Skip to main content
  • Conference proceedings
  • © 2011

Computational Intelligence in Security for Information Systems

4th International Conference, CISIS 2011, Held at IWANN 2011, Torremolinos-Málaga, Spain, June 8-10, 2011, Proceedings

  • State-of-the-art research
  • Fast-track conference proceedings
  • Unique visibility

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 6694)

Part of the book sub series: Security and Cryptology (LNSC)

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (38 papers)

  1. Front Matter

  2. Chapter 1: Machine Learning and Intelligence

    1. Collective Classification for Spam Filtering

      • Carlos Laorden, Borja Sanz, Igor Santos, Patxi Galán-García, Pablo G. Bringas
      Pages 1-8
    2. Detecting Bad-Mouthing Attacks on Reputation Systems Using Self-Organizing Maps

      • Z. Banković, J. C. Vallejo, D. Fraga, J. M. Moya
      Pages 9-16
    3. Approach Based Ensemble Methods for Better and Faster Intrusion Detection

      • Emna Bahri, Nouria Harbi, Hoa Nguyen Huu
      Pages 17-24
    4. Application of the Generic Feature Selection Measure in Detection of Web Attacks

      • Hai Thanh Nguyen, Carmen Torrano-Gimenez, Gonzalo Alvarez, Slobodan Petrović, Katrin Franke
      Pages 25-32
    5. Data Aggregation Based on Fuzzy Logic for VANETs

      • P. Caballero-Gil, J. Molina-Gil, C. Caballero-Gil
      Pages 33-40
  3. Chapter 2: Network Security

    1. Digging into IP Flow Records with a Visual Kernel Method

      • Cynthia Wagner, Gerard Wagener, Radu State, Thomas Engel
      Pages 41-49
    2. Opcode-Sequence-Based Semi-supervised Unknown Malware Detection

      • Igor Santos, Borja Sanz, Carlos Laorden, Felix Brezo, Pablo G. Bringas
      Pages 50-57
    3. A New Alert Correlation Algorithm Based on Attack Graph

      • Sebastian Roschke, Feng Cheng, Christoph Meinel
      Pages 58-67
    4. A Qualitative Survey of Active TCP/IP Fingerprinting Tools and Techniques for Operating Systems Identification

      • João Paulo S. Medeiros, Agostinho de Medeiros Brito Júnior, Paulo S. Motta Pires
      Pages 68-75
    5. Security Alert Correlation Using Growing Neural Gas

      • Francisco José Mora-Gimeno, Francisco Maciá-Pérez, Iren Lorenzo-Fonseca, Juan Antonio Gil-Martínez-Abarca, Diego Marcos-Jorquera, Virgilio Gilart-Iglesias
      Pages 76-83
    6. A Comparative Performance Evaluation of DNS Tunneling Tools

      • Alessio Merlo, Gianluca Papaleo, Stefano Veneziano, Maurizio Aiello
      Pages 84-91
    7. Testing Ensembles for Intrusion Detection: On the Identification of Mutated Network Scans

      • Silvia González, Javier Sedano, Álvaro Herrero, Bruno Baruque, Emilio Corchado
      Pages 109-117
    8. An Intelligent Information Security Mechanism for the Network Layer of WSN: BIOSARP

      • Kashif Saleem, Norsheila Fisal, Sharifah Hafizah, Rozeha A. Rashid
      Pages 118-126
  4. Chapter 3: Cryptography

    1. Structural Properties of Cryptographic Sequences

      • A. Fúster-Sabater
      Pages 127-134
    2. A Multisignature Scheme Based on the SDLP and on the IFP

      • R. Durán Díaz, L. Hernández Encinas, J. Muñoz Masqué
      Pages 135-142
    3. A Group Signature Scheme Based on the Integer Factorization and the Subgroup Discrete Logarithm Problems

      • R. Durán Díaz, L. Hernández Encinas, J. Muñoz Masqué
      Pages 143-150

About this book

This book constitutes the refereed proceedings of the 4th International Conference on Computational Intelligence in Security for Information Systems, CISIS 2011, held in Torremolinos-Málaga, in June 2011 as a satellite event of IWANN 2011, the International Work-conference on Artificial and Natural Neural Networks. The 38 revised full papers presented were carefully reviewed and selected from a total of 70 submissions. The papers are organized in topical sections on machine learning and intelligence, network security, cryptography, securing software, and applications of intelligent methods for security.

Editors and Affiliations

  • Departamento de Ingeniería Civil, Universidad de Burgos, Burgos, Spain

    Álvaro Herrero

  • Departamento de Informática y Automática, Universidad de Salamanca, Salamanca, Spain

    Emilio Corchado

Bibliographic Information

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access