Proceedings of the International Workshop on Computational Intelligence in Security for Information Systems CISIS 2008


Book Description

The research scenario in advanced systems for protecting critical infrastructures and for deeply networked information tools highlights a growing link between security issues and the need for intelligent processing abilities in the area of information s- tems. To face the ever-evolving nature of cyber-threats, monitoring systems must have adaptive capabilities for continuous adjustment and timely, effective response to modifications in the environment. Moreover, the risks of improper access pose the need for advanced identification methods, including protocols to enforce comput- security policies and biometry-related technologies for physical authentication. C- putational Intelligence methods offer a wide variety of approaches that can be fruitful in those areas, and can play a crucial role in the adaptive process by their ability to learn empirically and adapt a system’s behaviour accordingly. The International Workshop on Computational Intelligence for Security in Inf- mation Systems (CISIS) proposes a meeting ground to the various communities - volved in building intelligent systems for security, namely: information security, data mining, adaptive learning methods and soft computing among others. The main goal is to allow experts and researchers to assess the benefits of learning methods in the data-mining area for information-security applications. The Workshop offers the opportunity to interact with the leading industries actively involved in the critical area of security, and have a picture of the current solutions adopted in practical domains. This volume of Advances in Soft Computing contains accepted papers presented at CISIS’08, which was held in Genova, Italy, on October 23rd–24th, 2008.




Computational Intelligence in Security for Information Systems 2010


Book Description

rd The 3 International Conference on Computational Intelligence in Security for Information Systems (CISIS 2010) provided a broad and interdisciplinary forum to present the most recent developments in several very active scientific areas such as Machine Learning, Infrastructure Protection, Intelligent Methods in Energy and Transportation, Network Security, Biometry, Cryptography, High-performance and Grid Computing, and Industrial Perspective among others. The global purpose of CISIS series of conferences has been to form a broad and interdisciplinary meeting ground offering the opportunity to interact with the leading research team and industries actively involved in the critical area of security, and have a picture of the current solutions adopted in practical domains. This volume of Advances in Intelligence and Soft Computing contains accepted papers presented at CISIS 2010, which was held in León, Spain, on November 11–12, 2010. CISIS 2010 received over 50 technical submissions. After a thorough peer-review process, the International Program Committee - lected 25 papers which are published in this conference proceedings. This allowed the Scientific Committee to verify the vital and crucial nature of the topics - volved in the event, and resulted in an acceptance rate close to 50% of the ori- nally submitted manuscripts.




Computational Intelligence in Security for Information Systems


Book Description

The Second International Workshop on Computational Intelligence for Security in Information Systems (CISIS’09) presented the most recent developments in the - namically expanding realm of several fields such as Data Mining and Intelligence, Infrastructure Protection, Network Security, Biometry and Industrial Perspectives. The International Workshop on Computational Intelligence for Security in Infor- tion Systems (CISIS) proposes a forum to the different communities related to the field of intelligent systems for security. The global purpose of CISIS conferences has been to form a broad and interdisciplinary meeting ground offering the opportunity to interact with the leading industries actively involved in the critical area of security, and have a picture of the current solutions adopted in practical domains. This volume of Advances in Intelligent and Soft Computing contains accepted - rd th pers presented at CISIS’09, which was held in Burgos, Spain, on September 23 -26 , 2009. After a through peer-review process, the International Program Committee selected 25 papers which are published in this workshop proceedings. This allowed the Scientific Committee to verify the vital and crucial nature of the topics involved in the event, and resulted in an acceptance rate close to 50% of the originally submitted manuscripts.




13th International Conference on Computational Intelligence in Security for Information Systems (CISIS 2020)


Book Description

This book contains accepted papers presented at CISIS 2020 held in the beautiful and historic city of Burgos (Spain), in September 2020. The aim of the CISIS 2020 conference is to offer a meeting opportunity for academic and industry-related researchers belonging to the various, vast communities of computational intelligence, information security, and data mining. The need for intelligent, flexible behaviour by large, complex systems, especially in mission-critical domains, is intended to be the catalyst and the aggregation stimulus for the overall event. After a thorough peer-review process, the CISIS 2020 International Program Committee selected 43 papers which are published in these conference proceedings achieving an acceptance rate of 28%. Due to the COVID-19 outbreak, the CISIS 2020 edition was blended, combining on-site and on-line participation. In this relevant edition, a special emphasis was put on the organization of five special sessions related to relevant topics as Fake News Detection and Prevention, Mathematical Methods and Models in Cybersecurity, Measurements for a Dynamic Cyber-Risk Assessment, Cybersecurity in a Hybrid Quantum World, Anomaly/Intrusion Detection, and From the least to the least: cryptographic and data analytics solutions to fulfil least minimum privilege and endorse least minimum effort in information systems. The selection of papers was extremely rigorous in order to maintain the high quality of the conference and we would like to thank the members of the Program Committees for their hard work in the reviewing process. This is a crucial process to the creation of a high standard conference, and the CISIS conference would not exist without their help.




Information Systems Security


Book Description

This book constitutes the refereed proceedings of the 11th International Conference on Information Systems Security, ICISS 2015, held in Kolkata, India, in December 2015. The 24 revised full papers and 8 short papers presented together with 4 invited papers were carefully reviewed and selected from 133 submissions. The papers address the following topics: access control; attacks and mitigation; cloud security; crypto systems and protocols; information flow control; sensor networks and cognitive radio; and watermarking and steganography.




Proceedings of the 6th CIRP-Sponsored International Conference on Digital Enterprise Technology


Book Description

This Proceedings volume contains articles presented at the CIRP-Sponsored Inter- tional Conference on Digital Enterprise Technology (DET2009) that takes place December 14–16, 2009 in Hong Kong. This is the 6th DET conference in the series and the first to be held in Asia. Professor Paul Maropoulos initiated, hosted and chaired the 1st International DET Conference held in 2002 at the University of D- ham. Since this inaugural first DET conference, DET conference series has been s- cessfully held in 2004 at Seattle, Washington USA, in 2006 at Setubal Portugal, in 2007 at Bath England, and in 2008 at Nantes France. The DET2009 conference continues to bring together International expertise from the academic and industrial fields, pushing forward the boundaries of research kno- edge and best practice in digital enterprise technology for design and manufacturing, and logistics and supply chain management. Over 120 papers from over 10 countries have been accepted for presentation at DET2009 and inclusion in this Proceedings volume after stringent refereeing process. On behalf of the organizing and program committees, the Editors are grateful to the many people who have made DET2009 possible: to the authors and presenters, es- cially the keynote speakers, to those who have diligently reviewed submissions, to members of International Scientific Committee, Organizing Committee and Advisory Committes, and to colleagues for their hard work in sorting out all the arrangements. We would also like to extend our gratitude to DET2009 sponsors, co-organizers, and supporting organizations.




Advances in Computational Intelligence


Book Description

This book constitutes the proceedings of the second International Workshop on Advanced Computational Intelligence (IWACI 2009), with a sequel of IWACI 2008 successfully held in Macao, China. IWACI 2009 provided a high-level international forum for scientists, engineers, and educators to present state-of-the-art research in computational intelligence and related fields. Over the past decades, computational intelligence community has witnessed t- mendous efforts and developments in all aspects of theoretical foundations, archit- tures and network organizations, modelling and simulation, empirical study, as well as a wide range of applications across different domains. IWACI 2009 provided a great platform for the community to share their latest research results, discuss critical future research directions, stimulate innovative research ideas, as well as facilitate inter- tional multidisciplinary collaborations. IWACI 2009 received 146 submissions from about 373 authors in 26 countries and regions (Australia, Brazil, Canada, China, Chile, Hong Kong, India, Islamic Republic of Iran, Japan, Jordan, Macao, Malaysia, Mexico, Pakistan, Philippines, Qatar, Republic of Korea, Singapore, South Africa, Sri Lanka, Spain, Taiwan, Thailand, UK, USA, Ve- zuela, Vietnam, and Yemen) across six continents (Asia, Europe, North America, South America, Africa, and Oceania). Based on the rigorous peer reviews by the Program Committee members, 52 high-quality papers were selected for publication in this book, with an acceptance rate of 36.3%. These papers cover major topics of the theoretical research, empirical study, and applications of computational intelligence.




7th International Conference on Practical Applications of Agents and Multi-Agent Systems (PAAMS'09)


Book Description

PAAMS, the International Conference on Practical Applications of Agents and Multi-Agent Systems is an evolution of the International Workshop on Practical Applications of Agents and Multi-Agent Systems. PAAMS is an international yearly tribune to present, to discuss, and to disseminate the latest developments and the most important outcomes related to real-world applications. It provides a unique opportunity to bring multi-disciplinary experts, academics and practitioners together to exchange their experience in the development of Agents and Multi-Agent Systems. This volume presents the papers that have been accepted for the 2009 edition. These articles capture the most innovative results and this year’s trends: Assisted Cognition, E-Commerce, Grid Computing, Human Modelling, Information Systems, Knowledge Management, Agent-Based Simulation, Software Development, Transports, Trust and Security. Each paper has been reviewed by three different reviewers, from an international committee composed of 64 members from 20 different countries. From the 92 submissions received, 35 were selected for full presentation at the conference, and 26 were accepted as posters.




14th International Conference on Computational Intelligence in Security for Information Systems and 12th International Conference on European Transnational Educational (CISIS 2021 and ICEUTE 2021)


Book Description

This book of Advances in Intelligent and Soft Computing contains accepted papers presented at CISIS 2021 and ICEUTE 2021, all conferences held in the beautiful and historic city of Bilbao (Spain), in September 2021. The aim of the 14th CISIS 20121 conference is to offer a meeting opportunity for academic and industry-related researchers belonging to the various, vast communities of computational intelligence, information security, and data mining. The need for intelligent, flexible behavior by large, complex systems, especially in mission-critical domains, is intended to be the catalyst and the aggregation stimulus for the overall event. After a through peer-review process, the CISIS 2021 International Program Committee selected 23 papers which are published in these conference proceedings achieving an acceptance rate of 40%. In this relevant edition, a special emphasis was put on the organization of special sessions. One special session is organized related to relevant topics as follows: building trust in ecosystems and ecosystem components. In the case of 12th ICEUTE 2021, the International Program Committee selected 17 papers, which are published in these conference proceedings. One special session is organized related to relevant topics as follows: sustainable personal goals: engaging students in their learning process. The selection of papers is extremely rigorous in order to maintain the high quality of the conference, and we would like to thank the members of the program committees for their hard work in the reviewing process. This is a crucial process to the creation of a high standard conference, and the CISIS and ICEUTE conferences would not exist without their help.




The Sixth International Symposium on Neural Networks (ISNN 2009)


Book Description

This volume of Advances in Soft Computing and Lecture Notes in Computer th Science vols. 5551, 5552 and 5553, constitute the Proceedings of the 6 Inter- tional Symposium of Neural Networks (ISNN 2009) held in Wuhan, China during May 26–29, 2009. ISNN is a prestigious annual symposium on neural networks with past events held in Dalian (2004), Chongqing (2005), Chengdu (2006), N- jing (2007) and Beijing (2008). Over the past few years, ISNN has matured into a well-established series of international conference on neural networks and their applications to other fields. Following this tradition, ISNN 2009 provided an a- demic forum for the participants to disseminate their new research findings and discuss emerging areas of research. Also, it created a stimulating environment for the participants to interact and exchange information on future research challenges and opportunities of neural networks and their applications. ISNN 2009 received 1,235 submissions from about 2,459 authors in 29 co- tries and regions (Australia, Brazil, Canada, China, Democratic People's Republic of Korea, Finland, Germany, Hong Kong, Hungary, India, Islamic Republic of Iran, Japan, Jordan, Macao, Malaysia, Mexico, Norway, Qatar, Republic of Korea, Singapore, Spain, Taiwan, Thailand, Tunisia, United Kingdom, United States, Venezuela, Vietnam, and Yemen) across six continents (Asia, Europe, North America, South America, Africa, and Oceania). Based on rigorous reviews by the Program Committee members and reviewers, 95 high-quality papers were selected to be published in this volume.