The Second International Workshop on Computational Intelligence for Security in Information Systems (CISIS’09) presented the most recent developments in the dynamically expanding realm of several fields such as Data Mining and Intelligence, Infrastructure Protection, Network Security, Biometry and Industrial Perspectives.
The International Workshop on Computational Intelligence for Security in Information Systems (CISIS) proposes a forum to the different communities related to the field of intelligent systems for security. The global purpose of CISIS conferences has been to form a broad and interdisciplinary meeting ground offering the opportunity to interact with the leading industries actively involved in the critical area of security, and have a picture of the current solutions adopted in practical domains.
This volume of Advances in Intelligent and Soft Computing contains accepted papers presented at CISIS’09, which was held in Burgos, Spain, on September 23rd-26th, 2009.
Author(s): João Paulo S. Medeiros, Agostinho M. Brito Jr., Paulo S. Motta Pires (auth.), Álvaro Herrero, Paolo Gastaldo, Rodolfo Zunino, Emilio Corchado (eds.)
Series: Advances in Intelligent and Soft Computing 63
Edition: 1
Publisher: Springer-Verlag Berlin Heidelberg
Year: 2009
Language: English
Pages: 216
Tags: Appl.Mathematics/Computational Methods of Engineering; Artificial Intelligence (incl. Robotics)
Front Matter....Pages -
A Data Mining Based Analysis of Nmap Operating System Fingerprint Database....Pages 1-8
Knowledge System for Application of Computer Security Rules....Pages 9-17
Clustering of Windows Security Events by Means of Frequent Pattern Mining....Pages 19-27
Text Clustering for Digital Forensics Analysis....Pages 29-36
A Preliminary Study on SVM Based Analysis of Underwater Magnetic Signals for Port Protection....Pages 37-44
Fuzzy Rule Based Intelligent Security and Fire Detector System....Pages 45-51
A Scaled Test Bench for Vanets with RFID Signalling....Pages 53-59
A SVM-Based Behavior Monitoring Algorithm towards Detection of Un-desired Events in Critical Infrastructures....Pages 61-68
Design and Implementation of High Performance Viterbi Decoder for Mobile Communication Data Security....Pages 69-76
An Adaptive Multi-agent Solution to Detect DoS Attack in SOAP Messages....Pages 77-84
A Self-learning Anomaly-Based Web Application Firewall....Pages 85-92
An Investigation of Multi-objective Genetic Algorithms for Encrypted Traffic Identification....Pages 93-100
A Multi-objective Optimisation Approach to IDS Sensor Placement....Pages 101-108
Towards Ontology-Based Intelligent Model for Intrusion Detection and Prevention....Pages 109-116
Ontology-Based Policy Translation....Pages 117-126
Automatic Rule Generation Based on Genetic Programming for Event Correlation....Pages 127-134
Learning Program Behavior for Run-Time Software Assurance....Pages 135-142
Multiagent Systems for Network Intrusion Detection: A Review....Pages 143-154
Multimodal Biometrics: Topics in Score Fusion....Pages 155-162
Security Efficiency Analysis of a Biometric Fuzzy Extractor for Iris Templates....Pages 163-170
Behavioural Biometrics Hardware Based on Bioinformatics Matching....Pages 171-178
Robust Real-Time Face Tracking Using an Active Camera....Pages 179-186
An Approach to Centralized Control Systems Based on Cellular Automata....Pages 187-191
Intelligent Methods and Models in Transportation....Pages 193-201
Knowledge Based Expert System for PID Controller Tuning under Hazardous Operating Conditions....Pages 203-210
Back Matter....Pages -