Springer
CD ContentsAuthor IndexSearch

Author Index

A B C D E F G H I J K L M N O P Q R S T U V W X Y Z

 


 

 
 A 

 
Agarwal, Suneeta
 

A Novel Algorithm for Freeing Network from Points of Failure
R. Gupta and S. Agarwal
ASC 53, p. 219 ff.
Abstract | Full article in PDF | BibTeX

Fingerprint Based Male-Female Classification
M. Verma and S. Agarwal
ASC 53, p. 251 ff.
Abstract | Full article in PDF | BibTeX

 
Aiello, Maurizio
 

Statistical Anomaly Detection on Real e-Mail Traffic
M. Aiello, D. Chiarella, and G. Papaleo
ASC 53, p. 170 ff.
Abstract | Full article in PDF | BibTeX

 
Alshammari, Riyad
 

A Preliminary Performance Comparison of Two Feature Sets for Encrypted Traffic Classification
R. Alshammari and A.N. Zincir-Heywood
ASC 53, p. 203 ff.
Abstract | Full article in PDF | BibTeX

 
Appiani, Enrico
 

Computational Intelligence Solutions for Homeland Security
E. Appiani and G. Buslacchi
ASC 53, p. 43 ff.
Abstract | Full article in PDF | BibTeX

 
 B 

 
Baiocchi, Andrea
 

Automated Framework for Policy Optimization in Firewalls and Security Gateways
G. Maiolini, L. Cignini, and A. Baiocchi
ASC 53, p. 131 ff.
Abstract | Full article in PDF | BibTeX

On-the-fly Statistical Classification of Internet Traffic at Application Layer Based on Cluster Analysis
A. Baiocchi, G. Maiolini, G. Molina, and A. Rizzi
ASC 53, p. 178 ff.
Abstract | Full article in PDF | BibTeX

 
Banasik, Arkadiusz
 

The Concept of Application of Fuzzy Logic in Biometric Authentication Systems
A. Sachenko, A. Banasik, and A. Kapczy\'{n}ski
ASC 53, p. 274 ff.
Abstract | Full article in PDF | BibTeX

 
Bankovi\'{c}, Zorana
 

Evaluating Sequential Combination of Two Genetic Algorithm-Based Solutions for Intrusion Detection
Z. Bankovi\'{c}, S. Bojani\'{c}, and O. Nieto-Taladriz
ASC 53, p. 147 ff.
Abstract | Full article in PDF | BibTeX

 
Bengherabi, Messaoud
 

Application of 2DPCA Based Techniques in DCT Domain for Face Recognition
M. Bengherabi, L. Mezai, F. Harizi, A. Guessoum, and M. Cheriet
ASC 53, p. 243 ff.
Abstract | Full article in PDF | BibTeX

 
Ben-Neji, Nizar
 

Dynamic Scheme for Packet Classification Using Splay Trees
N. Ben-Neji and A. Bouhoula
ASC 53, p. 211 ff.
Abstract | Full article in PDF | BibTeX

 
Bojani\'{c}, Slobodan
 

Evaluating Sequential Combination of Two Genetic Algorithm-Based Solutions for Intrusion Detection
Z. Bankovi\'{c}, S. Bojani\'{c}, and O. Nieto-Taladriz
ASC 53, p. 147 ff.
Abstract | Full article in PDF | BibTeX

 
Booker, Queen E.
 

Identity Resolution in Criminal Justice Data: An Application of NORA
Q.E. Booker
ASC 53, p. 19 ff.
Abstract | Full article in PDF | BibTeX

 
Bouhoula, Adel
 

Automatic Verification of Firewall Configuration with Respect to Security Policy Requirements
S. Matsumoto and A. Bouhoula
ASC 53, p. 123 ff.
Abstract | Full article in PDF | BibTeX

Dynamic Scheme for Packet Classification Using Splay Trees
N. Ben-Neji and A. Bouhoula
ASC 53, p. 211 ff.
Abstract | Full article in PDF | BibTeX

 
Bovino, Fabio Antonio
 

Bidirectional Secret Communication by Quantum Collisions
F.A. Bovino
ASC 53, p. 280 ff.
Abstract | Full article in PDF | BibTeX

 
Briola, Daniela
 

Monitoring and Diagnosing Railway Signalling with Logic-Based Distributed Agents
V. Mascardi, D. Briola, M. Martelli, R. Caccia, and C. Milani
ASC 53, p. 108 ff.
Abstract | Full article in PDF | BibTeX

 
Bui, The Duy
 

A Fast and Distortion Tolerant Hashing for Fingerprint Image Authentication
T.H. Le and T.D. Bui
ASC 53, p. 266 ff.
Abstract | Full article in PDF | BibTeX

 
Buslacchi, Giuseppe
 

Computational Intelligence Solutions for Homeland Security
E. Appiani and G. Buslacchi
ASC 53, p. 43 ff.
Abstract | Full article in PDF | BibTeX

 
 C 

 
Caccia, Riccardo
 

Monitoring and Diagnosing Railway Signalling with Logic-Based Distributed Agents
V. Mascardi, D. Briola, M. Martelli, R. Caccia, and C. Milani
ASC 53, p. 108 ff.
Abstract | Full article in PDF | BibTeX

 
Cavallini, Angelo
 

PTK: An Alternative Advanced Interface for the Sleuth Kit
D.V. Forte, A. Cavallini, C. Maruti, L. Losio, T. Orlandi, and M. Zambelli
ASC 53, p. 27 ff.
Abstract | Full article in PDF | BibTeX

 
Chatzis, Nikolaos
 

Flow Level Data Mining of DNS Query Streams for Email Worm Detection
N. Chatzis and R. Popescu-Zeletin
ASC 53, p. 186 ff.
Abstract | Full article in PDF | BibTeX

 
Cheriet, Mohamed
 

Application of 2DPCA Based Techniques in DCT Domain for Face Recognition
M. Bengherabi, L. Mezai, F. Harizi, A. Guessoum, and M. Cheriet
ASC 53, p. 243 ff.
Abstract | Full article in PDF | BibTeX

 
Chiarella, Davide
 

Statistical Anomaly Detection on Real e-Mail Traffic
M. Aiello, D. Chiarella, and G. Papaleo
ASC 53, p. 170 ff.
Abstract | Full article in PDF | BibTeX

 
Cignini, Lorenzo
 

Automated Framework for Policy Optimization in Firewalls and Security Gateways
G. Maiolini, L. Cignini, and A. Baiocchi
ASC 53, p. 131 ff.
Abstract | Full article in PDF | BibTeX

 
Cimato, S.
 

A Multi-biometric Verification System for the Privacy Protection of Iris Templates
S. Cimato, M. Gamassi, V. Piuri, R. Sassi, and F. Scotti
ASC 53, p. 227 ff.
Abstract | Full article in PDF | BibTeX

 
Cislaghi, Mauro
 

Secure Judicial Communication Exchange Using Soft-computing Methods and Biometric Authentication
M. Cislaghi, G. Eleftherakis, R. Mazzilli, F. Mohier, S. Ferri, V. Giuffrida, and E. Negroni
ASC 53, p. 11 ff.
Abstract | Full article in PDF | BibTeX

 
Corchado, Emilio
 

Agents and Neural Networks for Intrusion Detection
Á. Herrero and E. Corchado
ASC 53, p. 155 ff.
Abstract | Full article in PDF | BibTeX

 
Cristiano, Massimiliano
 

nokLINK: A New Solution for Enterprise Security
F. Pedersoli and M. Cristiano
ASC 53, p. 301 ff.
Abstract | Full article in PDF | BibTeX

 
 D 

 
Decherchi, Sergio
 

Hypermetric k-Means Clustering for Content-Based Document Management
S. Decherchi, P. Gastaldo, J. Redi, and R. Zunino
ASC 53, p. 61 ff.
Abstract | Full article in PDF | BibTeX

 
De Domenico, Andrea
 

SeSaR: Security for Safety
E. Meda, F. Picasso, A. De Domenico, P. Mazzaron, N. Mazzino, L. Motta, and A. Tamponi
ASC 53, p. 116 ff.
Abstract | Full article in PDF | BibTeX

 
DeJiao, Niu
 

Random r-Continuous Matching Rule for Immune-Based Secure Storage System
C. Tao, J. ShiGuang, Z. Wei, and N. DeJiao
ASC 53, p. 294 ff.
Abstract | Full article in PDF | BibTeX

 
Domínguez, E.
 

An Intrusion Detection System Based on Hierarchical Self-Organization
E.J. Palomo, E. Domínguez, R.M. Luque, and J. Muñoz
ASC 53, p. 139 ff.
Abstract | Full article in PDF | BibTeX

 
 E 

 
Eleftherakis, George
 

Secure Judicial Communication Exchange Using Soft-computing Methods and Biometric Authentication
M. Cislaghi, G. Eleftherakis, R. Mazzilli, F. Mohier, S. Ferri, V. Giuffrida, and E. Negroni
ASC 53, p. 11 ff.
Abstract | Full article in PDF | BibTeX

 
Eliades, Demetrios G.
 

Security Issues in Drinking Water Distribution Networks
D.G. Eliades and M.M. Polycarpou
ASC 53, p. 69 ff.
Abstract | Full article in PDF | BibTeX

 
 F 

 
Faggioni, Osvaldo
 

Development of Anti Intruders Underwater Systems: Time Domain Evaluation of the Self-informed Magnetic Networks Performance
O. Faggioni, M. Soldani, A. Gabellone, P. Maggiani, and D. Leoncini
ASC 53, p. 100 ff.
Abstract | Full article in PDF | BibTeX

 
Ferri, Sara
 

Secure Judicial Communication Exchange Using Soft-computing Methods and Biometric Authentication
M. Cislaghi, G. Eleftherakis, R. Mazzilli, F. Mohier, S. Ferri, V. Giuffrida, and E. Negroni
ASC 53, p. 11 ff.
Abstract | Full article in PDF | BibTeX

 
Flammini, Francesco
 

Wireless Sensor Data Fusion for Critical Infrastructure Security
F. Flammini, A. Gaglione, N. Mazzocca, V. Moscato, and C. Pragliola
ASC 53, p. 92 ff.
Abstract | Full article in PDF | BibTeX

 
Forte, Dario V.
 

PTK: An Alternative Advanced Interface for the Sleuth Kit
D.V. Forte, A. Cavallini, C. Maruti, L. Losio, T. Orlandi, and M. Zambelli
ASC 53, p. 27 ff.
Abstract | Full article in PDF | BibTeX

 
 G 

 
Gabellone, Amleto
 

Development of Anti Intruders Underwater Systems: Time Domain Evaluation of the Self-informed Magnetic Networks Performance
O. Faggioni, M. Soldani, A. Gabellone, P. Maggiani, and D. Leoncini
ASC 53, p. 100 ff.
Abstract | Full article in PDF | BibTeX

 
Gaglione, Andrea
 

Wireless Sensor Data Fusion for Critical Infrastructure Security
F. Flammini, A. Gaglione, N. Mazzocca, V. Moscato, and C. Pragliola
ASC 53, p. 92 ff.
Abstract | Full article in PDF | BibTeX

 
Gamassi, M.
 

A Multi-biometric Verification System for the Privacy Protection of Iris Templates
S. Cimato, M. Gamassi, V. Piuri, R. Sassi, and F. Scotti
ASC 53, p. 227 ff.
Abstract | Full article in PDF | BibTeX

 
Gastaldo, Paolo
 

Hypermetric k-Means Clustering for Content-Based Document Management
S. Decherchi, P. Gastaldo, J. Redi, and R. Zunino
ASC 53, p. 61 ff.
Abstract | Full article in PDF | BibTeX

 
Giacometti, Bruno
 

SLA and LAC: New Solutions for Security Monitoring in the Enterprise
B. Giacometti
ASC 53, p. 309 ff.
Abstract | Full article in PDF | BibTeX

 
Giuffrida, Valerio
 

Secure Judicial Communication Exchange Using Soft-computing Methods and Biometric Authentication
M. Cislaghi, G. Eleftherakis, R. Mazzilli, F. Mohier, S. Ferri, V. Giuffrida, and E. Negroni
ASC 53, p. 11 ff.
Abstract | Full article in PDF | BibTeX

 
Golledge, Ian
 

Adaptable Text Filters and Unsupervised Neural Classifiers for Spam Detection
B. Vrusias and I. Golledge
ASC 53, p. 195 ff.
Abstract | Full article in PDF | BibTeX

 
Gopych, Petro
 

BSDT Multi-valued Coding in Discrete Spaces
P. Gopych
ASC 53, p. 258 ff.
Abstract | Full article in PDF | BibTeX

 
Guazzoni, Carlo
 

An Artificial Neural Network for Bank Robbery Risk Management: The OS.SI.F Web On-Line Tool of the ABI Anti-crime Department
C. Guazzoni and G.B. Ronsivalle
ASC 53, p. 1 ff.
Abstract | Full article in PDF | BibTeX

 
Guessoum, Abderrazak
 

Application of 2DPCA Based Techniques in DCT Domain for Face Recognition
M. Bengherabi, L. Mezai, F. Harizi, A. Guessoum, and M. Cheriet
ASC 53, p. 243 ff.
Abstract | Full article in PDF | BibTeX

 
Gupta, Rahul
 

A Novel Algorithm for Freeing Network from Points of Failure
R. Gupta and S. Agarwal
ASC 53, p. 219 ff.
Abstract | Full article in PDF | BibTeX

 
 H 

 
Harizi, Farid
 

Application of 2DPCA Based Techniques in DCT Domain for Face Recognition
M. Bengherabi, L. Mezai, F. Harizi, A. Guessoum, and M. Cheriet
ASC 53, p. 243 ff.
Abstract | Full article in PDF | BibTeX

 
Herrero, Álvaro
 

Agents and Neural Networks for Intrusion Detection
Á. Herrero and E. Corchado
ASC 53, p. 155 ff.
Abstract | Full article in PDF | BibTeX

 
Hussain, Aini
 

Score Information Decision Fusion Using Support Vector Machine for a Correlation Filter Based Speaker Authentication System
D.A. Ramli, S.A. Samad, and A. Hussain
ASC 53, p. 235 ff.
Abstract | Full article in PDF | BibTeX

 
 J 

 
Jonsson, Erland
 

A First Simulation of Attacks in the Automotive Network Communications Protocol FlexRay
D.K. Nilsson, U.E. Larson, F. Picasso, and E. Jonsson
ASC 53, p. 84 ff.
Abstract | Full article in PDF | BibTeX

 
 K 

 
Kapczy\'{n}ski, Adrian
 

The Concept of Application of Fuzzy Logic in Biometric Authentication Systems
A. Sachenko, A. Banasik, and A. Kapczy\'{n}ski
ASC 53, p. 274 ff.
Abstract | Full article in PDF | BibTeX

 
Kollias, Stefanos
 

Semantic Region Protection Using Hu Moments and a Chaotic Pseudo-random Number Generator
P. Tzouveli, K. Ntalianis, and S. Kollias
ASC 53, p. 286 ff.
Abstract | Full article in PDF | BibTeX

 
 L 

 
Larson, Ulf E.
 

A First Simulation of Attacks in the Automotive Network Communications Protocol FlexRay
D.K. Nilsson, U.E. Larson, F. Picasso, and E. Jonsson
ASC 53, p. 84 ff.
Abstract | Full article in PDF | BibTeX

 
Le, Thi Hoi
 

A Fast and Distortion Tolerant Hashing for Fingerprint Image Authentication
T.H. Le and T.D. Bui
ASC 53, p. 266 ff.
Abstract | Full article in PDF | BibTeX

 
Leoncini, Davide
 

Development of Anti Intruders Underwater Systems: Time Domain Evaluation of the Self-informed Magnetic Networks Performance
O. Faggioni, M. Soldani, A. Gabellone, P. Maggiani, and D. Leoncini
ASC 53, p. 100 ff.
Abstract | Full article in PDF | BibTeX

 
Lieto, Giuseppe
 

Cluster Analysis for Anomaly Detection
G. Lieto, F. Orsini, and G. Pagano
ASC 53, p. 163 ff.
Abstract | Full article in PDF | BibTeX

 
Lioy, Antonio
 

Trusted-Computing Technologies for the Protection of Critical Information Systems
A. Lioy, G. Ramunno, and D. Vernizzi
ASC 53, p. 77 ff.
Abstract | Full article in PDF | BibTeX

 
Losio, Luca
 

PTK: An Alternative Advanced Interface for the Sleuth Kit
D.V. Forte, A. Cavallini, C. Maruti, L. Losio, T. Orlandi, and M. Zambelli
ASC 53, p. 27 ff.
Abstract | Full article in PDF | BibTeX

 
Luque, R.M.
 

An Intrusion Detection System Based on Hierarchical Self-Organization
E.J. Palomo, E. Domínguez, R.M. Luque, and J. Muñoz
ASC 53, p. 139 ff.
Abstract | Full article in PDF | BibTeX

 
 M 

 
Maggiani, Paolo
 

Development of Anti Intruders Underwater Systems: Time Domain Evaluation of the Self-informed Magnetic Networks Performance
O. Faggioni, M. Soldani, A. Gabellone, P. Maggiani, and D. Leoncini
ASC 53, p. 100 ff.
Abstract | Full article in PDF | BibTeX

 
Maiolini, Gianluca
 

Automated Framework for Policy Optimization in Firewalls and Security Gateways
G. Maiolini, L. Cignini, and A. Baiocchi
ASC 53, p. 131 ff.
Abstract | Full article in PDF | BibTeX

On-the-fly Statistical Classification of Internet Traffic at Application Layer Based on Cluster Analysis
A. Baiocchi, G. Maiolini, G. Molina, and A. Rizzi
ASC 53, p. 178 ff.
Abstract | Full article in PDF | BibTeX

 
Martelli, Maurizio
 

Monitoring and Diagnosing Railway Signalling with Logic-Based Distributed Agents
V. Mascardi, D. Briola, M. Martelli, R. Caccia, and C. Milani
ASC 53, p. 108 ff.
Abstract | Full article in PDF | BibTeX

 
Maruti, Cristiano
 

PTK: An Alternative Advanced Interface for the Sleuth Kit
D.V. Forte, A. Cavallini, C. Maruti, L. Losio, T. Orlandi, and M. Zambelli
ASC 53, p. 27 ff.
Abstract | Full article in PDF | BibTeX

 
Mascardi, Viviana
 

Monitoring and Diagnosing Railway Signalling with Logic-Based Distributed Agents
V. Mascardi, D. Briola, M. Martelli, R. Caccia, and C. Milani
ASC 53, p. 108 ff.
Abstract | Full article in PDF | BibTeX

 
Matsumoto, Soutaro
 

Automatic Verification of Firewall Configuration with Respect to Security Policy Requirements
S. Matsumoto and A. Bouhoula
ASC 53, p. 123 ff.
Abstract | Full article in PDF | BibTeX

 
Mazzaron, Paolo
 

SeSaR: Security for Safety
E. Meda, F. Picasso, A. De Domenico, P. Mazzaron, N. Mazzino, L. Motta, and A. Tamponi
ASC 53, p. 116 ff.
Abstract | Full article in PDF | BibTeX

 
Mazzilli, Roberto
 

Secure Judicial Communication Exchange Using Soft-computing Methods and Biometric Authentication
M. Cislaghi, G. Eleftherakis, R. Mazzilli, F. Mohier, S. Ferri, V. Giuffrida, and E. Negroni
ASC 53, p. 11 ff.
Abstract | Full article in PDF | BibTeX

 
Mazzino, Nadia
 

SeSaR: Security for Safety
E. Meda, F. Picasso, A. De Domenico, P. Mazzaron, N. Mazzino, L. Motta, and A. Tamponi
ASC 53, p. 116 ff.
Abstract | Full article in PDF | BibTeX

 
Mazzocca, Nicola
 

Wireless Sensor Data Fusion for Critical Infrastructure Security
F. Flammini, A. Gaglione, N. Mazzocca, V. Moscato, and C. Pragliola
ASC 53, p. 92 ff.
Abstract | Full article in PDF | BibTeX

 
Meda, Ermete
 

SeSaR: Security for Safety
E. Meda, F. Picasso, A. De Domenico, P. Mazzaron, N. Mazzino, L. Motta, and A. Tamponi
ASC 53, p. 116 ff.
Abstract | Full article in PDF | BibTeX

 
Mezai, Lamia
 

Application of 2DPCA Based Techniques in DCT Domain for Face Recognition
M. Bengherabi, L. Mezai, F. Harizi, A. Guessoum, and M. Cheriet
ASC 53, p. 243 ff.
Abstract | Full article in PDF | BibTeX

 
Milani, Carlo
 

Monitoring and Diagnosing Railway Signalling with Logic-Based Distributed Agents
V. Mascardi, D. Briola, M. Martelli, R. Caccia, and C. Milani
ASC 53, p. 108 ff.
Abstract | Full article in PDF | BibTeX

 
Mohier, Francois
 

Secure Judicial Communication Exchange Using Soft-computing Methods and Biometric Authentication
M. Cislaghi, G. Eleftherakis, R. Mazzilli, F. Mohier, S. Ferri, V. Giuffrida, and E. Negroni
ASC 53, p. 11 ff.
Abstract | Full article in PDF | BibTeX

 
Molina, Giacomo
 

On-the-fly Statistical Classification of Internet Traffic at Application Layer Based on Cluster Analysis
A. Baiocchi, G. Maiolini, G. Molina, and A. Rizzi
ASC 53, p. 178 ff.
Abstract | Full article in PDF | BibTeX

 
Moscato, Vincenzo
 

Wireless Sensor Data Fusion for Critical Infrastructure Security
F. Flammini, A. Gaglione, N. Mazzocca, V. Moscato, and C. Pragliola
ASC 53, p. 92 ff.
Abstract | Full article in PDF | BibTeX

 
Motta, Lorenzo
 

SeSaR: Security for Safety
E. Meda, F. Picasso, A. De Domenico, P. Mazzaron, N. Mazzino, L. Motta, and A. Tamponi
ASC 53, p. 116 ff.
Abstract | Full article in PDF | BibTeX

 
Muñoz, J.
 

An Intrusion Detection System Based on Hierarchical Self-Organization
E.J. Palomo, E. Domínguez, R.M. Luque, and J. Muñoz
ASC 53, p. 139 ff.
Abstract | Full article in PDF | BibTeX

 
 N 

 
Negroni, Elisa
 

Secure Judicial Communication Exchange Using Soft-computing Methods and Biometric Authentication
M. Cislaghi, G. Eleftherakis, R. Mazzilli, F. Mohier, S. Ferri, V. Giuffrida, and E. Negroni
ASC 53, p. 11 ff.
Abstract | Full article in PDF | BibTeX

 
Neri, F.
 

Stalker, a Multilingual Text Mining Search Engine for Open Source Intelligence
F. Neri and M. Pettoni
ASC 53, p. 35 ff.
Abstract | Full article in PDF | BibTeX

 
Nieto-Taladriz, Octavio
 

Evaluating Sequential Combination of Two Genetic Algorithm-Based Solutions for Intrusion Detection
Z. Bankovi\'{c}, S. Bojani\'{c}, and O. Nieto-Taladriz
ASC 53, p. 147 ff.
Abstract | Full article in PDF | BibTeX

 
Nilsson, Dennis K.
 

A First Simulation of Attacks in the Automotive Network Communications Protocol FlexRay
D.K. Nilsson, U.E. Larson, F. Picasso, and E. Jonsson
ASC 53, p. 84 ff.
Abstract | Full article in PDF | BibTeX

 
Ntalianis, Klimis
 

Semantic Region Protection Using Hu Moments and a Chaotic Pseudo-random Number Generator
P. Tzouveli, K. Ntalianis, and S. Kollias
ASC 53, p. 286 ff.
Abstract | Full article in PDF | BibTeX

 
 O 

 
Orlandi, Thomas
 

PTK: An Alternative Advanced Interface for the Sleuth Kit
D.V. Forte, A. Cavallini, C. Maruti, L. Losio, T. Orlandi, and M. Zambelli
ASC 53, p. 27 ff.
Abstract | Full article in PDF | BibTeX

 
Orsini, Fabio
 

Cluster Analysis for Anomaly Detection
G. Lieto, F. Orsini, and G. Pagano
ASC 53, p. 163 ff.
Abstract | Full article in PDF | BibTeX

 
 P 

 
Pagano, Genoveffa
 

Cluster Analysis for Anomaly Detection
G. Lieto, F. Orsini, and G. Pagano
ASC 53, p. 163 ff.
Abstract | Full article in PDF | BibTeX

 
Palomo, E.J.
 

An Intrusion Detection System Based on Hierarchical Self-Organization
E.J. Palomo, E. Domínguez, R.M. Luque, and J. Muñoz
ASC 53, p. 139 ff.
Abstract | Full article in PDF | BibTeX

 
Papaleo, Gianluca
 

Statistical Anomaly Detection on Real e-Mail Traffic
M. Aiello, D. Chiarella, and G. Papaleo
ASC 53, p. 170 ff.
Abstract | Full article in PDF | BibTeX

 
Pedersoli, Francesco
 

nokLINK: A New Solution for Enterprise Security
F. Pedersoli and M. Cristiano
ASC 53, p. 301 ff.
Abstract | Full article in PDF | BibTeX

 
Pettoni, M.
 

Stalker, a Multilingual Text Mining Search Engine for Open Source Intelligence
F. Neri and M. Pettoni
ASC 53, p. 35 ff.
Abstract | Full article in PDF | BibTeX

 
Picasso, Francesco
 

A First Simulation of Attacks in the Automotive Network Communications Protocol FlexRay
D.K. Nilsson, U.E. Larson, F. Picasso, and E. Jonsson
ASC 53, p. 84 ff.
Abstract | Full article in PDF | BibTeX

SeSaR: Security for Safety
E. Meda, F. Picasso, A. De Domenico, P. Mazzaron, N. Mazzino, L. Motta, and A. Tamponi
ASC 53, p. 116 ff.
Abstract | Full article in PDF | BibTeX

 
Piuri, V.
 

A Multi-biometric Verification System for the Privacy Protection of Iris Templates
S. Cimato, M. Gamassi, V. Piuri, R. Sassi, and F. Scotti
ASC 53, p. 227 ff.
Abstract | Full article in PDF | BibTeX

 
Polycarpou, Marios M.
 

Security Issues in Drinking Water Distribution Networks
D.G. Eliades and M.M. Polycarpou
ASC 53, p. 69 ff.
Abstract | Full article in PDF | BibTeX

 
Popescu-Zeletin, Radu
 

Flow Level Data Mining of DNS Query Streams for Email Worm Detection
N. Chatzis and R. Popescu-Zeletin
ASC 53, p. 186 ff.
Abstract | Full article in PDF | BibTeX

 
Pragliola, Concetta
 

Wireless Sensor Data Fusion for Critical Infrastructure Security
F. Flammini, A. Gaglione, N. Mazzocca, V. Moscato, and C. Pragliola
ASC 53, p. 92 ff.
Abstract | Full article in PDF | BibTeX

 
 R 

 
Ramli, Dzati Athiar
 

Score Information Decision Fusion Using Support Vector Machine for a Correlation Filter Based Speaker Authentication System
D.A. Ramli, S.A. Samad, and A. Hussain
ASC 53, p. 235 ff.
Abstract | Full article in PDF | BibTeX

 
Ramunno, Gianluca
 

Trusted-Computing Technologies for the Protection of Critical Information Systems
A. Lioy, G. Ramunno, and D. Vernizzi
ASC 53, p. 77 ff.
Abstract | Full article in PDF | BibTeX

 
Redi, Judith
 

Hypermetric k-Means Clustering for Content-Based Document Management
S. Decherchi, P. Gastaldo, J. Redi, and R. Zunino
ASC 53, p. 61 ff.
Abstract | Full article in PDF | BibTeX

 
Rizzi, Antonello
 

On-the-fly Statistical Classification of Internet Traffic at Application Layer Based on Cluster Analysis
A. Baiocchi, G. Maiolini, G. Molina, and A. Rizzi
ASC 53, p. 178 ff.
Abstract | Full article in PDF | BibTeX

 
Ronsivalle, Gaetano Bruno
 

An Artificial Neural Network for Bank Robbery Risk Management: The OS.SI.F Web On-Line Tool of the ABI Anti-crime Department
C. Guazzoni and G.B. Ronsivalle
ASC 53, p. 1 ff.
Abstract | Full article in PDF | BibTeX

 
 S 

 
Sachenko, Anatoly
 

The Concept of Application of Fuzzy Logic in Biometric Authentication Systems
A. Sachenko, A. Banasik, and A. Kapczy\'{n}ski
ASC 53, p. 274 ff.
Abstract | Full article in PDF | BibTeX

 
Samad, Salina Abdul
 

Score Information Decision Fusion Using Support Vector Machine for a Correlation Filter Based Speaker Authentication System
D.A. Ramli, S.A. Samad, and A. Hussain
ASC 53, p. 235 ff.
Abstract | Full article in PDF | BibTeX

 
Sassi, R.
 

A Multi-biometric Verification System for the Privacy Protection of Iris Templates
S. Cimato, M. Gamassi, V. Piuri, R. Sassi, and F. Scotti
ASC 53, p. 227 ff.
Abstract | Full article in PDF | BibTeX

 
Scotti, F.
 

A Multi-biometric Verification System for the Privacy Protection of Iris Templates
S. Cimato, M. Gamassi, V. Piuri, R. Sassi, and F. Scotti
ASC 53, p. 227 ff.
Abstract | Full article in PDF | BibTeX

 
ShiGuang, Ju
 

Random r-Continuous Matching Rule for Immune-Based Secure Storage System
C. Tao, J. ShiGuang, Z. Wei, and N. DeJiao
ASC 53, p. 294 ff.
Abstract | Full article in PDF | BibTeX

 
Soldani, Maurizio
 

Development of Anti Intruders Underwater Systems: Time Domain Evaluation of the Self-informed Magnetic Networks Performance
O. Faggioni, M. Soldani, A. Gabellone, P. Maggiani, and D. Leoncini
ASC 53, p. 100 ff.
Abstract | Full article in PDF | BibTeX

 
 T 

 
Tamponi, Aldo
 

SeSaR: Security for Safety
E. Meda, F. Picasso, A. De Domenico, P. Mazzaron, N. Mazzino, L. Motta, and A. Tamponi
ASC 53, p. 116 ff.
Abstract | Full article in PDF | BibTeX

 
Tao, Cai
 

Random r-Continuous Matching Rule for Immune-Based Secure Storage System
C. Tao, J. ShiGuang, Z. Wei, and N. DeJiao
ASC 53, p. 294 ff.
Abstract | Full article in PDF | BibTeX

 
Tzouveli, Paraskevi
 

Semantic Region Protection Using Hu Moments and a Chaotic Pseudo-random Number Generator
P. Tzouveli, K. Ntalianis, and S. Kollias
ASC 53, p. 286 ff.
Abstract | Full article in PDF | BibTeX

 
 V 

 
Verma, Manish
 

Fingerprint Based Male-Female Classification
M. Verma and S. Agarwal
ASC 53, p. 251 ff.
Abstract | Full article in PDF | BibTeX

 
Vernizzi, Davide
 

Trusted-Computing Technologies for the Protection of Critical Information Systems
A. Lioy, G. Ramunno, and D. Vernizzi
ASC 53, p. 77 ff.
Abstract | Full article in PDF | BibTeX

 
Vrusias, Bogdan
 

Adaptable Text Filters and Unsupervised Neural Classifiers for Spam Detection
B. Vrusias and I. Golledge
ASC 53, p. 195 ff.
Abstract | Full article in PDF | BibTeX

 
 W 

 
Wei, Zhong
 

Random r-Continuous Matching Rule for Immune-Based Secure Storage System
C. Tao, J. ShiGuang, Z. Wei, and N. DeJiao
ASC 53, p. 294 ff.
Abstract | Full article in PDF | BibTeX

 
 Z 

 
Zambelli, Michele
 

PTK: An Alternative Advanced Interface for the Sleuth Kit
D.V. Forte, A. Cavallini, C. Maruti, L. Losio, T. Orlandi, and M. Zambelli
ASC 53, p. 27 ff.
Abstract | Full article in PDF | BibTeX

 
Zanasi, Alessandro
 

Virtual Weapons for Real Wars: Text Mining for National Security
A. Zanasi
ASC 53, p. 53 ff.
Abstract | Full article in PDF | BibTeX

 
Zincir-Heywood, A. Nur
 

A Preliminary Performance Comparison of Two Feature Sets for Encrypted Traffic Classification
R. Alshammari and A.N. Zincir-Heywood
ASC 53, p. 203 ff.
Abstract | Full article in PDF | BibTeX

 
Zunino, Rodolfo
 

Hypermetric k-Means Clustering for Content-Based Document Management
S. Decherchi, P. Gastaldo, J. Redi, and R. Zunino
ASC 53, p. 61 ff.
Abstract | Full article in PDF | BibTeX

 
 

© Springer-Verlag Berlin Heidelberg 2009