//]]>

Computational Intelligence in Security for Information Systems 2010 (Record no. 11384)

000 -LEADER
fixed length control field 04933nam a22004335i 4500
003 - CONTROL NUMBER IDENTIFIER
control field OSt
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20140310143345.0
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION
fixed length control field cr nn 008mamaa
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 101007s2010 gw | s |||| 0|eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9783642166266
978-3-642-16626-6
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 006.3
Edition number 23
264 #1 -
-- Berlin, Heidelberg :
-- Springer Berlin Heidelberg,
-- 2010.
912 ## -
-- ZDB-2-ENG
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Herrero, Álvaro.
Relator term editor.
245 10 - IMMEDIATE SOURCE OF ACQUISITION NOTE
Title Computational Intelligence in Security for Information Systems 2010
Medium [electronic resource] :
Remainder of title Proceedings of the 3rd International Conference on Computational Intelligence in Security for Information Systems (CISIS’10) /
Statement of responsibility, etc edited by Álvaro Herrero, Emilio Corchado, Carlos Redondo, Ángel Alonso.
300 ## - PHYSICAL DESCRIPTION
Extent 230p. 70 illus.
Other physical details online resource.
440 1# - SERIES STATEMENT/ADDED ENTRY--TITLE
Title Advances in Intelligent and Soft Computing,
International Standard Serial Number 1867-5662 ;
Volume number/sequential designation 85
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note 1: Machine Learning and Intelligence -- An Incremental Density-Based Clustering Technique for Large Datasets -- BSDT ROC and Cognitive Learning Hypothesis -- Evolving Fuzzy Classifier for Data Mining - an Information Retrieval Approach -- Mereotopological Analysis of Formal Concepts in Security Ontologies -- 2: Agents and Multi-Agent Systems -- A Multi-agent Data Mining System for Defect Forecasting in a Decentralized Manufacturing Environment -- A Distributed Hierarchical Multi-agent Architecture for Detecting Injections in SQL Queries -- Incorporating Temporal Constraints in the Analysis Task of a Hybrid Intelligent IDS -- 3: Image, Video and Speech Processing -- Performances of Speech Signal Biometric Systems Based on Signal to Noise Ratio Degradation -- Lipreading Using n–Gram Feature Vector -- Face Processing for Security: A Short Review -- 4: Network Security -- Ontologies-Based Automated Intrusion Response System -- Semi-supervised Fingerprinting of Protocol Messages -- Monitoring of Spatial-Aggregated IP-Flow Records -- Improving Network Security through Traffic Log Anomaly Detection Using Time Series Analysis -- A Threat Model Approach to Threats and Vulnerabilities in On-line Social Networks -- An SLA-Based Approach for Network Anomaly Detection -- Understanding Honeypot Data by an Unsupervised Neural Visualization -- 5: Watermarking -- Permuted Image DCT Watermarking -- A Developed WaterMark Technique for Distributed Database Security -- 6: Cryptography -- Trident, a New Pseudo Random Number Generator Based on Coupled Chaotic Maps -- The Impact of the SHA-3 Casting Cryptography Competition on the Spanish IT Market -- 7: Industrial and Commercial Applications of Intelligent Methods for Security -- A New Task Engineering Approach for Workflow Access Control -- OPBUS: Fault Tolerance Against Integrity Attacks in Business Processes -- A Key Distribution Scheme for Live Streaming Multi-tree Overlays -- Intelligent Methods for Scheduling in Transportation.
520 ## - SUMMARY, ETC.
Summary, etc This volume of Advances in Intelligent and Soft Computing contains accepted papers presented at the 3rd International Conference on Computational Intelligence in Security for Information Systems (CISIS'10), which was held in the beautiful and historic city of León, Spain, in November, 2010.   Since it origin, the main aim of CISIS conferences has been to establish a broad and interdisciplinary forum for Computational Intelligence and Associated Learning Paradigms, which are playing increasingly important roles in a large number of application areas related to Security in Information Systems.   CISIS'10  provided a broad and interdisciplinary forum to present the most recent developments in several very active scientific areas such as Machine Learning, Infrastructure Protection, Intelligent Methods in Energy and Transportation, Network Security, Biometry, Cryptography, High-performance and Grid Computing, and Industrial Perspective among others. The global purpose of the CISIS series of conferences has been to form a broad and interdisciplinary meeting ground offering the opportunity to interact with the leading research team and industries actively involved in the critical area of security, and have a picture of the current solutions adopted in practical domains.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Engineering.
Topical term or geographic name as entry element Artificial intelligence.
Topical term or geographic name as entry element Engineering.
Topical term or geographic name as entry element Computational Intelligence.
Topical term or geographic name as entry element Artificial Intelligence (incl. Robotics).
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Corchado, Emilio.
Relator term editor.
Personal name Redondo, Carlos.
Relator term editor.
Personal name Alonso, Ángel.
Relator term editor.
710 2# - ADDED ENTRY--CORPORATE NAME
Corporate name or jurisdiction name as entry element SpringerLink (Online service)
773 0# - HOST ITEM ENTRY
Title Springer eBooks
776 08 - ADDITIONAL PHYSICAL FORM ENTRY
Display text Printed edition:
International Standard Book Number 9783642166259
856 40 - ELECTRONIC LOCATION AND ACCESS
Uniform Resource Identifier http://dx.doi.org/10.1007/978-3-642-16626-6
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Source of classification or shelving scheme
Item type E-Book
Copies
Price effective from Permanent location Date last seen Not for loan Date acquired Source of classification or shelving scheme Koha item type Damaged status Lost status Withdrawn status Current location Full call number
2014-04-01AUM Main Library2014-04-01 2014-04-01 E-Book   AUM Main Library006.3