Skip to main content
  • Conference proceedings
  • © 2011

Computational Intelligence in Security for Information Systems

4th International Conference, CISIS 2011, Held at IWANN 2011, Torremolinos-Málaga, Spain, June 8-10, 2011, Proceedings

  • State-of-the-art research

  • Fast-track conference proceedings

  • Unique visibility

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 6694)

Part of the book sub series: Security and Cryptology (LNSC)

Buying options

eBook USD 39.99
Price excludes VAT (Canada)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (Canada)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

This is a preview of subscription content, access via your institution.

Table of contents (38 papers)

  1. Front Matter

  2. Chapter 1: Machine Learning and Intelligence

    1. Collective Classification for Spam Filtering

      • Carlos Laorden, Borja Sanz, Igor Santos, Patxi Galán-García, Pablo G. Bringas
      Pages 1-8
    2. Detecting Bad-Mouthing Attacks on Reputation Systems Using Self-Organizing Maps

      • Z. Banković, J. C. Vallejo, D. Fraga, J. M. Moya
      Pages 9-16
    3. Approach Based Ensemble Methods for Better and Faster Intrusion Detection

      • Emna Bahri, Nouria Harbi, Hoa Nguyen Huu
      Pages 17-24
    4. Application of the Generic Feature Selection Measure in Detection of Web Attacks

      • Hai Thanh Nguyen, Carmen Torrano-Gimenez, Gonzalo Alvarez, Slobodan Petrović, Katrin Franke
      Pages 25-32
    5. Data Aggregation Based on Fuzzy Logic for VANETs

      • P. Caballero-Gil, J. Molina-Gil, C. Caballero-Gil
      Pages 33-40
  3. Chapter 2: Network Security

    1. Digging into IP Flow Records with a Visual Kernel Method

      • Cynthia Wagner, Gerard Wagener, Radu State, Thomas Engel
      Pages 41-49
    2. Opcode-Sequence-Based Semi-supervised Unknown Malware Detection

      • Igor Santos, Borja Sanz, Carlos Laorden, Felix Brezo, Pablo G. Bringas
      Pages 50-57
    3. A New Alert Correlation Algorithm Based on Attack Graph

      • Sebastian Roschke, Feng Cheng, Christoph Meinel
      Pages 58-67
    4. A Qualitative Survey of Active TCP/IP Fingerprinting Tools and Techniques for Operating Systems Identification

      • João Paulo S. Medeiros, Agostinho de Medeiros Brito Júnior, Paulo S. Motta Pires
      Pages 68-75
    5. Security Alert Correlation Using Growing Neural Gas

      • Francisco José Mora-Gimeno, Francisco Maciá-Pérez, Iren Lorenzo-Fonseca, Juan Antonio Gil-Martínez-Abarca, Diego Marcos-Jorquera, Virgilio Gilart-Iglesias
      Pages 76-83
    6. A Comparative Performance Evaluation of DNS Tunneling Tools

      • Alessio Merlo, Gianluca Papaleo, Stefano Veneziano, Maurizio Aiello
      Pages 84-91
    7. Testing Ensembles for Intrusion Detection: On the Identification of Mutated Network Scans

      • Silvia González, Javier Sedano, Álvaro Herrero, Bruno Baruque, Emilio Corchado
      Pages 109-117
    8. An Intelligent Information Security Mechanism for the Network Layer of WSN: BIOSARP

      • Kashif Saleem, Norsheila Fisal, Sharifah Hafizah, Rozeha A. Rashid
      Pages 118-126
  4. Chapter 3: Cryptography

    1. Structural Properties of Cryptographic Sequences

      • A. Fúster-Sabater
      Pages 127-134
    2. A Multisignature Scheme Based on the SDLP and on the IFP

      • R. Durán Díaz, L. Hernández Encinas, J. Muñoz Masqué
      Pages 135-142
    3. A Group Signature Scheme Based on the Integer Factorization and the Subgroup Discrete Logarithm Problems

      • R. Durán Díaz, L. Hernández Encinas, J. Muñoz Masqué
      Pages 143-150

About this book

This book constitutes the refereed proceedings of the 4th International Conference on Computational Intelligence in Security for Information Systems, CISIS 2011, held in Torremolinos-Málaga, in June 2011 as a satellite event of IWANN 2011, the International Work-conference on Artificial and Natural Neural Networks. The 38 revised full papers presented were carefully reviewed and selected from a total of 70 submissions. The papers are organized in topical sections on machine learning and intelligence, network security, cryptography, securing software, and applications of intelligent methods for security.

Keywords

  • cryptanalysis
  • elliptic curves
  • malware
  • network intrusion detection
  • public key cryptography
  • algorithm analysis and problem complexity

Editors and Affiliations

  • Departamento de Ingeniería Civil, Universidad de Burgos, Burgos, Spain

    Álvaro Herrero

  • Departamento de Informática y Automática, Universidad de Salamanca, Salamanca, Spain

    Emilio Corchado

Bibliographic Information

Buying options

eBook USD 39.99
Price excludes VAT (Canada)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (Canada)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions