Proceedings of the International Workshop on Computational Intelligence in Security for Information Systems CISIS’08

  • Emilio Corchado
  • Rodolfo Zunino
  • Paolo Gastaldo
  • Álvaro Herrero

Part of the Advances in Soft Computing book series (AINSC, volume 53)

Table of contents

  1. Front Matter
  2. Computational Intelligence Methods for Fighting Crime

    1. Mauro Cislaghi, George Eleftherakis, Roberto Mazzilli, Francois Mohier, Sara Ferri, Valerio Giuffrida et al.
      Pages 11-18
    2. Dario V. Forte, Angelo Cavallini, Cristiano Maruti, Luca Losio, Thomas Orlandi, Michele Zambelli
      Pages 27-34
  3. Text Mining and Intelligence

    1. Enrico Appiani, Giuseppe Buslacchi
      Pages 43-52
    2. Sergio Decherchi, Paolo Gastaldo, Judith Redi, Rodolfo Zunino
      Pages 61-68
  4. Critical Infrastructure Protection

    1. Demetrios G. Eliades, Marios M. Polycarpou
      Pages 69-76
    2. Antonio Lioy, Gianluca Ramunno, Davide Vernizzi
      Pages 77-83
    3. Dennis K. Nilsson, Ulf E. Larson, Francesco Picasso, Erland Jonsson
      Pages 84-91
    4. Francesco Flammini, Andrea Gaglione, Nicola Mazzocca, Vincenzo Moscato, Concetta Pragliola
      Pages 92-99
    5. Osvaldo Faggioni, Maurizio Soldani, Amleto Gabellone, Paolo Maggiani, Davide Leoncini
      Pages 100-107
    6. Viviana Mascardi, Daniela Briola, Maurizio Martelli, Riccardo Caccia, Carlo Milani
      Pages 108-115
    7. Ermete Meda, Francesco Picasso, Andrea De Domenico, Paolo Mazzaron, Nadia Mazzino, Lorenzo Motta et al.
      Pages 116-122
  5. Network Security

    1. Gianluca Maiolini, Lorenzo Cignini, Andrea Baiocchi
      Pages 131-138
    2. E. J. Palomo, E. Domínguez, R. M. Luque, J. Muñoz
      Pages 139-146
    3. Zorana Banković, Slobodan Bojanić, Octavio Nieto-Taladriz
      Pages 147-154

About these proceedings

Introduction

The International Workshop on Computational Intelligence for Security in Information Systems (CISIS) proposes a meeting ground to the various communities involved in building intelligent systems for security, namely: information security, data mining, adaptive learning methods and soft computing among others. The main goal is to allow experts and researchers to assess the benefits of learning methods in the data-mining area for information-security applications. The Workshop offers the opportunity to interact with the leading industries actively involved in the critical area of security, and have a picture of the current solutions adopted in practical domains.

This volume of Advances in Soft Computing contains accepted papers presented at CISIS’08, which was held in Genova, Italy, on October 23rd-24th, 2008. The selection process to set up the Workshop program yielded a collection of about 40 papers. This allowed the Scientific Committee to verify the vital and crucial nature of the topics involved in the event, and resulted in an acceptance rate of about 60% of the originally submitted manuscripts.

Keywords

Spam agents algorithms artificial neural network cognition computational intelligence data mining fuzzy logic genetic algorithm learning neural network optimization simulation verification

Editors and affiliations

  • Emilio Corchado
    • 1
  • Rodolfo Zunino
    • 2
  • Paolo Gastaldo
    • 2
  • Álvaro Herrero
    • 3
  1. 1.Universidad de BurgosBurgosSpain
  2. 2.University of GenovaGenovaItaly
  3. 3.Escuela Politécnica SuperiorBurgosSpain

Bibliographic information

  • DOI https://doi.org/10.1007/978-3-540-88181-0
  • Copyright Information Springer Berlin Heidelberg 2009
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Engineering
  • Print ISBN 978-3-540-88180-3
  • Online ISBN 978-3-540-88181-0
  • Series Print ISSN 1867-5662
  • Series Online ISSN 1860-0794
  • About this book