Abstract is missing.
- A Data Mining Based Analysis of Nmap Operating System Fingerprint DatabaseJoão Paulo S. Medeiros, Agostinho M. Brito, Paulo S. Motta Pires. 1-8 [doi]
- Knowledge System for Application of Computer Security RulesFelipe Rolando Menchaca García, Salvador Contreras Hernández. 9-17 [doi]
- Clustering of Windows Security Events by Means of Frequent Pattern MiningRosa Basagoiti, Urko Zurutuza, Asier Aztiria, Guzmán Santafé, Mario Reyes. 19-27 [doi]
- Text Clustering for Digital Forensics AnalysisSergio Decherchi, Simone Tacconi, Judith Redi, Alessio Leoncini, Fabio Sangiacomo, Rodolfo Zunino. 29-36 [doi]
- A Preliminary Study on SVM Based Analysis of Underwater Magnetic Signals for Port ProtectionDavide Leoncini, Sergio Decherchi, Osvaldo Faggioni, Paolo Gastaldo, Maurizio Soldani, Rodolfo Zunino. 37-44 [doi]
- Fuzzy Rule Based Intelligent Security and Fire Detector SystemJoydeb Roy Choudhury, Tribeni Prasad Banerjee, Swagatam Das, Ajith Abraham, Václav Snásel. 45-51 [doi]
- A Scaled Test Bench for Vanets with RFID SignallingAndrés Ortiz, Alberto Peinado, Jorge Munilla. 53-59 [doi]
- A SVM-Based Behavior Monitoring Algorithm towards Detection of Un-desired Events in Critical InfrastructuresY. Jiang, J. Jiang, P. Capodieci. 61-68 [doi]
- Design and Implementation of High Performance Viterbi Decoder for Mobile Communication Data SecurityT. Menakadevi, M. Madheswaran. 69-76 [doi]
- An Adaptive Multi-agent Solution to Detect DoS Attack in SOAP MessagesCristian Pinzón, Juan Francisco de Paz, Javier Bajo, Juan M. Corchado. 77-84 [doi]
- A Self-learning Anomaly-Based Web Application FirewallCarmen Torrano-Gimenez, Alejandro Perez-Villegas, Gonzalo Álvarez. 85-92 [doi]
- An Investigation of Multi-objective Genetic Algorithms for Encrypted Traffic IdentificationCarlos Bacquet, A. Nur Zincir-Heywood, Malcolm I. Heywood. 93-100 [doi]
- A Multi-objective Optimisation Approach to IDS Sensor PlacementHao Chen, John A. Clark, Juan E. Tapiador, Siraj A. Shaikh, Howard Chivers, Philip Nobles. 101-108 [doi]
- Towards Ontology-Based Intelligent Model for Intrusion Detection and PreventionGustavo A. Isaza, Andrés G. Castillo, Manuel López, Luis Castillo. 109-116 [doi]
- Ontology-Based Policy TranslationCataldo Basile, Antonio Lioy, Salvatore Scozzi, Marco Vallini. 117-126 [doi]
- Automatic Rule Generation Based on Genetic Programming for Event CorrelationG. Suarez-Tangil, Esther Palomar, José María de Fuentes, Jorge Blasco Alís, Arturo Ribagorda. 127-134 [doi]
- Learning Program Behavior for Run-Time Software AssuranceHira Agrawal, Clifford Behrens, Balakrishnan Dasarathy, Leslie Lee Fook. 135-142 [doi]
- Multiagent Systems for Network Intrusion Detection: A ReviewÁlvaro Herrero, Emilio Corchado. 143-154 [doi]
- Multimodal Biometrics: Topics in Score FusionLuis A. Puente, Maria Jesús Poza, Juan Miguel Gómez, Diego Carrero. 155-162 [doi]
- Security Efficiency Analysis of a Biometric Fuzzy Extractor for Iris TemplatesFernando Hernandez Álvarez, Luis Hernández Encinas. 163-170 [doi]
- Behavioural Biometrics Hardware Based on Bioinformatics MatchingSlobodan Bojanic, Vukasin Pejovic, Gabriel Caffarena, Vladimir Milovanovic, Carlos Carreras, Jelena Popovic. 171-178 [doi]
- Robust Real-Time Face Tracking Using an Active CameraParamveer S. Dhillon. 179-186 [doi]
- An Approach to Centralized Control Systems Based on Cellular AutomataRosaura Palma-Orozco, Gisela Palma-Orozco, José de Jesús Medel Juárez, José Alfredo Jiménez-Benítez. 187-191 [doi]
- Intelligent Methods and Models in TransportationMaria Belén Vaquerizo García. 193-201 [doi]
- Knowledge Based Expert System for PID Controller Tuning under Hazardous Operating ConditionsHéctor Alaiz-Moretón, José Luís Calvo-Rolle, Javier Alfonso-Cendón, Angel Alonso, Ramón Ferreiro García. 203-210 [doi]