International Joint Conference
CISIS’15 and ICEUTE’15
Editors: Herrero, A., Baruque, B., Sedano, J., Quintián, H., Corchado, E.S. (Eds.)
Free Preview- Latest research on Computational Intelligence in Security for Information Systems and on European Transnational Education
- Scientific outcome of the 8th International Conference on Computational Intelligence in Security for Information Systems (CISIS’15) ), held June 15th-17th, 2015 in Burgos, Spain
- Scientific outcome of the 6th International Conference on EUropean Transnational Education (ICEUTE’15), held June 15th-17th, 2015 in Burgos, Spain
Buy this book
- About this book
-
This volume of Advances in Intelligent and Soft Computing contains accepted papers presented at the 8th International Conference on Computational Intelligence in Security for Information Systems (CISIS 2015) and the 6th International Conference on European Transnational Education (ICEUTE 2015). These conferences were held in the beautiful and historic city of Burgos (Spain), in June 2015.
The aim of the 8th CISIS conference is to offer a meeting opportunity for academic and industry-related researchers belonging to the various, vast communities of Computational Intelligence, Information Security, and Data Mining. The need for intelligent, flexible behaviour by large, complex systems, especially in mission-critical domains, is intended to be the catalyst and the aggregation stimulus for the overall event.
After a through peer-review process, the CISIS 2015 International Program Committee selected 43 papers, written by authors from 16 different countries. In the case of 6th ICEUTE conference, the International Program Committee selected 12 papers (from 7 countries). These papers are published in present conference proceedings, achieving an acceptance rate of about 39%.
The selection of papers was extremely rigorous in order to maintain the high quality of the conference and we would like to thank the members of the Program Committees for their hard work in the reviewing process. This is a crucial process to the creation of a high standard conference and the CISIS and ICEUTE conferences would not exist without their help.
- Table of contents (55 chapters)
-
-
Performance Analysis of Vertically Partitioned Data in Clouds Through a Client-Based In-Memory Key-Value Store Cache
Pages 3-13
-
Formalizing Agents’ Beliefs for Cyber-Security Defense Strategy Planning
Pages 15-25
-
Automatic Classification and Detection of Snort Configuration Anomalies - a Formal Approach
Pages 27-39
-
An Improved Bat Algorithm Driven by Support Vector Machines for Intrusion Detection
Pages 41-51
-
A Formal Approach Based on Verification and Validation Techniques for Enhancing the Integrity of Concrete Role Based Access Control Policies
Pages 53-64
-
Table of contents (55 chapters)
- Download Preface 1 PDF (46.6 KB)
- Download Sample pages 2 PDF (202.8 KB)
- Download Table of contents PDF (99.1 KB)
Recommended for you

Bibliographic Information
- Bibliographic Information
-
- Book Title
- International Joint Conference
- Book Subtitle
- CISIS’15 and ICEUTE’15
- Editors
-
- Alvaro Herrero
- Bruno Baruque
- Javier Sedano
- Héctor Quintián
- Emilio S. Corchado
- Series Title
- Advances in Intelligent Systems and Computing
- Series Volume
- 369
- Copyright
- 2015
- Publisher
- Springer International Publishing
- Copyright Holder
- Springer International Publishing Switzerland
- eBook ISBN
- 978-3-319-19713-5
- DOI
- 10.1007/978-3-319-19713-5
- Softcover ISBN
- 978-3-319-19712-8
- Series ISSN
- 2194-5357
- Edition Number
- 1
- Number of Pages
- XXII, 641
- Number of Illustrations
- 138 b/w illustrations
- Topics