Skip to main content
  • Conference proceedings
  • © 2009

Proceedings of the International Workshop on Computational Intelligence in Security for Information Systems CISIS 2008

  • Presents latest results of Computational Intelligence in Security for Information Systems
  • Proceedings of the International Workshop on Computational Intelligence in Security for Information Systems CISIS'08

Part of the book series: Advances in Intelligent and Soft Computing (AINSC, volume 53)

Buy it now

Buying options

eBook USD 169.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (40 papers)

  1. Front Matter

  2. Computational Intelligence Methods for Fighting Crime

    1. Secure Judicial Communication Exchange Using Soft-computing Methods and Biometric Authentication

      • Mauro Cislaghi, George Eleftherakis, Roberto Mazzilli, Francois Mohier, Sara Ferri, Valerio Giuffrida et al.
      Pages 11-18
    2. PTK: An Alternative Advanced Interface for the Sleuth Kit

      • Dario V. Forte, Angelo Cavallini, Cristiano Maruti, Luca Losio, Thomas Orlandi, Michele Zambelli
      Pages 27-34
  3. Text Mining and Intelligence

    1. Computational Intelligence Solutions for Homeland Security

      • Enrico Appiani, Giuseppe Buslacchi
      Pages 43-52
    2. Hypermetric k-Means Clustering for Content-Based Document Management

      • Sergio Decherchi, Paolo Gastaldo, Judith Redi, Rodolfo Zunino
      Pages 61-68
  4. Critical Infrastructure Protection

    1. Security Issues in Drinking Water Distribution Networks

      • Demetrios G. Eliades, Marios M. Polycarpou
      Pages 69-76
    2. Trusted-Computing Technologies for the Protection of Critical Information Systems

      • Antonio Lioy, Gianluca Ramunno, Davide Vernizzi
      Pages 77-83
    3. A First Simulation of Attacks in the Automotive Network Communications Protocol FlexRay

      • Dennis K. Nilsson, Ulf E. Larson, Francesco Picasso, Erland Jonsson
      Pages 84-91
    4. Wireless Sensor Data Fusion for Critical Infrastructure Security

      • Francesco Flammini, Andrea Gaglione, Nicola Mazzocca, Vincenzo Moscato, Concetta Pragliola
      Pages 92-99
    5. Development of Anti Intruders Underwater Systems: Time Domain Evaluation of the Self-informed Magnetic Networks Performance

      • Osvaldo Faggioni, Maurizio Soldani, Amleto Gabellone, Paolo Maggiani, Davide Leoncini
      Pages 100-107
    6. Monitoring and Diagnosing Railway Signalling with Logic-Based Distributed Agents

      • Viviana Mascardi, Daniela Briola, Maurizio Martelli, Riccardo Caccia, Carlo Milani
      Pages 108-115
    7. SeSaR: Security for Safety

      • Ermete Meda, Francesco Picasso, Andrea De Domenico, Paolo Mazzaron, Nadia Mazzino, Lorenzo Motta et al.
      Pages 116-122
  5. Network Security

    1. Automated Framework for Policy Optimization in Firewalls and Security Gateways

      • Gianluca Maiolini, Lorenzo Cignini, Andrea Baiocchi
      Pages 131-138
    2. An Intrusion Detection System Based on Hierarchical Self-Organization

      • E. J. Palomo, E. Domínguez, R. M. Luque, J. Muñoz
      Pages 139-146
    3. Evaluating Sequential Combination of Two Genetic Algorithm-Based Solutions for Intrusion Detection

      • Zorana Banković, Slobodan Bojanić, Octavio Nieto-Taladriz
      Pages 147-154

About this book

The research scenario in advanced systems for protecting critical infrastructures and for deeply networked information tools highlights a growing link between security issues and the need for intelligent processing abilities in the area of information s- tems. To face the ever-evolving nature of cyber-threats, monitoring systems must have adaptive capabilities for continuous adjustment and timely, effective response to modifications in the environment. Moreover, the risks of improper access pose the need for advanced identification methods, including protocols to enforce comput- security policies and biometry-related technologies for physical authentication. C- putational Intelligence methods offer a wide variety of approaches that can be fruitful in those areas, and can play a crucial role in the adaptive process by their ability to learn empirically and adapt a system’s behaviour accordingly. The International Workshop on Computational Intelligence for Security in Inf- mation Systems (CISIS) proposes a meeting ground to the various communities - volved in building intelligent systems for security, namely: information security, data mining, adaptive learning methods and soft computing among others. The main goal is to allow experts and researchers to assess the benefits of learning methods in the data-mining area for information-security applications. The Workshop offers the opportunity to interact with the leading industries actively involved in the critical area of security, and have a picture of the current solutions adopted in practical domains. This volume of Advances in Soft Computing contains accepted papers presented at CISIS’08, which was held in Genova, Italy, on October 23rd–24th, 2008.

Editors and Affiliations

  • Universidad de Burgos, Burgos, Spain

    Emilio Corchado

  • University of Genova, Genova, Italy

    Rodolfo Zunino, Paolo Gastaldo

  • Escuela Politécnica Superior, Burgos, Spain

    Álvaro Herrero

Bibliographic Information

  • Book Title: Proceedings of the International Workshop on Computational Intelligence in Security for Information Systems CISIS 2008

  • Editors: Emilio Corchado, Rodolfo Zunino, Paolo Gastaldo, Álvaro Herrero

  • Series Title: Advances in Intelligent and Soft Computing

  • DOI: https://doi.org/10.1007/978-3-540-88181-0

  • Publisher: Springer Berlin, Heidelberg

  • eBook Packages: Engineering, Engineering (R0)

  • Copyright Information: Springer-Verlag Berlin Heidelberg 2009

  • Softcover ISBN: 978-3-540-88180-3Published: 16 October 2008

  • eBook ISBN: 978-3-540-88181-0Published: 24 October 2008

  • Series ISSN: 1867-5662

  • Series E-ISSN: 1867-5670

  • Edition Number: 1

  • Number of Pages: XIII, 318

  • Topics: Artificial Intelligence, Mathematical and Computational Engineering

Buy it now

Buying options

eBook USD 169.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access