International Joint Conference CISIS’12-ICEUTE´12-SOCO´12 Special Sessions

  • Álvaro Herrero
  • Václav Snášel
  • Ajith Abraham
  • Ivan Zelinka
  • Bruno Baruque
  • Héctor Quintián
  • José Luis Calvo
  • Javier Sedano
  • Emilio Corchado
Conference proceedings

DOI: 10.1007/978-3-642-33018-6

Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 189)

Table of contents (55 papers)

  1. Front Matter
    Pages 1-26
  2. Automatic Analysis of Web Service Honeypot Data Using Machine Learning Techniques
    Abdallah Ghourabi, Tarek Abbes, Adel Bouhoula
    Pages 1-11
  3. A Security Pattern-Driven Approach toward the Automation of Risk Treatment in Business Processes
    Angel Jesus Varela-Vaca, Robert Warschofsky, Rafael M. Gasca, Sergio Pozo, Christoph Meinel
    Pages 13-23
  4. Clustering for Intrusion Detection: Network Scans as a Case of Study
    Raúl Sánchez, Álvaro Herrero, Emilio Corchado
    Pages 33-45
  5. Comments on a Cryptosystem Proposed by Wang and Hu
    R. Durán Díaz, L. Hernández Encinas, J. Muñoz Masqué
    Pages 57-65
  6. Equivalent Inner Key Recovery Attack to NMAC
    Fanbao Liu, Changxiang Shen, Tao Xie
    Pages 67-75
  7. Tracking Traitors in Web Services via Blind Signatures
    J. A. Álvarez-Bermejo, J. A. López-Ramos
    Pages 87-96
  8. C&C Techniques in Botnet Development
    Félix Brezo, José Gaviria de la Puerta, Igor Santos, David Barroso, Pablo Garcia Bringas
    Pages 97-108
  9. Software Implementation of Linear Feedback Shift Registers over Extended Fields
    O. Delgado-Mohatar, A. Fúster-Sabater
    Pages 117-126
  10. Simulation Analysis of Static and Dynamic Intermediate Nodes and Performance Comparison of MANETS Routing Protocols
    Jahangir Khan, Zoran Bojkovic, Syed Irfan Hayder, Gulam Ali Mallah, Abdul Haseeb, Fariha Atta
    Pages 127-140
  11. On Fitness Function Based upon Quasigroups Power Sequences
    Eliška Ochodková, Jiří Dvorský, Pavel Krömer, Pavel Tuček
    Pages 141-150
  12. Usability of Software Intrusion-Detection System in Web Applications
    Radek Vala, David Malaník, Roman Jašek
    Pages 159-166
  13. Correlation Approach for SQL Injection Attacks Detection
    Michał Choraś, Rafał Kozik, Damian Puchalski, Witold Hołubowicz
    Pages 177-185
  14. Information Exchange Mechanism between Federated Domains: P2P Approach
    Michał Choraś, Rafał Kozik, Rafał Renk, Witold Hołubowicz
    Pages 187-196

About these proceedings

Introduction

This volume of Advances in Intelligent and Soft Computing contains accepted papers presented at CISIS 2012 and ICEUTE 2012, both conferences held in the beautiful and historic city of Ostrava (Czech Republic), in September 2012.

CISIS aims to offer a meeting opportunity for academic and industry-related researchers belonging to the various, vast communities of Computational Intelligence, Information Security, and Data Mining. The need for intelligent, flexible behaviour by large, complex systems, especially in mission-critical domains, is intended to be the catalyst and the aggregation stimulus for the overall event.

After a through peer-review process, the CISIS 2012 International Program Committee selected 30 papers which are published in these conference proceedings achieving an acceptance rate of 40%.

In the case of ICEUTE 2012, the International Program Committee selected 4 papers which are published in these conference proceedings.

The selection of papers was extremely rigorous in order to maintain the high quality of the conference and we would like to thank the members of the Program Committees for their hard work in the reviewing process. This is a crucial process to the creation of a high standard conference and the CISIS and ICEUTE conferences would not exist without their help.

Keywords

Computational Intelligence Computational Intelligence in Security Education Security for Information Systems

Editors and affiliations

  • Álvaro Herrero
    • 1
  • Václav Snášel
    • 2
  • Ajith Abraham
    • 3
  • Ivan Zelinka
    • 4
  • Bruno Baruque
    • 5
  • Héctor Quintián
    • 6
  • José Luis Calvo
    • 7
  • Javier Sedano
    • 8
  • Emilio Corchado
    • 9
  1. 1., Department of Civil EngineeringUniversity of BurgosBurgosSpain
  2. 2.VŠB-TU OstravaOstravaCzech Republic
  3. 3.MIR Labs, Scientific Network for InnovationMachine Intelligence Research LabsAuburnUSA
  4. 4.VŠB-TU OstravaOstravaCzech Republic
  5. 5., Department of Civil EngineeringUniversity of BurgosBurgosSpain
  6. 6.Universidad de SalamancaSalamancaSpain
  7. 7.University of CoruñaCoruñaSpain
  8. 8.y León, Pol. Ind. VillalonquéjarInstituto Tecnológico de CastillaBurgosSpain
  9. 9.Universidad de SalamancaSalamancaSpain

Bibliographic information

  • Copyright Information Springer-Verlag Berlin Heidelberg 2013
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Engineering
  • Print ISBN 978-3-642-33017-9
  • Online ISBN 978-3-642-33018-6
  • Series Print ISSN 2194-5357
  • Series Online ISSN 2194-5365