Ebook: Proceedings of the International Workshop on Computational Intelligence in Security for Information Systems CISIS’08
- Tags: Appl.Mathematics/Computational Methods of Engineering, Artificial Intelligence (incl. Robotics)
- Series: Advances in Soft Computing 53
- Year: 2009
- Publisher: Springer-Verlag Berlin Heidelberg
- Edition: 1
- Language: English
- pdf
The International Workshop on Computational Intelligence for Security in Information Systems (CISIS) proposes a meeting ground to the various communities involved in building intelligent systems for security, namely: information security, data mining, adaptive learning methods and soft computing among others. The main goal is to allow experts and researchers to assess the benefits of learning methods in the data-mining area for information-security applications. The Workshop offers the opportunity to interact with the leading industries actively involved in the critical area of security, and have a picture of the current solutions adopted in practical domains.
This volume of Advances in Soft Computing contains accepted papers presented at CISIS’08, which was held in Genova, Italy, on October 23rd-24th, 2008. The selection process to set up the Workshop program yielded a collection of about 40 papers. This allowed the Scientific Committee to verify the vital and crucial nature of the topics involved in the event, and resulted in an acceptance rate of about 60% of the originally submitted manuscripts.
The International Workshop on Computational Intelligence for Security in Information Systems (CISIS) proposes a meeting ground to the various communities involved in building intelligent systems for security, namely: information security, data mining, adaptive learning methods and soft computing among others. The main goal is to allow experts and researchers to assess the benefits of learning methods in the data-mining area for information-security applications. The Workshop offers the opportunity to interact with the leading industries actively involved in the critical area of security, and have a picture of the current solutions adopted in practical domains.
This volume of Advances in Soft Computing contains accepted papers presented at CISIS’08, which was held in Genova, Italy, on October 23rd-24th, 2008. The selection process to set up the Workshop program yielded a collection of about 40 papers. This allowed the Scientific Committee to verify the vital and crucial nature of the topics involved in the event, and resulted in an acceptance rate of about 60% of the originally submitted manuscripts.
The International Workshop on Computational Intelligence for Security in Information Systems (CISIS) proposes a meeting ground to the various communities involved in building intelligent systems for security, namely: information security, data mining, adaptive learning methods and soft computing among others. The main goal is to allow experts and researchers to assess the benefits of learning methods in the data-mining area for information-security applications. The Workshop offers the opportunity to interact with the leading industries actively involved in the critical area of security, and have a picture of the current solutions adopted in practical domains.
This volume of Advances in Soft Computing contains accepted papers presented at CISIS’08, which was held in Genova, Italy, on October 23rd-24th, 2008. The selection process to set up the Workshop program yielded a collection of about 40 papers. This allowed the Scientific Committee to verify the vital and crucial nature of the topics involved in the event, and resulted in an acceptance rate of about 60% of the originally submitted manuscripts.
Content:
Front Matter....Pages -
An Artificial Neural Network for Bank Robbery Risk Management: The OS.SI.F Web On-Line Tool of the ABI Anti-crime Department....Pages 1-10
Secure Judicial Communication Exchange Using Soft-computing Methods and Biometric Authentication....Pages 11-18
Identity Resolution in Criminal Justice Data: An Application of NORA....Pages 19-26
PTK: An Alternative Advanced Interface for the Sleuth Kit....Pages 27-34
Stalker, a Multilingual Text Mining Search Engine for Open Source Intelligence....Pages 35-42
Computational Intelligence Solutions for Homeland Security....Pages 43-52
Virtual Weapons for Real Wars: Text Mining for National Security....Pages 53-60
Hypermetric k-Means Clustering for Content-Based Document Management....Pages 61-68
Security Issues in Drinking Water Distribution Networks....Pages 69-76
Trusted-Computing Technologies for the Protection of Critical Information Systems....Pages 77-83
A First Simulation of Attacks in the Automotive Network Communications Protocol FlexRay....Pages 84-91
Wireless Sensor Data Fusion for Critical Infrastructure Security....Pages 92-99
Development of Anti Intruders Underwater Systems: Time Domain Evaluation of the Self-informed Magnetic Networks Performance....Pages 100-107
Monitoring and Diagnosing Railway Signalling with Logic-Based Distributed Agents....Pages 108-115
SeSaR: Security for Safety....Pages 116-122
Automatic Verification of Firewall Configuration with Respect to Security Policy Requirements....Pages 123-130
Automated Framework for Policy Optimization in Firewalls and Security Gateways....Pages 131-138
An Intrusion Detection System Based on Hierarchical Self-Organization....Pages 139-146
Evaluating Sequential Combination of Two Genetic Algorithm-Based Solutions for Intrusion Detection....Pages 147-154
Agents and Neural Networks for Intrusion Detection....Pages 155-162
Cluster Analysis for Anomaly Detection....Pages 163-169
Statistical Anomaly Detection on Real e-Mail Traffic....Pages 170-177
On-the-fly Statistical Classification of Internet Traffic at Application Layer Based on Cluster Analysis....Pages 178-185
Flow Level Data Mining of DNS Query Streams for Email Worm Detection....Pages 186-194
Adaptable Text Filters and Unsupervised Neural Classifiers for Spam Detection....Pages 195-202
A Preliminary Performance Comparison of Two Feature Sets for Encrypted Traffic Classification....Pages 203-210
Dynamic Scheme for Packet Classification Using Splay Trees....Pages 211-218
A Novel Algorithm for Freeing Network from Points of Failure....Pages 219-226
A Multi-biometric Verification System for the Privacy Protection of Iris Templates....Pages 227-234
Score Information Decision Fusion Using Support Vector Machine for a Correlation Filter Based Speaker Authentication System....Pages 235-242
Application of 2DPCA Based Techniques in DCT Domain for Face Recognition....Pages 243-250
Fingerprint Based Male-Female Classification....Pages 251-257
BSDT Multi-valued Coding in Discrete Spaces....Pages 258-265
A Fast and Distortion Tolerant Hashing for Fingerprint Image Authentication....Pages 266-273
The Concept of Application of Fuzzy Logic in Biometric Authentication Systems....Pages 274-279
Bidirectional Secret Communication by Quantum Collisions....Pages 280-285
Semantic Region Protection Using Hu Moments and a Chaotic Pseudo-random Number Generator....Pages 286-293
Random r-Continuous Matching Rule for Immune-Based Secure Storage System....Pages 294-300
nokLINK: A New Solution for Enterprise Security....Pages 301-308
SLA and LAC: New Solutions for Security Monitoring in the Enterprise....Pages 309-315
Back Matter....Pages -
The International Workshop on Computational Intelligence for Security in Information Systems (CISIS) proposes a meeting ground to the various communities involved in building intelligent systems for security, namely: information security, data mining, adaptive learning methods and soft computing among others. The main goal is to allow experts and researchers to assess the benefits of learning methods in the data-mining area for information-security applications. The Workshop offers the opportunity to interact with the leading industries actively involved in the critical area of security, and have a picture of the current solutions adopted in practical domains.
This volume of Advances in Soft Computing contains accepted papers presented at CISIS’08, which was held in Genova, Italy, on October 23rd-24th, 2008. The selection process to set up the Workshop program yielded a collection of about 40 papers. This allowed the Scientific Committee to verify the vital and crucial nature of the topics involved in the event, and resulted in an acceptance rate of about 60% of the originally submitted manuscripts.
Content:
Front Matter....Pages -
An Artificial Neural Network for Bank Robbery Risk Management: The OS.SI.F Web On-Line Tool of the ABI Anti-crime Department....Pages 1-10
Secure Judicial Communication Exchange Using Soft-computing Methods and Biometric Authentication....Pages 11-18
Identity Resolution in Criminal Justice Data: An Application of NORA....Pages 19-26
PTK: An Alternative Advanced Interface for the Sleuth Kit....Pages 27-34
Stalker, a Multilingual Text Mining Search Engine for Open Source Intelligence....Pages 35-42
Computational Intelligence Solutions for Homeland Security....Pages 43-52
Virtual Weapons for Real Wars: Text Mining for National Security....Pages 53-60
Hypermetric k-Means Clustering for Content-Based Document Management....Pages 61-68
Security Issues in Drinking Water Distribution Networks....Pages 69-76
Trusted-Computing Technologies for the Protection of Critical Information Systems....Pages 77-83
A First Simulation of Attacks in the Automotive Network Communications Protocol FlexRay....Pages 84-91
Wireless Sensor Data Fusion for Critical Infrastructure Security....Pages 92-99
Development of Anti Intruders Underwater Systems: Time Domain Evaluation of the Self-informed Magnetic Networks Performance....Pages 100-107
Monitoring and Diagnosing Railway Signalling with Logic-Based Distributed Agents....Pages 108-115
SeSaR: Security for Safety....Pages 116-122
Automatic Verification of Firewall Configuration with Respect to Security Policy Requirements....Pages 123-130
Automated Framework for Policy Optimization in Firewalls and Security Gateways....Pages 131-138
An Intrusion Detection System Based on Hierarchical Self-Organization....Pages 139-146
Evaluating Sequential Combination of Two Genetic Algorithm-Based Solutions for Intrusion Detection....Pages 147-154
Agents and Neural Networks for Intrusion Detection....Pages 155-162
Cluster Analysis for Anomaly Detection....Pages 163-169
Statistical Anomaly Detection on Real e-Mail Traffic....Pages 170-177
On-the-fly Statistical Classification of Internet Traffic at Application Layer Based on Cluster Analysis....Pages 178-185
Flow Level Data Mining of DNS Query Streams for Email Worm Detection....Pages 186-194
Adaptable Text Filters and Unsupervised Neural Classifiers for Spam Detection....Pages 195-202
A Preliminary Performance Comparison of Two Feature Sets for Encrypted Traffic Classification....Pages 203-210
Dynamic Scheme for Packet Classification Using Splay Trees....Pages 211-218
A Novel Algorithm for Freeing Network from Points of Failure....Pages 219-226
A Multi-biometric Verification System for the Privacy Protection of Iris Templates....Pages 227-234
Score Information Decision Fusion Using Support Vector Machine for a Correlation Filter Based Speaker Authentication System....Pages 235-242
Application of 2DPCA Based Techniques in DCT Domain for Face Recognition....Pages 243-250
Fingerprint Based Male-Female Classification....Pages 251-257
BSDT Multi-valued Coding in Discrete Spaces....Pages 258-265
A Fast and Distortion Tolerant Hashing for Fingerprint Image Authentication....Pages 266-273
The Concept of Application of Fuzzy Logic in Biometric Authentication Systems....Pages 274-279
Bidirectional Secret Communication by Quantum Collisions....Pages 280-285
Semantic Region Protection Using Hu Moments and a Chaotic Pseudo-random Number Generator....Pages 286-293
Random r-Continuous Matching Rule for Immune-Based Secure Storage System....Pages 294-300
nokLINK: A New Solution for Enterprise Security....Pages 301-308
SLA and LAC: New Solutions for Security Monitoring in the Enterprise....Pages 309-315
Back Matter....Pages -
....