: Ángel Alonso Alvarez, Carlos Redondo Gil, Emilio Corchado, Álvaro Herrero, Ángel Alonso, Carlos Redo
: Álvaro Herrero, Emilio Corchado, Carlos Redondo Gil, Ángel Alonso Alvarez
: Computational Intelligence in Security for Information Systems 2010 Proceedings of the 3rd International Conference on Computational Intelligence in Security for Information Systems (CISIS'10)
: Springer-Verlag
: 9783642166266
: Advances in Intelligent and Soft Computing
: 1
: CHF 115.60
:
: Allgemeines, Lexika
: English
: 240
: Wasserzeichen
: PC/MAC/eReader/Tablet
: PDF
rd The 3 International Conference on Computational Intelligence in Security for Information Systems (CISIS 2010) provided a broad and interdisciplinary forum to present the most recent developments in several very active scientific areas such as Machine Learning, Infrastructure Protection, Intelligent Methods in Energy and Transportation, Network Security, Biometry, Cryptography, High-performance and Grid Computing, and Industrial Perspective among others. The global purpose of CISIS series of conferences has been to form a broad and interdisciplinary meeting ground offering the opportunity to interact with the leading research team and industries actively involved in the critical area of security, and have a picture of the current solutions adopted in practical domains. This volume of Advances in Intelligence and Soft Computing contains accepted papers presented at CISIS 2010, which was held in León, Spain, on November 11-12, 2010. CISIS 2010 received over 50 technical submissions. After a thorough peer-review process, the International Program Committee - lected 25 papers which are published in this conference proceedings. This allowed the Scientific Committee to verify the vital and crucial nature of the topics - volved in the event, and resulted in an acceptance rate close to 50% of the ori- nally submitted manuscripts.
Title1
Preface5
Organization7
Contents13
Chapter 1 Machine Learning and Intelligence16
An Incremental Density-Based Clustering Technique for Large Datasets17
Introduction17
What Is DBSCAN?18
Related Work19
Incremental DBSCAN Algorithm20
Dataset Sorting20
Region Query20
Cluster Merging21
Computational Complexity23
Experimental Details23
Conclusion and Future Work24
References24
BSDT ROC and Cognitive Learning Hypothesis26
Introduction26
BSDT Coding-Decoding and Performance27
BSDT Cognitive Learning Hypothesis28
BSDT ROC Fitting Procedure29
BSDT ROCs for Patients with Brain Damage32
Discussion and Conclusions33
References35
Evolving Fuzzy Classifier for Data Mining - an Information Retrieval Approach37
Introduction37
Fuzzy Information Retrieval38
Genetic Algorithms and Genetic Programming39
GP for the Evolutionary Query Optimization40
Genetic Evolution of Fuzzy Classifier41
Conclusions43
References44
Mereotopological Analysis of Formal Concepts in Security Ontologies45
Introduction45
Knowledge Representation in Security Ontologies46
Representability of Security Issues47
Ontology Visualization Based on Reasoning Services48
Paella Tool49
Analysis with Paella of Ontologies on Security51
Final Remarks and Future Work51
References52
Chapter 2 Agents and Multi-Agent Systems53
A Multi-agent Data Mining System for Defect Forecasting in a Decentralized Manufacturing Environment54
Introduction55
Agents Devoted to Render the Internal and Superficial Defects Maps56
Agents Devoted to Develop and Maintain the Learning Context58
Agents Devoted to Evaluate the Coils Entering the Pickling Line and to Forecast the Remaining Defects59
Conclusions61
References61
A Distributed Hierarchical Multi-agent Architecture for Detecting Injections in SQL Queries62
Introduction62
A Multi-agent Architecture for the Detection of SQL Injection63
Classifier CBR Agent65
Retrieve66
Reuse66
Revise67
Retain67
Results and Conclusions68
References69
Incorporating Temporal Constraints in the Analysis Task of a Hybrid Intelligent IDS71
Introduction71
MOVICAB-IDS72
Time-Bounding the MOVICAB-IDS Analyzer Agents74
Temporal Bounded CBR75
Integrating TB-CBR into the MOVICAB-IDS Analyzer Agent76
Experimental Results77
Conclusions78
References78
Chapter 3 Image, Video and Speech Processing80
Performances of Speech Signal Biometric Systems B