Listing 1 - 10 of 35 | << page >> |
Sort by
|
Choose an application
This monograph comprises work on network-based Intrusion Detection (ID) that is grounded in visualisation and hybrid Artificial Intelligence (AI). It has led to the design of MOVICAB-IDS (MObile VIsualisation Connectionist Agent-Based IDS), a novel Intrusion Detection System (IDS), which is comprehensively described in this book. This novel IDS combines different AI paradigms to visualise network traffic for ID at packet level. It is based on a dynamic Multiagent System (MAS), which integrates an unsupervised neural projection model and the Case-Based Reasoning (CBR) paradigm through the use of deliberative agents that are capable of learning and evolving with the environment. The proposed novel hybrid IDS provides security personnel with a synthetic, intuitive snapshot of network traffic and protocol interactions. This visualisation interface supports the straightforward detection of anomalous situations and their subsequent identification. The performance of MOVICAB-IDS was tested through a novel mutation-based testing method in different real domains which entailed several attacks and anomalous situations.
Electrical & Computer Engineering --- Engineering & Applied Sciences --- Telecommunications --- Computer Science --- Computer networks --- Artificial intelligence. --- Security measures. --- AI (Artificial intelligence) --- Artificial thinking --- Electronic brains --- Intellectronics --- Intelligence, Artificial --- Intelligent machines --- Machine intelligence --- Thinking, Artificial --- Computer network security --- Network security, Computer --- Security of computer networks --- Engineering. --- Computational intelligence. --- Computational Intelligence. --- Artificial Intelligence (incl. Robotics). --- Bionics --- Cognitive science --- Digital computer simulation --- Electronic data processing --- Logic machines --- Machine theory --- Self-organizing systems --- Simulation methods --- Fifth generation computers --- Neural computers --- Intelligence, Computational --- Artificial intelligence --- Soft computing --- Construction --- Industrial arts --- Technology --- Computer security --- Artificial Intelligence.
Choose an application
This book constitutes the refereed proceedings of the 4th International Conference on Computational Intelligence in Security for Information Systems, CISIS 2011, held in Torremolinos-Málaga, in June 2011 as a satellite event of IWANN 2011, the International Work-Conference on Artificial and Natural Neural Networks. The 38 revised full papers presented were carefully reviewed and selected from a total of 70 submissions. The papers are organized in topical sections on machine learning and intelligence, network security, cryptography, securing software, and applications of intelligent methods for security.
Computer security --- Engineering & Applied Sciences --- Computer Science --- Information technology --- Security measures --- IT (Information technology) --- Computer science. --- Computer communication systems. --- Computer security. --- Algorithms. --- Information storage and retrieval. --- Management information systems. --- Computer Science. --- Systems and Data Security. --- Information Systems Applications (incl. Internet). --- Computer Communication Networks. --- Algorithm Analysis and Problem Complexity. --- Information Storage and Retrieval. --- Management of Computing and Information Systems. --- Computer-based information systems --- EIS (Information systems) --- Executive information systems --- MIS (Information systems) --- Sociotechnical systems --- Information resources management --- Management --- Algorism --- Algebra --- Arithmetic --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Informatics --- Science --- Communication systems --- Foundations --- Protection --- Distributed processing --- Technology --- Telematics --- Information superhighway --- Knowledge management --- Computer software. --- Information storage and retrieva. --- Information Systems. --- Information retrieval. --- Software, Computer --- Data retrieval --- Data storage --- Discovery, Information --- Information discovery --- Information storage and retrieval --- Retrieval of information --- Documentation --- Information science --- Information storage and retrieval systems --- Information storage and retrieval systems. --- Automatic data storage --- Automatic information retrieval --- Automation in documentation --- Data processing systems --- Data storage and retrieval systems --- Discovery systems, Information --- Information discovery systems --- Information processing systems --- Information retrieval systems --- Machine data storage and retrieval --- Mechanized information storage and retrieval systems --- Electronic information resources --- Data libraries --- Digital libraries --- Information organization --- Information retrieval --- Application software. --- Application computer programs --- Application computer software --- Applications software --- Apps (Computer software) --- Computer software
Choose an application
This monograph comprises work on network-based Intrusion Detection (ID) that is grounded in visualisation and hybrid Artificial Intelligence (AI). It has led to the design of MOVICAB-IDS (MObile VIsualisation Connectionist Agent-Based IDS), a novel Intrusion Detection System (IDS), which is comprehensively described in this book. This novel IDS combines different AI paradigms to visualise network traffic for ID at packet level. It is based on a dynamic Multiagent System (MAS), which integrates an unsupervised neural projection model and the Case-Based Reasoning (CBR) paradigm through the use of deliberative agents that are capable of learning and evolving with the environment. The proposed novel hybrid IDS provides security personnel with a synthetic, intuitive snapshot of network traffic and protocol interactions. This visualisation interface supports the straightforward detection of anomalous situations and their subsequent identification. The performance of MOVICAB-IDS was tested through a novel mutation-based testing method in different real domains which entailed several attacks and anomalous situations.
Artificial intelligence. Robotics. Simulation. Graphics --- neuronale netwerken --- fuzzy logic --- cybernetica --- KI (kunstmatige intelligentie) --- robots
Choose an application
This book constitutes the refereed proceedings of the 4th International Conference on Computational Intelligence in Security for Information Systems, CISIS 2011, held in Torremolinos-Málaga, in June 2011 as a satellite event of IWANN 2011, the International Work-Conference on Artificial and Natural Neural Networks. The 38 revised full papers presented were carefully reviewed and selected from a total of 70 submissions. The papers are organized in topical sections on machine learning and intelligence, network security, cryptography, securing software, and applications of intelligent methods for security.
Complex analysis --- Computer architecture. Operating systems --- Information systems --- Computer. Automation --- ICT (informatie- en communicatietechnieken) --- IR (information retrieval) --- complexe analyse (wiskunde) --- informatiesystemen --- computerbeveiliging --- informatica management --- computernetwerken
Choose an application
This volume of Advances in Intelligent and Soft Computing contains accepted papers presented at the 8th International Conference on Computational Intelligence in Security for Information Systems (CISIS 2015) and the 6th International Conference on EUropean Transnational Education (ICEUTE 2015). These conferences were held in the beautiful and historic city of Burgos (Spain), in June 2015. The aim of the 8th CISIS conference is to offer a meeting opportunity for academic and industry-related researchers belonging to the various, vast communities of Computational Intelligence, Information Security, and Data Mining. The need for intelligent, flexible behaviour by large, complex systems, especially in mission-critical domains, is intended to be the catalyst and the aggregation stimulus for the overall event. After a through peer-review process, the CISIS 2015 International Program Committee selected 43 papers, written by authors from 16 different countries. In the case of 6th ICEUTE conference, the International Program Committee selected 12 papers (from 7 countries). These papers are published in present conference proceedings, achieving an acceptance rate of about 39%. The selection of papers was extremely rigorous in order to maintain the high quality of the conference and we would like to thank the members of the Program Committees for their hard work in the reviewing process. This is a crucial process to the creation of a high standard conference and the CISIS and ICEUTE conferences would not exist without their help.
Engineering. --- Computational Intelligence. --- Artificial Intelligence (incl. Robotics). --- Higher Education. --- Data Mining and Knowledge Discovery. --- Data mining. --- Artificial intelligence. --- Education, Higher. --- Ingénierie --- Exploration de données (Informatique) --- Intelligence artificielle --- Enseignement supérieur --- Engineering & Applied Sciences --- Computer Science --- Computer networks --- Computer security --- Computational intelligence --- Security measures --- Higher education. --- Computational intelligence. --- Intelligence, Computational --- Artificial intelligence --- Soft computing --- College students --- Higher education --- Postsecondary education --- Universities and colleges --- AI (Artificial intelligence) --- Artificial thinking --- Electronic brains --- Intellectronics --- Intelligence, Artificial --- Intelligent machines --- Machine intelligence --- Thinking, Artificial --- Bionics --- Cognitive science --- Digital computer simulation --- Electronic data processing --- Logic machines --- Machine theory --- Self-organizing systems --- Simulation methods --- Fifth generation computers --- Neural computers --- Algorithmic knowledge discovery --- Factual data analysis --- KDD (Information retrieval) --- Knowledge discovery in data --- Knowledge discovery in databases --- Mining, Data --- Database searching --- Construction --- Industrial arts --- Technology --- Education --- Artificial Intelligence.
Choose an application
This volume of Advances in Intelligent and Soft Computing contains accepted papers presented at the 10th International Conference on Soft Computing Models in Industrial and Environmental Applications (SOCO 2015), held in the beautiful and historic city of Burgos (Spain), in June 2015. Soft computing represents a collection or set of computational techniques in machine learning, computer science and some engineering disciplines, which investigate, simulate, and analyze very complex issues and phenomena. This Conference is mainly focused on its industrial and environmental applications. After a through peer-review process, the SOCO 2015 International Program Committee selected 41 papers, written by authors from 15 different countries. These papers are published in present conference proceedings, achieving an acceptance rate of 40%. The selection of papers was extremely rigorous in order to maintain the high quality of the conference and we would like to thank the members of the International Program Committees for their hard work during the review process. This is a crucial issue for creation of a high standard conference, and the SOCO conference would not exist without their help.
Engineering. --- Computational Intelligence. --- Artificial Intelligence (incl. Robotics). --- Artificial intelligence. --- Ingénierie --- Intelligence artificielle --- Engineering & Applied Sciences --- Computer Science --- Soft computing --- Computational intelligence. --- Intelligence, Computational --- Artificial intelligence --- AI (Artificial intelligence) --- Artificial thinking --- Electronic brains --- Intellectronics --- Intelligence, Artificial --- Intelligent machines --- Machine intelligence --- Thinking, Artificial --- Bionics --- Cognitive science --- Digital computer simulation --- Electronic data processing --- Logic machines --- Machine theory --- Self-organizing systems --- Simulation methods --- Fifth generation computers --- Neural computers --- Construction --- Industrial arts --- Technology --- Artificial Intelligence.
Choose an application
This volume of Advances in Intelligent and Soft Computing contains accepted papers presented at SOCO 2013, CISIS 2013 and ICEUTE 2013, all conferences held in the beautiful and historic city of Salamanca (Spain), in September 2013. Soft computing represents a collection or set of computational techniques in machine learning, computer science and some engineering disciplines, which investigate, simulate, and analyze very complex issues and phenomena. After a through peer-review process, the 8th SOCO 2013 International Program Committee selected 40 papers which are published in these conference proceedings, and represents an acceptance rate of 41%. In this relevant edition a special emphasis was put on the organization of special sessions. Four special sessions were organized related to relevant topics as: Systems, Man, and Cybernetics, Data Mining for Industrial and Environmental Applications, Soft Computing Methods in Bioinformatics, and Soft Computing Methods, Modelling and Simulation in Electrical Engineer. The aim of the 6th CISIS 2013 conference is to offer a meeting opportunity for academic and industry-related researchers belonging to the various, vast communities of Computational Intelligence, Information Security, and Data Mining. The need for intelligent, flexible behaviour by large, complex systems, especially in mission-critical domains, is intended to be the catalyst and the aggregation stimulus for the overall event. After a through peer-review process, the CISIS 2013 International Program Committee selected 23 papers which are published in these conference proceedings achieving an acceptance rate of 39%. In the case of 4th ICEUTE 2013, the International Program Committee selected 11 papers which are published in these conference proceedings. The selection of papers was extremely rigorous in order to maintain the high quality of the conference and we would like to thank the members of the Program Committees for their hard work in the reviewing process. This is a crucial process to the creation of a high standard conference and the SOCO, CISIS and ICEUTE conferences would not exist without their help. .
Computer networks --- Data mining --- Soft computing --- Security measures --- Engineering. --- Artificial intelligence. --- Computational intelligence. --- Computational Intelligence. --- Artificial Intelligence (incl. Robotics). --- Intelligence, Computational --- Artificial intelligence --- AI (Artificial intelligence) --- Artificial thinking --- Electronic brains --- Intellectronics --- Intelligence, Artificial --- Intelligent machines --- Machine intelligence --- Thinking, Artificial --- Bionics --- Cognitive science --- Digital computer simulation --- Electronic data processing --- Logic machines --- Machine theory --- Self-organizing systems --- Simulation methods --- Fifth generation computers --- Neural computers --- Construction --- Industrial arts --- Technology --- Artificial Intelligence.
Choose an application
This volume of Advances in Intelligent and Soft Computing contains accepted papers presented at SOCO 2016, CISIS 2016 and ICEUTE 2016, all conferences held in the beautiful and historic city of San Sebastián (Spain), in October 2016. Soft computing represents a collection or set of computational techniques in machine learning, computer science and some engineering disciplines, which investigate, simulate, and analyze very complex issues and phenomena. After a through peer-review process, the 11th SOCO 2016 International Program Committee selected 45 papers. In this relevant edition a special emphasis was put on the organization of special sessions. Two special session was organized related to relevant topics as: Optimization, Modeling and Control Systems by Soft Computing and Soft Computing Methods in Manufacturing and Management Systems. The aim of the 9th CISIS 2016 conference is to offer a meeting opportunity for academic and industry-related researchers belonging to the various, vast communities of Computational Intelligence, Information Security, and Data Mining. The need for intelligent, flexible behaviour by large, complex systems, especially in mission-critical domains, is intended to be the catalyst and the aggregation stimulus for the overall event. After a through peer-review process, the CISIS 2016 International Program Committee selected 20 papers. In the case of 7th ICEUTE 2016, the International Program Committee selected 14 papers.
Engineering. --- Artificial intelligence. --- Computational intelligence. --- Computational Intelligence. --- Artificial Intelligence (incl. Robotics). --- Artificial intelligence --- Soft computing --- Intelligence, Computational --- AI (Artificial intelligence) --- Artificial thinking --- Electronic brains --- Intellectronics --- Intelligence, Artificial --- Intelligent machines --- Machine intelligence --- Thinking, Artificial --- Bionics --- Cognitive science --- Digital computer simulation --- Electronic data processing --- Logic machines --- Machine theory --- Self-organizing systems --- Simulation methods --- Fifth generation computers --- Neural computers --- Construction --- Industrial arts --- Technology --- Artificial Intelligence.
Choose an application
This book contains accepted papers presented at SOCO 2020 conference held in the beautiful and historic city of Burgos (Spain), in September 2020. Soft computing represents a collection or set of computational techniques in machine learning, computer science and some engineering disciplines, which investigate, simulate, and analyze very complex issues and phenomena. After a through peer-review process, the SOCO 2020 International Program Committee selected 83 papers which are published in these conference proceedings and represents an acceptance rate of 35%. Due to the COVID-19 outbreak, the SOCO 2020 edition was blended, combining on-site and on-line participation. In this relevant edition a special emphasis was put on the organization of special sessions. Eleven special session were organized related to relevant topics such as: Soft Computing Applications in Precision Agriculture, Manufacturing and Management Systems, Management of Industrial and Environmental Enterprises, Logistics and Transportation Systems, Robotics and Autonomous Vehicles, Computer Vision, Laser-Based Sensing and Measurement and other topics such as Forecasting Industrial Time Series, IoT, Big Data and Cyber Physical Systems, Non-linear Dynamical Systems and Fluid Dynamics, Modeling and Control systems The selection of papers was extremely rigorous in order to maintain the high quality of SOCO conference editions and we would like to thank the members of the Program Committees for their hard work in the reviewing process. This is a crucial process to the creation of a high standard conference and the SOCO conference would not exist without their help.
Computational intelligence. --- Industrial engineering. --- Production engineering. --- Computational Intelligence. --- Industrial and Production Engineering. --- Manufacturing engineering --- Process engineering --- Industrial engineering --- Mechanical engineering --- Management engineering --- Simplification in industry --- Engineering --- Value analysis (Cost control) --- Intelligence, Computational --- Artificial intelligence --- Soft computing --- Computational intelligence --- Transnational education --- Offshore higher education --- TNE (Education) --- Transnational higher education --- Education, Higher
Choose an application
This book contains accepted papers presented at CISIS 2020 held in the beautiful and historic city of Burgos (Spain), in September 2020. The aim of the CISIS 2020 conference is to offer a meeting opportunity for academic and industry-related researchers belonging to the various, vast communities of computational intelligence, information security, and data mining. The need for intelligent, flexible behaviour by large, complex systems, especially in mission-critical domains, is intended to be the catalyst and the aggregation stimulus for the overall event. After a thorough peer-review process, the CISIS 2020 International Program Committee selected 43 papers which are published in these conference proceedings achieving an acceptance rate of 28%. Due to the COVID-19 outbreak, the CISIS 2020 edition was blended, combining on-site and on-line participation. In this relevant edition, a special emphasis was put on the organization of five special sessions related to relevant topics as Fake News Detection and Prevention, Mathematical Methods and Models in Cybersecurity, Measurements for a Dynamic Cyber-Risk Assessment, Cybersecurity in a Hybrid Quantum World, Anomaly/Intrusion Detection, and From the least to the least: cryptographic and data analytics solutions to fulfil least minimum privilege and endorse least minimum effort in information systems. The selection of papers was extremely rigorous in order to maintain the high quality of the conference and we would like to thank the members of the Program Committees for their hard work in the reviewing process. This is a crucial process to the creation of a high standard conference, and the CISIS conference would not exist without their help.
Computational intelligence. --- Engineering—Data processing. --- Computer security. --- Computational Intelligence. --- Data Engineering. --- Systems and Data Security. --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Intelligence, Computational --- Artificial intelligence --- Soft computing --- Protection --- Security measures --- Computational intelligence --- Computer networks --- Computer security
Listing 1 - 10 of 35 | << page >> |
Sort by
|