


default search action
1. CISIS 2008: Genoa, Italy
- Emilio Corchado, Rodolfo Zunino, Paolo Gastaldo, Álvaro Herrero

:
Proceedings of the International Workshop on Computational Intelligence in Security for Information Systems, CISIS'08, Genova, Italy, October 23-24, 2008. Advances in Soft Computing 53, Springer 2009, ISBN 978-3-540-88180-3
Computational Intelligence Methods for Fighting Crime
- Carlo Guazzoni, Gaetano Bruno Ronsivalle:

An Artificial Neural Network for Bank Robbery Risk Management: The OS.SI.F Web On-Line Tool of the ABI Anti-crime Department. 1-10 - Mauro Cislaghi, George Eleftherakis

, Roberto Mazzilli, Francois Mohier, Sara Ferri, Valerio Giuffrida, Elisa Negroni:
Secure Judicial Communication Exchange Using Soft-computing Methods and Biometric Authentication. 11-18 - Queen Esther Booker:

Identity Resolution in Criminal Justice Data: An Application of NORA. 19-26 - Dario V. Forte, Angelo Cavallini, Cristiano Maruti, Luca Losio, Thomas Orlandi, Michele Zambelli:

PTK: An Alternative Advanced Interface for the Sleuth Kit. 27-34
Text Mining and Intelligence
- Federico Neri, Massimo Pettoni:

Stalker, a Multilingual Text Mining Search Engine for Open Source Intelligence. 35-42 - Enrico Appiani, Giuseppe Buslacchi:

Computational Intelligence Solutions for Homeland Security. 43-52 - Alessandro Zanasi:

Virtual Weapons for Real Wars: Text Mining for National Security. 53-60 - Sergio Decherchi

, Paolo Gastaldo
, Judith Redi, Rodolfo Zunino:
Hypermetric k-Means Clustering for Content-Based Document Management. 61-68
Critical Infrastructure Protection
- Demetrios G. Eliades

, Marios M. Polycarpou
:
Security Issues in Drinking Water Distribution Networks. 69-76 - Antonio Lioy

, Gianluca Ramunno, Davide Vernizzi:
Trusted-Computing Technologies for the Protection of Critical Information Systems. 77-83 - Dennis K. Nilsson, Ulf Larson, Francesco Picasso, Erland Jonsson:

A First Simulation of Attacks in the Automotive Network Communications Protocol FlexRay. 84-91 - Francesco Flammini

, Andrea Gaglione
, Nicola Mazzocca
, Vincenzo Moscato
, Concetta Pragliola:
Wireless Sensor Data Fusion for Critical Infrastructure Security. 92-99 - Osvaldo Faggioni, Maurizio Soldani

, Amleto Gabellone, Paolo Maggiani, Davide Leoncini:
Development of Anti Intruders Underwater Systems: Time Domain Evaluation of the Self-informed Magnetic Networks Performance. 100-107 - Viviana Mascardi, Daniela Briola

, Maurizio Martelli, Riccardo Caccia, Carlo Milani:
Monitoring and Diagnosing Railway Signalling with Logic-Based Distributed Agents. 108-115 - Ermete Meda, Francesco Picasso, Andrea De Domenico, Paolo Mazzaron, Nadia Mazzino, Lorenzo Motta, Aldo Tamponi:

SeSaR: Security for Safety. 116-122
Network Security
- Soutaro Matsumoto, Adel Bouhoula

:
Automatic Verification of Firewall Configuration with Respect to Security Policy Requirements. 123-130 - Gianluca Maiolini, Lorenzo Cignini, Andrea Baiocchi:

Automated Framework for Policy Optimization in Firewalls and Security Gateways. 131-138 - Esteban J. Palomo

, Enrique Domínguez, Rafael Marcos Luque
, José Muñoz:
An Intrusion Detection System Based on Hierarchical Self-Organization. 139-146 - Zorana Bankovic, Slobodan Bojanic, Octavio Nieto-Taladriz:

Evaluating Sequential Combination of Two Genetic Algorithm-Based Solutions for Intrusion Detection. 147-154 - Álvaro Herrero

, Emilio Corchado:
Agents and Neural Networks for Intrusion Detection. 155-162 - Giuseppe Lieto, Fabio Orsini, Genoveffa Pagano:

Cluster Analysis for Anomaly Detection. 163-169 - Maurizio Aiello

, Davide Chiarella
, Gianluca Papaleo
:
Statistical Anomaly Detection on Real e-Mail Traffic. 170-177 - Andrea Baiocchi, Gianluca Maiolini, Giacomo Molina, Antonello Rizzi

:
On-the-fly Statistical Classification of Internet Traffic at Application Layer Based on Cluster Analysis. 178-185 - Nikolaos Chatzis, Radu Popescu-Zeletin:

Flow Level Data Mining of DNS Query Streams for Email Worm Detection. 186-194 - Bogdan Vrusias, Ian Golledge:

Adaptable Text Filters and Unsupervised Neural Classifiers for Spam Detection. 195-202 - Riyad Alshammari, Nur Zincir-Heywood

:
A Preliminary Performance Comparison of Two Feature Sets for Encrypted Traffic Classification. 203-210 - Nizar Ben Neji

, Adel Bouhoula
:
Dynamic Scheme for Packet Classification Using Splay Trees. 211-218 - Rahul Gupta, Suneeta Agarwal:

A Novel Algorithm for Freeing Network from Points of Failure. 219-226
Biometry
- Stelvio Cimato

, Marco Gamassi, Vincenzo Piuri, Roberto Sassi
, Fabio Scotti
:
A Multi-biometric Verification System for the Privacy Protection of Iris Templates. 227-234 - Dzati Athiar Ramli, Salina Abdul Samad

, Aini Hussain:
Score Information Decision Fusion Using Support Vector Machine for a Correlation Filter Based Speaker Authentication System. 235-242 - Messaoud Bengherabi

, Lamia Mezai, Farid Harizi, Abderrazak Guessoum, Mohamed Cheriet:
Application of 2DPCA Based Techniques in DCT Domain for Face Recognition. 243-250 - Manish Verma, Suneeta Agarwal:

Fingerprint Based Male-Female Classification. 251-257 - Petro M. Gopych:

BSDT Multi-valued Coding in Discrete Spaces. 258-265 - Thi Hoi Le, The Duy Bui:

A Fast and Distortion Tolerant Hashing for Fingerprint Image Authentication. 266-273 - Anatoly Sachenko

, Arkadiusz Banasik
, Adrian Kapczynski
:
The Concept of Application of Fuzzy Logic in Biometric Authentication Systems. 274-279
Information Protection
- Fabio Antonio Bovino:

Bidirectional Secret Communication by Quantum Collisions. 280-285 - Paraskevi K. Tzouveli

, Klimis S. Ntalianis, Stefanos D. Kollias
:
Semantic Region Protection Using Hu Moments and a Chaotic Pseudo-random Number Generator. 286-293 - Tao Cai, Shiguang Ju, Wei Zhong, DeJiao Niu:

Random r-Continuous Matching Rule for Immune-Based Secure Storage System. 294-300
Industrial Perspectives
- Francesco Pedersoli, Massimiliano Cristiano:

nokLINK: A New Solution for Enterprise Security. 301-308 - Bruno Giacometti:

SLA and LAC: New Solutions for Security Monitoring in the Enterprise. 309-315

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














