13th International Conference on Computational Intelligence in Security for Information Systems (CISIS 2020)


Book Description

This book contains accepted papers presented at CISIS 2020 held in the beautiful and historic city of Burgos (Spain), in September 2020. The aim of the CISIS 2020 conference is to offer a meeting opportunity for academic and industry-related researchers belonging to the various, vast communities of computational intelligence, information security, and data mining. The need for intelligent, flexible behaviour by large, complex systems, especially in mission-critical domains, is intended to be the catalyst and the aggregation stimulus for the overall event. After a thorough peer-review process, the CISIS 2020 International Program Committee selected 43 papers which are published in these conference proceedings achieving an acceptance rate of 28%. Due to the COVID-19 outbreak, the CISIS 2020 edition was blended, combining on-site and on-line participation. In this relevant edition, a special emphasis was put on the organization of five special sessions related to relevant topics as Fake News Detection and Prevention, Mathematical Methods and Models in Cybersecurity, Measurements for a Dynamic Cyber-Risk Assessment, Cybersecurity in a Hybrid Quantum World, Anomaly/Intrusion Detection, and From the least to the least: cryptographic and data analytics solutions to fulfil least minimum privilege and endorse least minimum effort in information systems. The selection of papers was extremely rigorous in order to maintain the high quality of the conference and we would like to thank the members of the Program Committees for their hard work in the reviewing process. This is a crucial process to the creation of a high standard conference, and the CISIS conference would not exist without their help.




Computational Intelligence in Security for Information Systems


Book Description

The Second International Workshop on Computational Intelligence for Security in Information Systems (CISIS’09) presented the most recent developments in the - namically expanding realm of several fields such as Data Mining and Intelligence, Infrastructure Protection, Network Security, Biometry and Industrial Perspectives. The International Workshop on Computational Intelligence for Security in Infor- tion Systems (CISIS) proposes a forum to the different communities related to the field of intelligent systems for security. The global purpose of CISIS conferences has been to form a broad and interdisciplinary meeting ground offering the opportunity to interact with the leading industries actively involved in the critical area of security, and have a picture of the current solutions adopted in practical domains. This volume of Advances in Intelligent and Soft Computing contains accepted - rd th pers presented at CISIS’09, which was held in Burgos, Spain, on September 23 -26 , 2009. After a through peer-review process, the International Program Committee selected 25 papers which are published in this workshop proceedings. This allowed the Scientific Committee to verify the vital and crucial nature of the topics involved in the event, and resulted in an acceptance rate close to 50% of the originally submitted manuscripts.




Computational Intelligence in Security for Information Systems 2010


Book Description

rd The 3 International Conference on Computational Intelligence in Security for Information Systems (CISIS 2010) provided a broad and interdisciplinary forum to present the most recent developments in several very active scientific areas such as Machine Learning, Infrastructure Protection, Intelligent Methods in Energy and Transportation, Network Security, Biometry, Cryptography, High-performance and Grid Computing, and Industrial Perspective among others. The global purpose of CISIS series of conferences has been to form a broad and interdisciplinary meeting ground offering the opportunity to interact with the leading research team and industries actively involved in the critical area of security, and have a picture of the current solutions adopted in practical domains. This volume of Advances in Intelligence and Soft Computing contains accepted papers presented at CISIS 2010, which was held in León, Spain, on November 11–12, 2010. CISIS 2010 received over 50 technical submissions. After a thorough peer-review process, the International Program Committee - lected 25 papers which are published in this conference proceedings. This allowed the Scientific Committee to verify the vital and crucial nature of the topics - volved in the event, and resulted in an acceptance rate close to 50% of the ori- nally submitted manuscripts.







Artificial Intelligence and Security Challenges in Emerging Networks


Book Description

The recent rise of emerging networking technologies such as social networks, content centric networks, Internet of Things networks, etc, have attracted significant attention from academia as well as industry professionals looking to utilize these technologies for efficiency purposes. However, the allure of such networks and resultant storage of high volumes of data leads to increased security risks, including threats to information privacy. Artificial Intelligence and Security Challenges in Emerging Networks is an essential reference source that discusses applications of artificial intelligence, machine learning, and data mining, as well as other tools and strategies to protect networks against security threats and solve security and privacy problems. Featuring research on topics such as encryption, neural networks, and system verification, this book is ideally designed for ITC procurement managers, IT consultants, systems and network integrators, infrastructure service providers, computer and software engineers, startup companies, academicians, researchers, managers, and students.




Intelligence and Security Informatics for International Security


Book Description

Reflects a decade of leading-edge research on intelligence and security informatics. Dr Chen is researcher at the Artificial Intelligence Laboratory and the NSF COPLINK Center for Homeland Security Information Technology Research. Describes real-world community situations. Targets wide-ranging audience: from researchers in computer science, information management and information science via analysts and policy makers in federal departments and national laboratories to consultants in IT hardware, communication, and software companies.




14th International Conference on Computational Intelligence in Security for Information Systems and 12th International Conference on European Transnational Educational (CISIS 2021 and ICEUTE 2021)


Book Description

This book of Advances in Intelligent and Soft Computing contains accepted papers presented at CISIS 2021 and ICEUTE 2021, all conferences held in the beautiful and historic city of Bilbao (Spain), in September 2021. The aim of the 14th CISIS 20121 conference is to offer a meeting opportunity for academic and industry-related researchers belonging to the various, vast communities of computational intelligence, information security, and data mining. The need for intelligent, flexible behavior by large, complex systems, especially in mission-critical domains, is intended to be the catalyst and the aggregation stimulus for the overall event. After a through peer-review process, the CISIS 2021 International Program Committee selected 23 papers which are published in these conference proceedings achieving an acceptance rate of 40%. In this relevant edition, a special emphasis was put on the organization of special sessions. One special session is organized related to relevant topics as follows: building trust in ecosystems and ecosystem components. In the case of 12th ICEUTE 2021, the International Program Committee selected 17 papers, which are published in these conference proceedings. One special session is organized related to relevant topics as follows: sustainable personal goals: engaging students in their learning process. The selection of papers is extremely rigorous in order to maintain the high quality of the conference, and we would like to thank the members of the program committees for their hard work in the reviewing process. This is a crucial process to the creation of a high standard conference, and the CISIS and ICEUTE conferences would not exist without their help.




Recent Trends in Computational Intelligence Enabled Research


Book Description

The field of computational intelligence has grown tremendously over that past five years, thanks to evolving soft computing and artificial intelligent methodologies, tools and techniques for envisaging the essence of intelligence embedded in real life observations. Consequently, scientists have been able to explain and understand real life processes and practices which previously often remain unexplored by virtue of their underlying imprecision, uncertainties and redundancies, and the unavailability of appropriate methods for describing the incompleteness and vagueness of information represented. With the advent of the field of computational intelligence, researchers are now able to explore and unearth the intelligence, otherwise insurmountable, embedded in the systems under consideration. Computational Intelligence is now not limited to only specific computational fields, it has made inroads in signal processing, smart manufacturing, predictive control, robot navigation, smart cities, and sensor design to name a few. Recent Trends in Computational Intelligence Enabled Research: Theoretical Foundations and Applications explores the use of this computational paradigm across a wide range of applied domains which handle meaningful information. Chapters investigate a broad spectrum of the applications of computational intelligence across different platforms and disciplines, expanding our knowledge base of various research initiatives in this direction. This volume aims to bring together researchers, engineers, developers and practitioners from academia and industry working in all major areas and interdisciplinary areas of computational intelligence, communication systems, computer networks, and soft computing. - Provides insights into the theory, algorithms, implementation, and application of computational intelligence techniques - Covers a wide range of applications of deep learning across various domains which are researching the applications of computational intelligence - Investigates novel techniques and reviews the state-of-the-art in the areas of machine learning, computer vision, soft computing techniques




Computational Intelligence, Cyber Security and Computational Models


Book Description

This book constitutes the proceedings of the Third International Conference on Computational Intelligence, Cyber Security, and Computational Models, ICC3 2017, which was held in Coimbatore, India, in December 2017. The 15 papers presented in this volume were carefully reviewed and selected from 63 submissions. They were organized in topical sections named: computational intelligence; cyber security; and computational models.




Intelligent Security Systems


Book Description

INTELLIGENT SECURITY SYSTEMS Dramatically improve your cybersecurity using AI and machine learning In Intelligent Security Systems, distinguished professor and computer scientist Dr. Leon Reznik delivers an expert synthesis of artificial intelligence, machine learning and data science techniques, applied to computer security to assist readers in hardening their computer systems against threats. Emphasizing practical and actionable strategies that can be immediately implemented by industry professionals and computer device’s owners, the author explains how to install and harden firewalls, intrusion detection systems, attack recognition tools, and malware protection systems. He also explains how to recognize and counter common hacking activities. This book bridges the gap between cybersecurity education and new data science programs, discussing how cutting-edge artificial intelligence and machine learning techniques can work for and against cybersecurity efforts. Intelligent Security Systems includes supplementary resources on an author-hosted website, such as classroom presentation slides, sample review, test and exam questions, and practice exercises to make the material contained practical and useful. The book also offers: A thorough introduction to computer security, artificial intelligence, and machine learning, including basic definitions and concepts like threats, vulnerabilities, risks, attacks, protection, and tools An exploration of firewall design and implementation, including firewall types and models, typical designs and configurations, and their limitations and problems Discussions of intrusion detection systems (IDS), including architecture topologies, components, and operational ranges, classification approaches, and machine learning techniques in IDS design A treatment of malware and vulnerabilities detection and protection, including malware classes, history, and development trends Perfect for undergraduate and graduate students in computer security, computer science and engineering, Intelligent Security Systems will also earn a place in the libraries of students and educators in information technology and data science, as well as professionals working in those fields.