ASC Homepage
CD ContentsAuthor IndexSearch
ASC 53 Emilio Corchado, Rodolfo Zunino, Paolo Gastaldo, and Álvaro Herrero (Eds.):

Proceedings of the International Workshop on Computational Intelligence in Security for Information Systems CISIS’08


ASC 53
 
Complete volume in PDF
 
BibTeX

 

Table of Contents

Title Pages in PDF
Preface in PDF
Organization in PDF
Table of Contents in PDF

Computational Intelligence Methods for Fighting Crime

An Artificial Neural Network for Bank Robbery Risk Management: The OS.SI.F Web On-Line Tool of the ABI Anti-crime Department
Carlo Guazzoni and Gaetano Bruno Ronsivalle
ASC 53, p. 1 ff.
Abstract | Full article in PDF | BibTeX

Secure Judicial Communication Exchange Using Soft-computing Methods and Biometric Authentication
Mauro Cislaghi, George Eleftherakis, Roberto Mazzilli, Francois Mohier, Sara Ferri, Valerio Giuffrida, and Elisa Negroni
ASC 53, p. 11 ff.
Abstract | Full article in PDF | BibTeX

Identity Resolution in Criminal Justice Data: An Application of NORA
Queen E. Booker
ASC 53, p. 19 ff.
Abstract | Full article in PDF | BibTeX

PTK: An Alternative Advanced Interface for the Sleuth Kit
Dario V. Forte, Angelo Cavallini, Cristiano Maruti, Luca Losio, Thomas Orlandi, and Michele Zambelli
ASC 53, p. 27 ff.
Abstract | Full article in PDF | BibTeX

Text Mining and Intelligence

Stalker, a Multilingual Text Mining Search Engine for Open Source Intelligence
F. Neri and M. Pettoni
ASC 53, p. 35 ff.
Abstract | Full article in PDF | BibTeX

Computational Intelligence Solutions for Homeland Security
Enrico Appiani and Giuseppe Buslacchi
ASC 53, p. 43 ff.
Abstract | Full article in PDF | BibTeX

Virtual Weapons for Real Wars: Text Mining for National Security
Alessandro Zanasi
ASC 53, p. 53 ff.
Abstract | Full article in PDF | BibTeX

Hypermetric k-Means Clustering for Content-Based Document Management
Sergio Decherchi, Paolo Gastaldo, Judith Redi, and Rodolfo Zunino
ASC 53, p. 61 ff.
Abstract | Full article in PDF | BibTeX

Critical Infrastructure Protection

Security Issues in Drinking Water Distribution Networks
Demetrios G. Eliades and Marios M. Polycarpou
ASC 53, p. 69 ff.
Abstract | Full article in PDF | BibTeX

Trusted-Computing Technologies for the Protection of Critical Information Systems
Antonio Lioy, Gianluca Ramunno, and Davide Vernizzi
ASC 53, p. 77 ff.
Abstract | Full article in PDF | BibTeX

A First Simulation of Attacks in the Automotive Network Communications Protocol FlexRay
Dennis K. Nilsson, Ulf E. Larson, Francesco Picasso, and Erland Jonsson
ASC 53, p. 84 ff.
Abstract | Full article in PDF | BibTeX

Wireless Sensor Data Fusion for Critical Infrastructure Security
Francesco Flammini, Andrea Gaglione, Nicola Mazzocca, Vincenzo Moscato, and Concetta Pragliola
ASC 53, p. 92 ff.
Abstract | Full article in PDF | BibTeX

Development of Anti Intruders Underwater Systems: Time Domain Evaluation of the Self-informed Magnetic Networks Performance
Osvaldo Faggioni, Maurizio Soldani, Amleto Gabellone, Paolo Maggiani, and Davide Leoncini
ASC 53, p. 100 ff.
Abstract | Full article in PDF | BibTeX

Monitoring and Diagnosing Railway Signalling with Logic-Based Distributed Agents
Viviana Mascardi, Daniela Briola, Maurizio Martelli, Riccardo Caccia, and Carlo Milani
ASC 53, p. 108 ff.
Abstract | Full article in PDF | BibTeX

SeSaR: Security for Safety
Ermete Meda, Francesco Picasso, Andrea De Domenico, Paolo Mazzaron, Nadia Mazzino, Lorenzo Motta, and Aldo Tamponi
ASC 53, p. 116 ff.
Abstract | Full article in PDF | BibTeX

Network Security

Automatic Verification of Firewall Configuration with Respect to Security Policy Requirements
Soutaro Matsumoto and Adel Bouhoula
ASC 53, p. 123 ff.
Abstract | Full article in PDF | BibTeX

Automated Framework for Policy Optimization in Firewalls and Security Gateways
Gianluca Maiolini, Lorenzo Cignini, and Andrea Baiocchi
ASC 53, p. 131 ff.
Abstract | Full article in PDF | BibTeX

An Intrusion Detection System Based on Hierarchical Self-Organization
E.J. Palomo, E. Domínguez, R.M. Luque, and J. Muñoz
ASC 53, p. 139 ff.
Abstract | Full article in PDF | BibTeX

Evaluating Sequential Combination of Two Genetic Algorithm-Based Solutions for Intrusion Detection
Zorana Bankovi, Slobodan Bojani, and Octavio Nieto-Taladriz
ASC 53, p. 147 ff.
Abstract | Full article in PDF | BibTeX

Agents and Neural Networks for Intrusion Detection
Álvaro Herrero and Emilio Corchado
ASC 53, p. 155 ff.
Abstract | Full article in PDF | BibTeX

Cluster Analysis for Anomaly Detection
Giuseppe Lieto, Fabio Orsini, and Genoveffa Pagano
ASC 53, p. 163 ff.
Abstract | Full article in PDF | BibTeX

Statistical Anomaly Detection on Real e-Mail Traffic
Maurizio Aiello, Davide Chiarella, and Gianluca Papaleo
ASC 53, p. 170 ff.
Abstract | Full article in PDF | BibTeX

On-the-fly Statistical Classification of Internet Traffic at Application Layer Based on Cluster Analysis
Andrea Baiocchi, Gianluca Maiolini, Giacomo Molina, and Antonello Rizzi
ASC 53, p. 178 ff.
Abstract | Full article in PDF | BibTeX

Flow Level Data Mining of DNS Query Streams for Email Worm Detection
Nikolaos Chatzis and Radu Popescu-Zeletin
ASC 53, p. 186 ff.
Abstract | Full article in PDF | BibTeX

Adaptable Text Filters and Unsupervised Neural Classifiers for Spam Detection
Bogdan Vrusias and Ian Golledge
ASC 53, p. 195 ff.
Abstract | Full article in PDF | BibTeX

A Preliminary Performance Comparison of Two Feature Sets for Encrypted Traffic Classification
Riyad Alshammari and A. Nur Zincir-Heywood
ASC 53, p. 203 ff.
Abstract | Full article in PDF | BibTeX

Dynamic Scheme for Packet Classification Using Splay Trees
Nizar Ben-Neji and Adel Bouhoula
ASC 53, p. 211 ff.
Abstract | Full article in PDF | BibTeX

A Novel Algorithm for Freeing Network from Points of Failure
Rahul Gupta and Suneeta Agarwal
ASC 53, p. 219 ff.
Abstract | Full article in PDF | BibTeX

Biometry

A Multi-biometric Verification System for the Privacy Protection of Iris Templates
S. Cimato, M. Gamassi, V. Piuri, R. Sassi, and F. Scotti
ASC 53, p. 227 ff.
Abstract | Full article in PDF | BibTeX

Score Information Decision Fusion Using Support Vector Machine for a Correlation Filter Based Speaker Authentication System
Dzati Athiar Ramli, Salina Abdul Samad, and Aini Hussain
ASC 53, p. 235 ff.
Abstract | Full article in PDF | BibTeX

Application of 2DPCA Based Techniques in DCT Domain for Face Recognition
Messaoud Bengherabi, Lamia Mezai, Farid Harizi, Abderrazak Guessoum, and Mohamed Cheriet
ASC 53, p. 243 ff.
Abstract | Full article in PDF | BibTeX

Fingerprint Based Male-Female Classification
Manish Verma and Suneeta Agarwal
ASC 53, p. 251 ff.
Abstract | Full article in PDF | BibTeX

BSDT Multi-valued Coding in Discrete Spaces
Petro Gopych
ASC 53, p. 258 ff.
Abstract | Full article in PDF | BibTeX

A Fast and Distortion Tolerant Hashing for Fingerprint Image Authentication
Thi Hoi Le and The Duy Bui
ASC 53, p. 266 ff.
Abstract | Full article in PDF | BibTeX

The Concept of Application of Fuzzy Logic in Biometric Authentication Systems
Anatoly Sachenko, Arkadiusz Banasik, and Adrian Kapczyski
ASC 53, p. 274 ff.
Abstract | Full article in PDF | BibTeX

Information Protection

Bidirectional Secret Communication by Quantum Collisions
Fabio Antonio Bovino
ASC 53, p. 280 ff.
Abstract | Full article in PDF | BibTeX

Semantic Region Protection Using Hu Moments and a Chaotic Pseudo-random Number Generator
Paraskevi Tzouveli, Klimis Ntalianis, and Stefanos Kollias
ASC 53, p. 286 ff.
Abstract | Full article in PDF | BibTeX

Random r-Continuous Matching Rule for Immune-Based Secure Storage System
Cai Tao, Ju ShiGuang, Zhong Wei, and Niu DeJiao
ASC 53, p. 294 ff.
Abstract | Full article in PDF | BibTeX

Industrial Perspectives

nokLINK: A New Solution for Enterprise Security
Francesco Pedersoli and Massimiliano Cristiano
ASC 53, p. 301 ff.
Abstract | Full article in PDF | BibTeX

SLA and LAC: New Solutions for Security Monitoring in the Enterprise
Bruno Giacometti
ASC 53, p. 309 ff.
Abstract | Full article in PDF | BibTeX

Author Index
ASC 53, p. 317 f.
Author Index in PDF

Complete Volume in BibTeX


 
Important Note:

In order to view the full articles presented on this CD-ROM you will need Adobe Acrobat Reader.

If you run a Windows system, you can install Adobe Acrobat Reader by clicking one of the following links:

Install Acrobat Reader 8.0 (Vista / XP [SP 2] / 2000 [SP 4], English)
Install Acrobat Reader 8.0 (Vista / XP [SP 2] / 2000 [SP 4], German)
Install Acrobat Reader 7.0 (XP / 2000 [SP 2], English)
Install Acrobat Reader 7.0 (XP / 2000 [SP 2], German)
Install Acrobat Reader 6.0 (98SE / NT / 2000, English)
Install Acrobat Reader 6.0 (98SE / NT / 2000, German)

For other platforms please take a look into the Acrobat directory of this CD-ROM or visit the Adobe website at http://www.adobe.com/products/acrobat/readstep2.html.


© Springer-Verlag Berlin Heidelberg 2009