default search action
2. CISIS 2009: Burgos, Spain
- Álvaro Herrero, Paolo Gastaldo, Rodolfo Zunino, Emilio Corchado:
Computational Intelligence in Security for Information Systems - CISIS'09, 2nd International Workshop, Burgos, Spain, 23-26 September 2009 Proceedings. Advances in Intelligent and Soft Computing 63, Springer 2009, ISBN 978-3-642-04090-0 - João Paulo S. Medeiros, Agostinho M. Brito Jr., Paulo S. Motta Pires:
A Data Mining Based Analysis of Nmap Operating System Fingerprint Database. 1-8 - Felipe Rolando Menchaca García, Salvador Contreras Hernández:
Knowledge System for Application of Computer Security Rules. 9-17 - Rosa Basagoiti, Urko Zurutuza, Asier Aztiria, Guzmán Santafé, Mario Reyes:
Clustering of Windows Security Events by Means of Frequent Pattern Mining. 19-27 - Sergio Decherchi, Simone Tacconi, Judith Redi, Alessio Leoncini, Fabio Sangiacomo, Rodolfo Zunino:
Text Clustering for Digital Forensics Analysis. 29-36 - Davide Leoncini, Sergio Decherchi, Osvaldo Faggioni, Paolo Gastaldo, Maurizio Soldani, Rodolfo Zunino:
A Preliminary Study on SVM Based Analysis of Underwater Magnetic Signals for Port Protection. 37-44 - Joydeb Roy Choudhury, Tribeni Prasad Banerjee, Swagatam Das, Ajith Abraham, Václav Snásel:
Fuzzy Rule Based Intelligent Security and Fire Detector System. 45-51 - Andrés Ortiz, Alberto Peinado, Jorge Munilla:
A Scaled Test Bench for Vanets with RFID Signalling. 53-59 - Y. Jiang, J. Jiang, Paolo Capodieci:
A SVM-Based Behavior Monitoring Algorithm towards Detection of Un-desired Events in Critical Infrastructures. 61-68 - T. Menakadevi, M. Madheswaran:
Design and Implementation of High Performance Viterbi Decoder for Mobile Communication Data Security. 69-76 - Cristian Pinzón, Juan Francisco de Paz, Javier Bajo, Juan M. Corchado:
An Adaptive Multi-agent Solution to Detect DoS Attack in SOAP Messages. 77-84 - Carmen Torrano-Gimenez, Alejandro Pérez-Villegas, Gonzalo Álvarez:
A Self-learning Anomaly-Based Web Application Firewall. 85-92 - Carlos Bacquet, Nur Zincir-Heywood, Malcolm I. Heywood:
An Investigation of Multi-objective Genetic Algorithms for Encrypted Traffic Identification. 93-100 - Hao Chen, John A. Clark, Juan E. Tapiador, Siraj A. Shaikh, Howard Chivers, Philip Nobles:
A Multi-objective Optimisation Approach to IDS Sensor Placement. 101-108 - Gustavo A. Isaza, Andrés G. Castillo, Manuel López, Luis Fernando Castillo:
Towards Ontology-Based Intelligent Model for Intrusion Detection and Prevention. 109-116 - Cataldo Basile, Antonio Lioy, Salvatore Scozzi, Marco Vallini:
Ontology-Based Policy Translation. 117-126 - Guillermo Suarez-Tangil, Esther Palomar, José María de Fuentes, Jorge Blasco Alís, Arturo Ribagorda:
Automatic Rule Generation Based on Genetic Programming for Event Correlation. 127-134 - Hira Agrawal, Clifford Behrens, Balakrishnan Dasarathy, Leslie Lee Fook:
Learning Program Behavior for Run-Time Software Assurance. 135-142 - Álvaro Herrero, Emilio Corchado:
Multiagent Systems for Network Intrusion Detection: A Review. 143-154 - Luis A. Puente, Maria Jesús Poza, Juan Miguel Gómez, Diego Carrero:
Multimodal Biometrics: Topics in Score Fusion. 155-162 - Fernando Hernández Álvarez, Luis Hernández Encinas:
Security Efficiency Analysis of a Biometric Fuzzy Extractor for Iris Templates. 163-170 - Slobodan Bojanic, Vukasin Pejovic, Gabriel Caffarena, Vladimir M. Milovanovic, Carlos Carreras, Jelena Popovic:
Behavioural Biometrics Hardware Based on Bioinformatics Matching. 171-178 - Paramveer S. Dhillon:
Robust Real-Time Face Tracking Using an Active Camera. 179-186 - Rosaura Palma-Orozco, Gisela Palma-Orozco, José de Jesús Medel Juárez, José Alfredo Jiménez-Benítez:
An Approach to Centralized Control Systems Based on Cellular Automata. 187-191 - Maria Belén Vaquerizo García:
Intelligent Methods and Models in Transportation. 193-201 - Héctor Alaiz-Moretón, José Luís Calvo-Rolle, Javier Alfonso-Cendón, Ángel Alonso, Ramón Ferreiro García:
Knowledge Based Expert System for PID Controller Tuning under Hazardous Operating Conditions. 203-210
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.