Skip to main content

Proceedings of the International Workshop on Computational Intelligence in Security for Information Systems CISIS 2008

  • Conference proceedings
  • © 2009

Overview

  • Presents latest results of Computational Intelligence in Security for Information Systems
  • Proceedings of the International Workshop on Computational Intelligence in Security for Information Systems CISIS'08

Part of the book series: Advances in Intelligent and Soft Computing (AINSC, volume 53)

This is a preview of subscription content, log in via an institution to check access.

Access this book

eBook USD 169.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

Licence this eBook for your library

Institutional subscriptions

Table of contents (40 papers)

  1. Computational Intelligence Methods for Fighting Crime

  2. Text Mining and Intelligence

  3. Critical Infrastructure Protection

  4. Network Security

Keywords

About this book

The research scenario in advanced systems for protecting critical infrastructures and for deeply networked information tools highlights a growing link between security issues and the need for intelligent processing abilities in the area of information s- tems. To face the ever-evolving nature of cyber-threats, monitoring systems must have adaptive capabilities for continuous adjustment and timely, effective response to modifications in the environment. Moreover, the risks of improper access pose the need for advanced identification methods, including protocols to enforce comput- security policies and biometry-related technologies for physical authentication. C- putational Intelligence methods offer a wide variety of approaches that can be fruitful in those areas, and can play a crucial role in the adaptive process by their ability to learn empirically and adapt a system’s behaviour accordingly. The International Workshop on Computational Intelligence for Security in Inf- mation Systems (CISIS) proposes a meeting ground to the various communities - volved in building intelligent systems for security, namely: information security, data mining, adaptive learning methods and soft computing among others. The main goal is to allow experts and researchers to assess the benefits of learning methods in the data-mining area for information-security applications. The Workshop offers the opportunity to interact with the leading industries actively involved in the critical area of security, and have a picture of the current solutions adopted in practical domains. This volume of Advances in Soft Computing contains accepted papers presented at CISIS’08, which was held in Genova, Italy, on October 23rd–24th, 2008.

Editors and Affiliations

  • Universidad de Burgos, Burgos, Spain

    Emilio Corchado

  • University of Genova, Genova, Italy

    Rodolfo Zunino, Paolo Gastaldo

  • Escuela Politécnica Superior, Burgos, Spain

    Álvaro Herrero

Bibliographic Information

  • Book Title: Proceedings of the International Workshop on Computational Intelligence in Security for Information Systems CISIS 2008

  • Editors: Emilio Corchado, Rodolfo Zunino, Paolo Gastaldo, Álvaro Herrero

  • Series Title: Advances in Intelligent and Soft Computing

  • DOI: https://doi.org/10.1007/978-3-540-88181-0

  • Publisher: Springer Berlin, Heidelberg

  • eBook Packages: Engineering, Engineering (R0)

  • Copyright Information: Springer-Verlag Berlin Heidelberg 2009

  • Softcover ISBN: 978-3-540-88180-3Published: 16 October 2008

  • eBook ISBN: 978-3-540-88181-0Published: 24 October 2008

  • Series ISSN: 1867-5662

  • Series E-ISSN: 1867-5670

  • Edition Number: 1

  • Number of Pages: XIII, 318

  • Topics: Artificial Intelligence, Mathematical and Computational Engineering

Publish with us