Listing 1 - 10 of 46 | << page >> |
Sort by
|
Choose an application
This volume of Advances in Intelligent and Soft Computing contains accepted papers presented at CISIS 2012 and ICEUTE 2012, both conferences held in the beautiful and historic city of Ostrava (Czech Republic), in September 2012. CISIS aims to offer a meeting opportunity for academic and industry-related researchers belonging to the various, vast communities of Computational Intelligence, Information Security, and Data Mining. The need for intelligent, flexible behaviour by large, complex systems, especially in mission-critical domains, is intended to be the catalyst and the aggregation stimulus for the overall event. After a through peer-review process, the CISIS 2012 International Program Committee selected 30 papers which are published in these conference proceedings achieving an acceptance rate of 40%. In the case of ICEUTE 2012, the International Program Committee selected 4 papers which are published in these conference proceedings. The selection of papers was extremely rigorous in order to maintain the high quality of the conference and we would like to thank the members of the Program Committees for their hard work in the reviewing process. This is a crucial process to the creation of a high standard conference and the CISIS and ICEUTE conferences would not exist without their help.
Artificial intelligence -- Congresses. --- Computational intelligence -- Congresses. --- Computer security -- Congresses. --- Intelligent agents (Computer software) -- Congresses. --- Computer networks --- Data mining --- Soft computing --- Engineering & Applied Sciences --- Electrical & Computer Engineering --- Telecommunications --- Computer Science --- Security measures --- Computer security --- Computational intelligence --- Engineering. --- Artificial intelligence. --- Computational intelligence. --- Computational Intelligence. --- Artificial Intelligence (incl. Robotics). --- Intelligence, Computational --- Artificial intelligence --- AI (Artificial intelligence) --- Artificial thinking --- Electronic brains --- Intellectronics --- Intelligence, Artificial --- Intelligent machines --- Machine intelligence --- Thinking, Artificial --- Bionics --- Cognitive science --- Digital computer simulation --- Electronic data processing --- Logic machines --- Machine theory --- Self-organizing systems --- Simulation methods --- Fifth generation computers --- Neural computers --- Construction --- Industrial arts --- Technology --- Artificial Intelligence.
Choose an application
This monograph comprises work on network-based Intrusion Detection (ID) that is grounded in visualisation and hybrid Artificial Intelligence (AI). It has led to the design of MOVICAB-IDS (MObile VIsualisation Connectionist Agent-Based IDS), a novel Intrusion Detection System (IDS), which is comprehensively described in this book. This novel IDS combines different AI paradigms to visualise network traffic for ID at packet level. It is based on a dynamic Multiagent System (MAS), which integrates an unsupervised neural projection model and the Case-Based Reasoning (CBR) paradigm through the use of deliberative agents that are capable of learning and evolving with the environment. The proposed novel hybrid IDS provides security personnel with a synthetic, intuitive snapshot of network traffic and protocol interactions. This visualisation interface supports the straightforward detection of anomalous situations and their subsequent identification. The performance of MOVICAB-IDS was tested through a novel mutation-based testing method in different real domains which entailed several attacks and anomalous situations.
Electrical & Computer Engineering --- Engineering & Applied Sciences --- Telecommunications --- Computer Science --- Computer networks --- Artificial intelligence. --- Security measures. --- AI (Artificial intelligence) --- Artificial thinking --- Electronic brains --- Intellectronics --- Intelligence, Artificial --- Intelligent machines --- Machine intelligence --- Thinking, Artificial --- Computer network security --- Network security, Computer --- Security of computer networks --- Engineering. --- Computational intelligence. --- Computational Intelligence. --- Artificial Intelligence (incl. Robotics). --- Bionics --- Cognitive science --- Digital computer simulation --- Electronic data processing --- Logic machines --- Machine theory --- Self-organizing systems --- Simulation methods --- Fifth generation computers --- Neural computers --- Intelligence, Computational --- Artificial intelligence --- Soft computing --- Construction --- Industrial arts --- Technology --- Computer security --- Artificial Intelligence.
Choose an application
Artificial intelligence. Robotics. Simulation. Graphics --- neuronale netwerken --- fuzzy logic --- cybernetica --- KI (kunstmatige intelligentie) --- robots
Choose an application
Complex analysis --- Computer architecture. Operating systems --- Information systems --- Computer. Automation --- ICT (informatie- en communicatietechnieken) --- IR (information retrieval) --- complexe analyse (wiskunde) --- informatiesystemen --- computerbeveiliging --- informatica management --- computernetwerken
Choose an application
This book constitutes the refereed proceedings of the 4th International Conference on Computational Intelligence in Security for Information Systems, CISIS 2011, held in Torremolinos-Málaga, in June 2011 as a satellite event of IWANN 2011, the International Work-Conference on Artificial and Natural Neural Networks. The 38 revised full papers presented were carefully reviewed and selected from a total of 70 submissions. The papers are organized in topical sections on machine learning and intelligence, network security, cryptography, securing software, and applications of intelligent methods for security.
Computer security --- Engineering & Applied Sciences --- Computer Science --- Information technology --- Security measures --- IT (Information technology) --- Computer science. --- Computer communication systems. --- Computer security. --- Algorithms. --- Information storage and retrieval. --- Management information systems. --- Computer Science. --- Systems and Data Security. --- Information Systems Applications (incl. Internet). --- Computer Communication Networks. --- Algorithm Analysis and Problem Complexity. --- Information Storage and Retrieval. --- Management of Computing and Information Systems. --- Computer-based information systems --- EIS (Information systems) --- Executive information systems --- MIS (Information systems) --- Sociotechnical systems --- Information resources management --- Management --- Algorism --- Algebra --- Arithmetic --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Informatics --- Science --- Communication systems --- Foundations --- Protection --- Distributed processing --- Technology --- Telematics --- Information superhighway --- Knowledge management --- Computer software. --- Information storage and retrieva. --- Information Systems. --- Information retrieval. --- Software, Computer --- Data retrieval --- Data storage --- Discovery, Information --- Information discovery --- Information storage and retrieval --- Retrieval of information --- Documentation --- Information science --- Information storage and retrieval systems --- Information storage and retrieval systems. --- Automatic data storage --- Automatic information retrieval --- Automation in documentation --- Data processing systems --- Data storage and retrieval systems --- Discovery systems, Information --- Information discovery systems --- Information processing systems --- Information retrieval systems --- Machine data storage and retrieval --- Mechanized information storage and retrieval systems --- Electronic information resources --- Data libraries --- Digital libraries --- Information organization --- Information retrieval --- Application software. --- Application computer programs --- Application computer software --- Applications software --- Apps (Computer software) --- Computer software
Choose an application
This monograph comprises work on network-based Intrusion Detection (ID) that is grounded in visualisation and hybrid Artificial Intelligence (AI). It has led to the design of MOVICAB-IDS (MObile VIsualisation Connectionist Agent-Based IDS), a novel Intrusion Detection System (IDS), which is comprehensively described in this book. This novel IDS combines different AI paradigms to visualise network traffic for ID at packet level. It is based on a dynamic Multiagent System (MAS), which integrates an unsupervised neural projection model and the Case-Based Reasoning (CBR) paradigm through the use of deliberative agents that are capable of learning and evolving with the environment. The proposed novel hybrid IDS provides security personnel with a synthetic, intuitive snapshot of network traffic and protocol interactions. This visualisation interface supports the straightforward detection of anomalous situations and their subsequent identification. The performance of MOVICAB-IDS was tested through a novel mutation-based testing method in different real domains which entailed several attacks and anomalous situations.
Artificial intelligence. Robotics. Simulation. Graphics --- neuronale netwerken --- fuzzy logic --- cybernetica --- KI (kunstmatige intelligentie) --- robots
Choose an application
This book constitutes the refereed proceedings of the 4th International Conference on Computational Intelligence in Security for Information Systems, CISIS 2011, held in Torremolinos-Málaga, in June 2011 as a satellite event of IWANN 2011, the International Work-Conference on Artificial and Natural Neural Networks. The 38 revised full papers presented were carefully reviewed and selected from a total of 70 submissions. The papers are organized in topical sections on machine learning and intelligence, network security, cryptography, securing software, and applications of intelligent methods for security.
Complex analysis --- Computer architecture. Operating systems --- Information systems --- Computer. Automation --- ICT (informatie- en communicatietechnieken) --- IR (information retrieval) --- complexe analyse (wiskunde) --- informatiesystemen --- computerbeveiliging --- informatica management --- computernetwerken
Choose an application
This volume of Advances in Intelligent and Soft Computing contains accepted papers presented at the 8th International Conference on Computational Intelligence in Security for Information Systems (CISIS 2015) and the 6th International Conference on EUropean Transnational Education (ICEUTE 2015). These conferences were held in the beautiful and historic city of Burgos (Spain), in June 2015. The aim of the 8th CISIS conference is to offer a meeting opportunity for academic and industry-related researchers belonging to the various, vast communities of Computational Intelligence, Information Security, and Data Mining. The need for intelligent, flexible behaviour by large, complex systems, especially in mission-critical domains, is intended to be the catalyst and the aggregation stimulus for the overall event. After a through peer-review process, the CISIS 2015 International Program Committee selected 43 papers, written by authors from 16 different countries. In the case of 6th ICEUTE conference, the International Program Committee selected 12 papers (from 7 countries). These papers are published in present conference proceedings, achieving an acceptance rate of about 39%. The selection of papers was extremely rigorous in order to maintain the high quality of the conference and we would like to thank the members of the Program Committees for their hard work in the reviewing process. This is a crucial process to the creation of a high standard conference and the CISIS and ICEUTE conferences would not exist without their help.
Engineering. --- Computational Intelligence. --- Artificial Intelligence (incl. Robotics). --- Higher Education. --- Data Mining and Knowledge Discovery. --- Data mining. --- Artificial intelligence. --- Education, Higher. --- Ingénierie --- Exploration de données (Informatique) --- Intelligence artificielle --- Enseignement supérieur --- Engineering & Applied Sciences --- Computer Science --- Computer networks --- Computer security --- Computational intelligence --- Security measures --- Higher education. --- Computational intelligence. --- Intelligence, Computational --- Artificial intelligence --- Soft computing --- College students --- Higher education --- Postsecondary education --- Universities and colleges --- AI (Artificial intelligence) --- Artificial thinking --- Electronic brains --- Intellectronics --- Intelligence, Artificial --- Intelligent machines --- Machine intelligence --- Thinking, Artificial --- Bionics --- Cognitive science --- Digital computer simulation --- Electronic data processing --- Logic machines --- Machine theory --- Self-organizing systems --- Simulation methods --- Fifth generation computers --- Neural computers --- Algorithmic knowledge discovery --- Factual data analysis --- KDD (Information retrieval) --- Knowledge discovery in data --- Knowledge discovery in databases --- Mining, Data --- Database searching --- Construction --- Industrial arts --- Technology --- Education --- Artificial Intelligence.
Choose an application
This volume of Advances in Intelligent and Soft Computing contains accepted papers presented at the 10th International Conference on Soft Computing Models in Industrial and Environmental Applications (SOCO 2015), held in the beautiful and historic city of Burgos (Spain), in June 2015. Soft computing represents a collection or set of computational techniques in machine learning, computer science and some engineering disciplines, which investigate, simulate, and analyze very complex issues and phenomena. This Conference is mainly focused on its industrial and environmental applications. After a through peer-review process, the SOCO 2015 International Program Committee selected 41 papers, written by authors from 15 different countries. These papers are published in present conference proceedings, achieving an acceptance rate of 40%. The selection of papers was extremely rigorous in order to maintain the high quality of the conference and we would like to thank the members of the International Program Committees for their hard work during the review process. This is a crucial issue for creation of a high standard conference, and the SOCO conference would not exist without their help.
Engineering. --- Computational Intelligence. --- Artificial Intelligence (incl. Robotics). --- Artificial intelligence. --- Ingénierie --- Intelligence artificielle --- Engineering & Applied Sciences --- Computer Science --- Soft computing --- Computational intelligence. --- Intelligence, Computational --- Artificial intelligence --- AI (Artificial intelligence) --- Artificial thinking --- Electronic brains --- Intellectronics --- Intelligence, Artificial --- Intelligent machines --- Machine intelligence --- Thinking, Artificial --- Bionics --- Cognitive science --- Digital computer simulation --- Electronic data processing --- Logic machines --- Machine theory --- Self-organizing systems --- Simulation methods --- Fifth generation computers --- Neural computers --- Construction --- Industrial arts --- Technology --- Artificial Intelligence.
Choose an application
Listing 1 - 10 of 46 | << page >> |
Sort by
|