of program behavior. We have performed initial validations of these techniques using Asterisk., a widely deployed, open source digital PBX.作者: grenade 時間: 2025-3-25 11:56
https://doi.org/10.1007/978-3-8349-4058-2pular score normalization techniques (z-norm, tanh, MAD, etc), and proposes a new score normalization procedure with an optimized performance harnessing tested fusion techniques and outperforming previous results through a proof-of-concept implementation.作者: 旋轉(zhuǎn)一周 時間: 2025-3-25 16:22 作者: 減少 時間: 2025-3-25 21:23 作者: 灌輸 時間: 2025-3-26 03:53 作者: insurrection 時間: 2025-3-26 07:29 作者: 越自我 時間: 2025-3-26 12:11
Multimodal Biometrics: Topics in Score Fusionpular score normalization techniques (z-norm, tanh, MAD, etc), and proposes a new score normalization procedure with an optimized performance harnessing tested fusion techniques and outperforming previous results through a proof-of-concept implementation.作者: kindred 時間: 2025-3-26 14:47
https://doi.org/10.1007/978-3-642-48199-4 system which currently requires a human online monitoring or an offline signal processing. The research proposed here, by means of a windowing of the signals, uses Support Vector Machines for classification, as tool for the detection problem. Empirical results show the effectiveness of the method.作者: 詩集 時間: 2025-3-26 17:27
https://doi.org/10.1007/978-3-663-11546-5f the multi-agent systems and the self-adaption ability to the changes that occur in the patterns of attack. A prototype of the architecture was developed and the results obtained are presented in this study.作者: 大雨 時間: 2025-3-27 00:44
https://doi.org/10.1007/978-3-663-11546-5ests have been used to train the system. Experiments show that when the XML file has enough data to closely characterize the normal behaviour of the target web application, a very high detection rate is reached while the false alarm rate ramains very low.作者: Venules 時間: 2025-3-27 02:36
A Preliminary Study on SVM Based Analysis of Underwater Magnetic Signals for Port Protection system which currently requires a human online monitoring or an offline signal processing. The research proposed here, by means of a windowing of the signals, uses Support Vector Machines for classification, as tool for the detection problem. Empirical results show the effectiveness of the method.作者: 輕率的你 時間: 2025-3-27 05:40
An Adaptive Multi-agent Solution to Detect DoS Attack in SOAP Messagesf the multi-agent systems and the self-adaption ability to the changes that occur in the patterns of attack. A prototype of the architecture was developed and the results obtained are presented in this study.作者: Evacuate 時間: 2025-3-27 09:49
A Self-learning Anomaly-Based Web Application Firewallests have been used to train the system. Experiments show that when the XML file has enough data to closely characterize the normal behaviour of the target web application, a very high detection rate is reached while the false alarm rate ramains very low.作者: Adrenaline 時間: 2025-3-27 15:14
https://doi.org/10.1007/978-3-658-44736-6spects has been developed, mainly based on the interruptions among security events. Both approaches have shown to be effective and complementary in order to cluster security audit trails of Windows systems and extract useful behavior patterns.作者: landfill 時間: 2025-3-27 20:54
https://doi.org/10.1007/978-3-663-01194-1 to the statistics of the input data. Experiments on telecommunication network data sets support that the proposed algorithm is able to detect undesired events effectively, presenting a good potential for development of computer-aided monitoring software tools for protection of critical infrastructures.作者: Obsessed 時間: 2025-3-28 01:58
https://doi.org/10.1007/978-3-663-01194-1rrecting code has proven to be are effective way to overcome data corruption in digital communication channel. In this paper, we describe the design and implementation of a reduced complexity decode approach along with minimum power dissipation FPGAs for Mobile Communication data security.作者: myalgia 時間: 2025-3-28 02:49
https://doi.org/10.1007/978-3-322-86904-3ing Ontology Web Language with Description Logic (OWL-DL) with event communication and correlation integrated on Multi-Agent Systems, incorporating supervised and unsupervised models and generating intelligent reasoning.作者: Malleable 時間: 2025-3-28 08:40 作者: cardiac-arrest 時間: 2025-3-28 10:52 作者: Invertebrate 時間: 2025-3-28 17:26
álvaro Herrero,Paolo Gastaldo,Emilio CorchadoPresents latest research in Computational Intelligence in Security for Information Systems.Proceedings of the CISIS‘09 Workshop: 23rd-26th September, 2009 held in Burgos作者: 癡呆 時間: 2025-3-28 22:03
Advances in Intelligent and Soft Computinghttp://image.papertrans.cn/c/image/232536.jpg作者: Evacuate 時間: 2025-3-28 23:37
Computational Intelligence in Security for Information Systems978-3-642-04091-7Series ISSN 1867-5662 Series E-ISSN 1867-5670 作者: Clumsy 時間: 2025-3-29 05:19 作者: 籠子 時間: 2025-3-29 09:41 作者: FOLD 時間: 2025-3-29 11:32
https://doi.org/10.1007/978-3-658-44736-6For that, based on real security event logs, two different clustering strategies have been developed. On the one hand, a clustering process has been carried out taking into account the characteristics that define the events in a quantitative way. On the other hand, an approach based on qualitative a作者: 地名表 時間: 2025-3-29 16:53 作者: 評論性 時間: 2025-3-29 21:45
https://doi.org/10.1007/978-3-642-48199-4stem with an auxiliary array of magnetic sensors can improve the effectiveness of the intruder detection system. One of the major issues that arise from the integrated magnetic and acoustic system is the interpretation of the magnetic signals coming from the sensors. In this paper a machine learning作者: MEEK 時間: 2025-3-30 01:39 作者: Stagger 時間: 2025-3-30 04:35 作者: parallelism 時間: 2025-3-30 09:43 作者: 反省 時間: 2025-3-30 16:21
https://doi.org/10.1007/978-3-663-01194-1 importance. However the conflicting requirements of power, area and throughput of such applications make hardware cryptography an ideal choice. Dedicated hardware devices such as FPGAs can run encryption routines concurrently with the host computer which runs other applications. The use of error co作者: 聰明 時間: 2025-3-30 19:09
https://doi.org/10.1007/978-3-663-11546-5 security standards do not focus on this type of attack. This article presents a novel distributed and adaptive approach for dealing with DoS attacks in Web Service environments, which represents an alternative to the existing centralized solutions. The solution proposes a distributed hierarchical m作者: 泥土謙卑 時間: 2025-3-31 00:24
https://doi.org/10.1007/978-3-663-11546-5wn web attacks. The system decides whether the incoming requests are attacks or not aided by an XML file. The XML file contains the normal behavior of the target web application statistically characterized and is built from a set of normal requests artificially generated. Any request which deviates 作者: mosque 時間: 2025-3-31 02:46 作者: 愛國者 時間: 2025-3-31 06:27
https://doi.org/10.1007/978-3-322-86904-3oach to define an ontology model for representing intrusion detection and prevention events as well as a hybrid intelligent system based on clustering and Artificial Neuronal Networks for classification and pattern recognition. We have specified attacks signatures, reaction rules, asserts, axioms us作者: Anhydrous 時間: 2025-3-31 09:47