Abstract is missing.
- An Incremental Density-Based Clustering Technique for Large DatasetsSaif-Ur Rehman, Muhammed Naeem Ahmed Khan. 3-11 [doi]
- BSDT ROC and Cognitive Learning HypothesisPetro M. Gopych, Ivan Gopych. 13-23 [doi]
- Evolving Fuzzy Classifier for Data Mining - an Information Retrieval ApproachPavel Krömer, Václav Snásel, Jan Platos, Ajith Abraham. 25-32 [doi]
- Mereotopological Analysis of Formal Concepts in Security OntologiesGonzalo A. Aranda-Corral, Joaquín Borrego-Díaz. 33-40 [doi]
- A Multi-agent Data Mining System for Defect Forecasting in a Decentralized Manufacturing EnvironmentJavier Alfonso-Cendón, Ana González-Marcos, Manuel Castejón Limas, Joaquín B. Ordieres Meré. 43-50 [doi]
- A Distributed Hierarchical Multi-agent Architecture for Detecting Injections in SQL QueriesCristian Pinzón, Juan Francisco de Paz, Álvaro Herrero, Emilio Corchado, Javier Bajo. 51-59 [doi]
- Incorporating Temporal Constraints in the Analysis Task of a Hybrid Intelligent IDSMartí Navarro, Emilio Corchado, Vicente Julián, Álvaro Herrero. 61-69 [doi]
- Performances of Speech Signal Biometric Systems Based on Signal to Noise Ratio DegradationDzati Athiar Ramli, Salina Abdul Samad, Aini Hussain. 73-80 [doi]
- Lipreading Using ::::n::::-Gram Feature VectorPreety Singh, Vijay Laxmi, Deepika Gupta, Manoj Singh Gaur. 81-88 [doi]
- Face Processing for Security: A Short ReviewIon Marqués, Manuel Graña. 89-96 [doi]
- Ontologies-Based Automated Intrusion Response SystemVerónica Mateos Lanchas, Víctor A. Villagrá González, Francisco Romero Bueno. 99-106 [doi]
- Semi-supervised Fingerprinting of Protocol MessagesJérôme François, Humberto J. Abdelnur, Radu State, Olivier Festor. 107-115 [doi]
- Monitoring of Spatial-Aggregated IP-Flow RecordsCynthia Wagner, Gérard Wagener, Radu State, Thomas Engel. 117-124 [doi]
- Improving Network Security through Traffic Log Anomaly Detection Using Time Series AnalysisAitor Corchero Rodriguez, Mario Reyes de los Mozos. 125-133 [doi]
- A Threat Model Approach to Threats and Vulnerabilities in On-line Social NetworksCarlos Laorden, Borja Sanz, Gonzalo Alvarez, Pablo Garcia Bringas. 135-142 [doi]
- An SLA-Based Approach for Network Anomaly DetectionYasser Yasami. 143-150 [doi]
- Understanding Honeypot Data by an Unsupervised Neural VisualizationÁlvaro Alonso, Santiago Porras, Enaitz Ezpeleta, Ekhiotz Vergara, Ignacio Arenaza, Roberto Uribeetxeberria, Urko Zurutuza, Álvaro Herrero, Emilio Corchado. 151-160 [doi]
- Permuted Image DCT WatermarkingReena Gunjan, Saurabh Maheshwari, Manoj Singh Gaur, Vijay Laxmi. 163-171 [doi]
- A Developed WaterMark Technique for Distributed Database SecurityHazem M. El-Bakry, Mohamed Hamada. 173-180 [doi]
- Trident, a New Pseudo Random Number Generator Based on Coupled Chaotic MapsAmalia Beatriz Orúe López, Gonzalo Álvarez Marañón, Alberto Guerra Estévez, Gerardo Pastor Dégano, Miguel Romera García, Fausto Montoya Vitini. 183-190 [doi]
- The Impact of the SHA-3 Casting Cryptography Competition on the Spanish IT MarketManuel J. Martínez, Roberto Uribeetxeberria, Urko Zurutuza, Miguel Fernández. 191-199 [doi]
- A New Task Engineering Approach for Workflow Access ControlHanan El Bakkali, Hamid Hatim, Ilham Berrada. 203-212 [doi]
- OPBUS: Fault Tolerance Against Integrity Attacks in Business ProcessesAngel Jesus Varela-Vaca, Rafael Martinez Gasca. 213-222 [doi]
- A Key Distribution Scheme for Live Streaming Multi-tree OverlaysJuan Álvaro Muñoz Naranjo, Juan Antonio López Ramos, Leocadio González Casado. 223-230 [doi]
- Intelligent Methods for Scheduling in TransportationMaria Belén Vaquerizo García. 231-238 [doi]