派博傳思國際中心

標題: Titlebook: Computational Intelligence in Security for Information Systems; CISIS‘09, 2nd Intern álvaro Herrero,Paolo Gastaldo,Emilio Corchado Conferen [打印本頁]

作者: centipede    時間: 2025-3-21 19:00
書目名稱Computational Intelligence in Security for Information Systems影響因子(影響力)




書目名稱Computational Intelligence in Security for Information Systems影響因子(影響力)學科排名




書目名稱Computational Intelligence in Security for Information Systems網(wǎng)絡公開度




書目名稱Computational Intelligence in Security for Information Systems網(wǎng)絡公開度學科排名




書目名稱Computational Intelligence in Security for Information Systems被引頻次




書目名稱Computational Intelligence in Security for Information Systems被引頻次學科排名




書目名稱Computational Intelligence in Security for Information Systems年度引用




書目名稱Computational Intelligence in Security for Information Systems年度引用學科排名




書目名稱Computational Intelligence in Security for Information Systems讀者反饋




書目名稱Computational Intelligence in Security for Information Systems讀者反饋學科排名





作者: 間諜活動    時間: 2025-3-21 21:40
A SVM-Based Behavior Monitoring Algorithm towards Detection of Un-desired Events in Critical Infrast to the statistics of the input data. Experiments on telecommunication network data sets support that the proposed algorithm is able to detect undesired events effectively, presenting a good potential for development of computer-aided monitoring software tools for protection of critical infrastructures.
作者: CLAY    時間: 2025-3-22 03:59

作者: 雜役    時間: 2025-3-22 05:51
Towards Ontology-Based Intelligent Model for Intrusion Detection and Preventioning Ontology Web Language with Description Logic (OWL-DL) with event communication and correlation integrated on Multi-Agent Systems, incorporating supervised and unsupervised models and generating intelligent reasoning.
作者: 臭名昭著    時間: 2025-3-22 09:19
1867-5662 eptember, 2009 held in BurgosThe Second International Workshop on Computational Intelligence for Security in Information Systems (CISIS’09) presented the most recent developments in the - namically expanding realm of several fields such as Data Mining and Intelligence, Infrastructure Protection, Net
作者: 脖子    時間: 2025-3-22 15:59
Dieter Specht,Christian M. F. Gru?entation of . that can express how operating systems are similar among them according to their TCP/IP stack implementation. This approach can improve the capability of identifying devices running unknown OSes. Other applications are also presented.
作者: 脖子    時間: 2025-3-22 19:35
https://doi.org/10.1007/978-3-658-44736-6rity rules is discussed. The system is defined by axioms and rules, and the concepts of the security models are then considered in order to evaluate the rules. It is showed how to lead to certain formulas in order to determine the validity of the set of fundamental expressions that constitute the security models. It uses a system S5.
作者: bourgeois    時間: 2025-3-23 01:00
Grundaspekte des Strategischen Controllings,ls used for investigation constitute a central concern. In this paper a clustering-based text mining technique is introduced for investigational purposes. The proposed methodology is experimentally applied to the publicly available Enron dataset that well fits a plausible forensics analysis context.
作者: 偽書    時間: 2025-3-23 02:57
Strategische Entwicklung von Sportvereinenching process, and implement by using a microprocessor based hardware and intelligent fire recognition software. In this paper, we also implement a fuzzy rule based intelligent early fire detection warning system. The early warning prior to the fault without any ambiguity can avoid the disaster against the fault taking some preventive measures.
作者: 竊喜    時間: 2025-3-23 06:53
,Gestaltungsorientiertes Resümee,ptimization under a flow based representation. Solutions do not use port numbers, IP address or payload. Performance of the resulting model provides 90% detection 0.8% false positive rates with 13 clusters supported by 14 of the original 38 features.
作者: ACME    時間: 2025-3-23 10:59

作者: 擁護    時間: 2025-3-23 16:56
A Data Mining Based Analysis of Nmap Operating System Fingerprint Databaseentation of . that can express how operating systems are similar among them according to their TCP/IP stack implementation. This approach can improve the capability of identifying devices running unknown OSes. Other applications are also presented.
作者: 侵蝕    時間: 2025-3-23 21:18

作者: 輕彈    時間: 2025-3-24 01:29
Text Clustering for Digital Forensics Analysisls used for investigation constitute a central concern. In this paper a clustering-based text mining technique is introduced for investigational purposes. The proposed methodology is experimentally applied to the publicly available Enron dataset that well fits a plausible forensics analysis context.
作者: RENIN    時間: 2025-3-24 05:22
Fuzzy Rule Based Intelligent Security and Fire Detector Systemching process, and implement by using a microprocessor based hardware and intelligent fire recognition software. In this paper, we also implement a fuzzy rule based intelligent early fire detection warning system. The early warning prior to the fault without any ambiguity can avoid the disaster against the fault taking some preventive measures.
作者: Foolproof    時間: 2025-3-24 08:00
An Investigation of Multi-objective Genetic Algorithms for Encrypted Traffic Identificationptimization under a flow based representation. Solutions do not use port numbers, IP address or payload. Performance of the resulting model provides 90% detection 0.8% false positive rates with 13 clusters supported by 14 of the original 38 features.
作者: 虛情假意    時間: 2025-3-24 13:23

作者: Gleason-score    時間: 2025-3-24 15:36
Conference proceedings 2009in the - namically expanding realm of several fields such as Data Mining and Intelligence, Infrastructure Protection, Network Security, Biometry and Industrial Perspectives. The International Workshop on Computational Intelligence for Security in Infor- tion Systems (CISIS) proposes a forum to the d
作者: 減弱不好    時間: 2025-3-24 21:33
Strategische Entwicklung von Sportvereinenlated with success. In this paper, we present a real framework for vanets that use wireless communication among vehicles and RFID for different traffic signalling information, such as bus stop or semaphore location, speed limit information, etc.
作者: 刺耳    時間: 2025-3-25 02:30
https://doi.org/10.1007/978-3-322-86904-3he administrator is guided to provide the missing data. The configurations generated by our approach are represented in a vendor-independent format and therefore can be used with several real devices.
作者: 地名詞典    時間: 2025-3-25 06:27
https://doi.org/10.1007/978-3-8349-3640-0itioning paper poses an optimization challenge in the design of such correlation engine and a number of directions for research. We present a novel approach for automatic generation of security event correlation rules based on Genetic Programming which has been already used at sensor level.
作者: SOW    時間: 2025-3-25 10:31
https://doi.org/10.1007/978-3-8349-3640-0tives. We leverage state information in event data to summarize loop structures in sequences which, in turn, leads to better classification of program behavior. We have performed initial validations of these techniques using Asterisk., a widely deployed, open source digital PBX.
作者: grenade    時間: 2025-3-25 11:56
https://doi.org/10.1007/978-3-8349-4058-2pular score normalization techniques (z-norm, tanh, MAD, etc), and proposes a new score normalization procedure with an optimized performance harnessing tested fusion techniques and outperforming previous results through a proof-of-concept implementation.
作者: 旋轉(zhuǎn)一周    時間: 2025-3-25 16:22

作者: 減少    時間: 2025-3-25 21:23

作者: 灌輸    時間: 2025-3-26 03:53

作者: insurrection    時間: 2025-3-26 07:29

作者: 越自我    時間: 2025-3-26 12:11
Multimodal Biometrics: Topics in Score Fusionpular score normalization techniques (z-norm, tanh, MAD, etc), and proposes a new score normalization procedure with an optimized performance harnessing tested fusion techniques and outperforming previous results through a proof-of-concept implementation.
作者: kindred    時間: 2025-3-26 14:47
https://doi.org/10.1007/978-3-642-48199-4 system which currently requires a human online monitoring or an offline signal processing. The research proposed here, by means of a windowing of the signals, uses Support Vector Machines for classification, as tool for the detection problem. Empirical results show the effectiveness of the method.
作者: 詩集    時間: 2025-3-26 17:27
https://doi.org/10.1007/978-3-663-11546-5f the multi-agent systems and the self-adaption ability to the changes that occur in the patterns of attack. A prototype of the architecture was developed and the results obtained are presented in this study.
作者: 大雨    時間: 2025-3-27 00:44
https://doi.org/10.1007/978-3-663-11546-5ests have been used to train the system. Experiments show that when the XML file has enough data to closely characterize the normal behaviour of the target web application, a very high detection rate is reached while the false alarm rate ramains very low.
作者: Venules    時間: 2025-3-27 02:36
A Preliminary Study on SVM Based Analysis of Underwater Magnetic Signals for Port Protection system which currently requires a human online monitoring or an offline signal processing. The research proposed here, by means of a windowing of the signals, uses Support Vector Machines for classification, as tool for the detection problem. Empirical results show the effectiveness of the method.
作者: 輕率的你    時間: 2025-3-27 05:40
An Adaptive Multi-agent Solution to Detect DoS Attack in SOAP Messagesf the multi-agent systems and the self-adaption ability to the changes that occur in the patterns of attack. A prototype of the architecture was developed and the results obtained are presented in this study.
作者: Evacuate    時間: 2025-3-27 09:49
A Self-learning Anomaly-Based Web Application Firewallests have been used to train the system. Experiments show that when the XML file has enough data to closely characterize the normal behaviour of the target web application, a very high detection rate is reached while the false alarm rate ramains very low.
作者: Adrenaline    時間: 2025-3-27 15:14
https://doi.org/10.1007/978-3-658-44736-6spects has been developed, mainly based on the interruptions among security events. Both approaches have shown to be effective and complementary in order to cluster security audit trails of Windows systems and extract useful behavior patterns.
作者: landfill    時間: 2025-3-27 20:54
https://doi.org/10.1007/978-3-663-01194-1 to the statistics of the input data. Experiments on telecommunication network data sets support that the proposed algorithm is able to detect undesired events effectively, presenting a good potential for development of computer-aided monitoring software tools for protection of critical infrastructures.
作者: Obsessed    時間: 2025-3-28 01:58
https://doi.org/10.1007/978-3-663-01194-1rrecting code has proven to be are effective way to overcome data corruption in digital communication channel. In this paper, we describe the design and implementation of a reduced complexity decode approach along with minimum power dissipation FPGAs for Mobile Communication data security.
作者: myalgia    時間: 2025-3-28 02:49
https://doi.org/10.1007/978-3-322-86904-3ing Ontology Web Language with Description Logic (OWL-DL) with event communication and correlation integrated on Multi-Agent Systems, incorporating supervised and unsupervised models and generating intelligent reasoning.
作者: Malleable    時間: 2025-3-28 08:40

作者: cardiac-arrest    時間: 2025-3-28 10:52

作者: Invertebrate    時間: 2025-3-28 17:26
álvaro Herrero,Paolo Gastaldo,Emilio CorchadoPresents latest research in Computational Intelligence in Security for Information Systems.Proceedings of the CISIS‘09 Workshop: 23rd-26th September, 2009 held in Burgos
作者: 癡呆    時間: 2025-3-28 22:03
Advances in Intelligent and Soft Computinghttp://image.papertrans.cn/c/image/232536.jpg
作者: Evacuate    時間: 2025-3-28 23:37
Computational Intelligence in Security for Information Systems978-3-642-04091-7Series ISSN 1867-5662 Series E-ISSN 1867-5670
作者: Clumsy    時間: 2025-3-29 05:19

作者: 籠子    時間: 2025-3-29 09:41

作者: FOLD    時間: 2025-3-29 11:32
https://doi.org/10.1007/978-3-658-44736-6For that, based on real security event logs, two different clustering strategies have been developed. On the one hand, a clustering process has been carried out taking into account the characteristics that define the events in a quantitative way. On the other hand, an approach based on qualitative a
作者: 地名表    時間: 2025-3-29 16:53

作者: 評論性    時間: 2025-3-29 21:45
https://doi.org/10.1007/978-3-642-48199-4stem with an auxiliary array of magnetic sensors can improve the effectiveness of the intruder detection system. One of the major issues that arise from the integrated magnetic and acoustic system is the interpretation of the magnetic signals coming from the sensors. In this paper a machine learning
作者: MEEK    時間: 2025-3-30 01:39

作者: Stagger    時間: 2025-3-30 04:35

作者: parallelism    時間: 2025-3-30 09:43

作者: 反省    時間: 2025-3-30 16:21
https://doi.org/10.1007/978-3-663-01194-1 importance. However the conflicting requirements of power, area and throughput of such applications make hardware cryptography an ideal choice. Dedicated hardware devices such as FPGAs can run encryption routines concurrently with the host computer which runs other applications. The use of error co
作者: 聰明    時間: 2025-3-30 19:09
https://doi.org/10.1007/978-3-663-11546-5 security standards do not focus on this type of attack. This article presents a novel distributed and adaptive approach for dealing with DoS attacks in Web Service environments, which represents an alternative to the existing centralized solutions. The solution proposes a distributed hierarchical m
作者: 泥土謙卑    時間: 2025-3-31 00:24
https://doi.org/10.1007/978-3-663-11546-5wn web attacks. The system decides whether the incoming requests are attacks or not aided by an XML file. The XML file contains the normal behavior of the target web application statistically characterized and is built from a set of normal requests artificially generated. Any request which deviates
作者: mosque    時間: 2025-3-31 02:46

作者: 愛國者    時間: 2025-3-31 06:27
https://doi.org/10.1007/978-3-322-86904-3oach to define an ontology model for representing intrusion detection and prevention events as well as a hybrid intelligent system based on clustering and Artificial Neuronal Networks for classification and pattern recognition. We have specified attacks signatures, reaction rules, asserts, axioms us
作者: Anhydrous    時間: 2025-3-31 09:47





歡迎光臨 派博傳思國際中心 (http://www.pjsxioz.cn/) Powered by Discuz! X3.5
平远县| 井研县| 团风县| 郑州市| 雅江县| 昭苏县| 深州市| 长葛市| 海南省| 紫金县| 台州市| 金川县| 景宁| 四会市| 兴文县| 昂仁县| 洪江市| 师宗县| 裕民县| 石狮市| 吴江市| 洪泽县| 米林县| 陇西县| 陇川县| 平原县| 台中县| 炉霍县| 泾川县| 曲阳县| 平度市| 临潭县| 内丘县| 河曲县| 二连浩特市| 沭阳县| 玉山县| 厦门市| 焦作市| 四会市| 巨野县|