default search action
CISIS-ICEUTE-SOCO 2012: Ostrava, Czech Republic - Special Sessions
- Álvaro Herrero, Václav Snásel, Ajith Abraham, Ivan Zelinka, Bruno Baruque, Héctor Quintián-Pardo, José Luís Calvo-Rolle, Javier Sedano, Emilio Corchado:
International Joint Conference CISIS'12-ICEUTE'12-SOCO'12 Special Sessions, Ostrava, Czech Republic, September 5th-7th, 2012. Advances in Intelligent Systems and Computing 189, Springer 2013, ISBN 978-3-642-33017-9 - Abdallah Ghourabi, Tarek Abbes, Adel Bouhoula:
Automatic Analysis of Web Service Honeypot Data Using Machine Learning Techniques. 1-11 - Angel Jesus Varela-Vaca, Robert Warschofsky, Rafael M. Gasca, Sergio Pozo, Christoph Meinel:
A Security Pattern-Driven Approach toward the Automation of Risk Treatment in Business Processes. 13-23 - Eugene Semenkin, Maria Semenkina, Ilia Panfilov:
Neural Network Ensembles Design with Self-Configuring Genetic Programming Algorithm for Solving Computer Security Problems. 25-32 - Raúl Sánchez, Álvaro Herrero, Emilio Corchado:
Clustering for Intrusion Detection: Network Scans as a Case of Study. 33-45 - Camelia-Mihaela Pintea, Petrica C. Pop:
Sensor Networks Security Based on Sensitive Robots Agents: A Conceptual Model. 47-56 - Raúl Durán Díaz, Luis Hernández Encinas, Jaime Muñoz Masqué:
Comments on a Cryptosystem Proposed by Wang and Hu. 57-65 - Fanbao Liu, Changxiang Shen, Tao Xie:
Equivalent Inner Key Recovery Attack to NMAC. 67-75 - Ciprian Pungila:
Hybrid Compression of the Aho-Corasick Automaton for Static Analysis in Intrusion Detection Systems. 77-86 - José Antonio Álvarez-Bermejo, Juan Antonio López Ramos:
Tracking Traitors in Web Services via Blind Signatures. 87-96 - Felix Brezo, José Gaviria de la Puerta, Igor Santos, David Barroso, Pablo García Bringas:
C&C Techniques in Botnet Development. 97-108 - Paulo Mourão, José Pedro Cabral:
How Political Illusions Harm National Stability: Fiscal Illusion as a Source of Taxation. 109-115 - Oscar Delgado-Mohatar, Amparo Fúster-Sabater:
Software Implementation of Linear Feedback Shift Registers over Extended Fields. 117-126 - Jahangir Khan, Zoran S. Bojkovic, Syed Irfan Hayder, Gulam Ali Mallah, Abdul Haseeb, Fariha Atta:
Simulation Analysis of Static and Dynamic Intermediate Nodes and Performance Comparison of MANETS Routing Protocols. 127-140 - Eliska Ochodkova, Jiri Dvorský, Pavel Krömer, Pavel Tucek:
On Fitness Function Based upon Quasigroups Power Sequences. 141-150 - Ivan Zelinka, Filip Merhaut, Lenka Skanderová:
Investigation on Operating Systems Identification by Means of Fractal Geometry and OS Pseudorandom Number Generators. 151-158 - Radek Vala, David Malaník, Roman Jasek:
Usability of Software Intrusion-Detection System in Web Applications. 159-166 - Miroslaw Klinkowski:
A Genetic Algorithm for Solving RSA Problem in Elastic Optical Networks with Dedicated Path Protection. 167-176 - Michal Choras, Rafal Kozik, Damian Puchalski, Witold Holubowicz:
Correlation Approach for SQL Injection Attacks Detection. 177-185 - Michal Choras, Rafal Kozik, Rafal Renk, Witold Holubowicz:
Information Exchange Mechanism between Federated Domains: P2P Approach. 187-196 - Wojciech Indyk, Tomasz Kajdanowicz, Przemyslaw Kazienko, Slawomir Plamowski:
Web Spam Detection Using MapReduce Approach to Collective Classification. 197-206 - Maciej Piec, Iwona Pozniak-Koszalka, Mariusz Koziol:
Analysis of Selected Aspects of "IBM I" Security. 207-214 - Wojciech Kmiecik, Krzysztof Walkowiak:
Metaheuristic Approach for Survivable P2P Multicasting Flow Assignment in Dual Homing Networks. 215-224 - Krzysztof Walkowiak, Wojciech Charewicz, Maciej Donajski, Jacek Rak:
A Tabu Search Algorithm for Optimization of Survivable Overlay Computing Systems. 225-234 - Tomasz Andrysiak, Lukasz Saganowski, Michal Choras:
Greedy Algorithms for Network Anomaly Detection. 235-244 - Marcin Zmyslony, Bartosz Krawczyk, Michal Wozniak:
Combined Classifiers with Neural Fuser for Spam Detection. 245-252 - Karol Wrótniak, Michal Wozniak:
Combined Bayesian Classifiers Applied to Spam Filtering Problem. 253-260 - Carlos Laorden, Patxi Galán-García, Igor Santos, Borja Sanz, José María Gómez Hidalgo, Pablo García Bringas:
Negobot: A Conversational Agent Based on Game Theory for the Detection of Paedophile Behaviour. 261-270 - Igor Santos, Jaime Devesa, Felix Brezo, Javier Nieves, Pablo García Bringas:
OPEM: A Static-Dynamic Approach for Machine-Learning-Based Malware Detection. 271-280 - Igor Santos, Patxi Galán-García, Aitor Santamaría-Ibirika, Borja Alonso-Isla, Iker Alabau-Sarasola, Pablo García Bringas:
Adult Content Filtering through Compression-Based Text Classification. 281-288 - Borja Sanz, Igor Santos, Carlos Laorden, Xabier Ugarte-Pedrero, Pablo García Bringas, Gonzalo Álvarez Marañón:
PUMA: Permission Usage to Detect Malware in Android. 289-298 - Ignacio Aliaga, Vicente Vera, Cristina González Losada, Alvaro Enrique Garcia, Héctor Quintián-Pardo, Emilio Corchado, Fanny Klett, Laura García-Hernández:
Application of Soft Computing Technologies toward Assessment and Skills Development. 299-310 - José Antonio Álvarez-Bermejo, J. Escoriza, Juan Antonio López Ramos, J. Peralta:
An Interactive Mathematica Book. 311-319 - M. Dolores Redel-Macías, Sara Pinzi, Antonio J. Cubero-Atienza, M. P. Dorado, Maria del Pilar Martínez-Jiménez:
Biorefinery Virtual Lab-Integrating E-learning Techniques and Theoretical Learning. 321-330 - Pedro Antonio Gutiérrez, Javier Sánchez-Monedero, César Hervás-Martínez, Manuel Cruz-Ramírez, Juan Carlos Fernández, Francisco Fernández-Navarro:
Approaching System Administration as a Group Project in Computer Engineering Higher Education. 331-340 - Pavel Brandstetter, Marek Dobrovsky:
Speed Control of A.C. Drive with Induction Motor Using Genetic Algorithm. 341-350 - Pavel Brandstetter, Pavel Bilek:
Applications of Artificial Neural Networks in Control of DC Drive. 351-360 - Pavol Fedor, Daniela Perdukova:
Energy Optimization of a Dynamic System Controller. 361-369 - Pavol Fedor, Daniela Perdukova, Zelmira Ferkova:
Optimal Input Vector Based Fuzzy Controller Rules Design. 371-380 - Radim Hercík, Roman Slabý, Zdenek Machacek, Jirí Koziorek:
Correlation Methods of OCR Algorithm for Traffic Sign Detection Implementable in Microcontrollers. 381-389 - Jana Nowaková, Miroslav Pokorný, Martin Pies:
Takagi-Sugeno Fuzzy Model in Task of Controllers Design. 391-400 - Petr Palacky, Petr Hudecek, Ales Havel:
Real-Time Estimation of Induction Motor Parameters Based on the Genetic Algorithm. 401-409 - Jan Bauer, Stanislav Fligl:
Comparison of Fuzzy Logic Based and Sliding Mode Based Controller for IM Drive Fed by Matrix Converter. 411-420 - Pavel Skalny, Bohumil Krajc:
Discrete-Time Markov Chains in Reliability Analysis-Case Study. 421-427 - Jakub Talla, Zdenek Peroutka, Seppo J. Ovaska, Josef Stehlik:
Genetic Algorithm Based Optimization of MGP-FIR Current Reference Generator for Active Power Filters. 429-438 - Karla Stépánová, Martin Macas, Lenka Lhotská:
Correlation-Based Neural Gas for Visualizing Correlations between EEG Features. 439-446 - Jakub Jirka, Michal Prauzek:
Built-in Smartphone Accelerometer Motion Pattern Recognition Using Wavelet Transform. 447-455 - Sara Colantonio, Ovidio Salvetti:
Temporal Analysis of Remotely Sensed Data for the Assessment of COPD Patients' Health Status. 457-466 - Tomás Barton, Pavel Kordík:
Encoding Time Series Data for Better Clustering Results. 467-475 - Pavel Dohnálek, Petr Gajdos, Tomas Peterek, Marek Penhaker:
Pattern Recognition in EEG Cognitive Signals Accelerated by GPU. 477-485 - David Sikora, Martin Stepnicka, Lenka Vavrickova:
On the Potential of Fuzzy Rule-Based Ensemble Forecasting. 487-496 - Vilém Novák, Hashim Habiballa:
Recognition of Damaged Letters Based on Mathematical Fuzzy Logic Analysis. 497-506 - Pavel Vlasánek, Irina Perfilieva:
Image Reconstruction with Usage of the F-Transform. 507-514 - Stephane Kouamo, Claude Tangha:
Image Compression with Artificial Neural Networks. 515-524 - Petr Hurtík, Irina Perfilieva:
Image Compression Methodology Based on Fuzzy Transform. 525-532 - Iva Tomanova, Jiri Kupka:
Implementation of Background Knowledge and Properties Induced by Fuzzy Confirmation Measures in Apriori Algorithm. 533-542
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.