Abstract is missing.
- Automatic Analysis of Web Service Honeypot Data Using Machine Learning TechniquesAbdallah Ghourabi, Tarek Abbes, Adel Bouhoula. 1-11 [doi]
- A Security Pattern-Driven Approach toward the Automation of Risk Treatment in Business ProcessesAngel Jesus Varela-Vaca, Robert Warschofsky, Rafael M. Gasca, Sergio Pozo, Christoph Meinel. 13-23 [doi]
- Neural Network Ensembles Design with Self-Configuring Genetic Programming Algorithm for Solving Computer Security ProblemsEugene Semenkin, Maria Semenkina, Ilia Panfilov. 25-32 [doi]
- Clustering for Intrusion Detection: Network Scans as a Case of StudyRaúl Marticorena Sánchez, Álvaro Herrero, Emilio Corchado. 33-45 [doi]
- Sensor Networks Security Based on Sensitive Robots Agents: A Conceptual ModelCamelia-Mihaela Pintea, Petrica C. Pop. 47-56 [doi]
- Comments on a Cryptosystem Proposed by Wang and HuRaúl Durán Díaz, Luis Hernández Encinas, Jaime Muñoz Masqué. 57-65 [doi]
- Equivalent Inner Key Recovery Attack to NMACFanbao Liu, ChangXiang Shen, Tao Xie. 67-75 [doi]
- Hybrid Compression of the Aho-Corasick Automaton for Static Analysis in Intrusion Detection SystemsCiprian Pungila. 77-86 [doi]
- Tracking Traitors in Web Services via Blind SignaturesJosé Antonio Alvarez-Bermejo, Juan Antonio López Ramos. 87-96 [doi]
- C&C Techniques in Botnet DevelopmentFelix Brezo, José Gaviria de la Puerta, Igor Santos, David Barroso, Pablo Garcia Bringas. 97-108 [doi]
- How Political Illusions Harm National Stability: Fiscal Illusion as a Source of TaxationPaulo Mourão, José Pedro Cabral. 109-115 [doi]
- Software Implementation of Linear Feedback Shift Registers over Extended FieldsOscar Delgado-Mohatar, Amparo Fúster-Sabater. 117-126 [doi]
- Simulation Analysis of Static and Dynamic Intermediate Nodes and Performance Comparison of MANETS Routing ProtocolsJahangir Khan, Zoran S. Bojkovic, Syed Irfan Hayder, Gulam Ali Mallah, Abdul Haseeb, Fariha Atta. 127-140 [doi]
- On Fitness Function Based upon Quasigroups Power SequencesEliska Ochodkova, Jiri Dvorský, Pavel Krömer, Pavel Tucek. 141-150 [doi]
- Investigation on Operating Systems Identification by Means of Fractal Geometry and OS Pseudorandom Number GeneratorsIvan Zelinka, Filip Merhaut, Lenka Skanderova. 151-158 [doi]
- Usability of Software Intrusion-Detection System in Web ApplicationsRadek Vala, David Malaník, Roman Jasek. 159-166 [doi]
- A Genetic Algorithm for Solving RSA Problem in Elastic Optical Networks with Dedicated Path ProtectionMiroslaw Klinkowski. 167-176 [doi]
- Correlation Approach for SQL Injection Attacks DetectionMichal Choras, Rafal Kozik, Damian Puchalski, Witold Holubowicz. 177-185 [doi]
- Information Exchange Mechanism between Federated Domains: P2P ApproachMichal Choras, Rafal Kozik, Rafal Renk, Witold Holubowicz. 187-196 [doi]
- Web Spam Detection Using MapReduce Approach to Collective ClassificationWojciech Indyk, Tomasz Kajdanowicz, Przemyslaw Kazienko, Slawomir Plamowski. 197-206 [doi]
- Analysis of Selected Aspects of "IBM I" SecurityMaciej Piec, Iwona Pozniak-Koszalka, Mariusz Koziol. 207-214 [doi]
- Metaheuristic Approach for Survivable P2P Multicasting Flow Assignment in Dual Homing NetworksWojciech Kmiecik, Krzysztof Walkowiak. 215-224 [doi]
- A Tabu Search Algorithm for Optimization of Survivable Overlay Computing SystemsKrzysztof Walkowiak, Wojciech Charewicz, Maciej Donajski, Jacek Rak. 225-234 [doi]
- Greedy Algorithms for Network Anomaly DetectionTomasz Andrysiak, Lukasz Saganowski, Michal Choras. 235-244 [doi]
- Combined Classifiers with Neural Fuser for Spam DetectionMarcin Zmyslony, Bartosz Krawczyk, Michal Wozniak. 245-252 [doi]
- Combined Bayesian Classifiers Applied to Spam Filtering ProblemKarol Wrótniak, Michal Wozniak. 253-260 [doi]
- Negobot: A Conversational Agent Based on Game Theory for the Detection of Paedophile BehaviourCarlos Laorden, Patxi Galán-García, Igor Santos, Borja Sanz, José María Gómez Hidalgo, Pablo Garcia Bringas. 261-270 [doi]
- OPEM: A Static-Dynamic Approach for Machine-Learning-Based Malware DetectionIgor Santos, Jaime Devesa, Felix Brezo, Javier Nieves, Pablo Garcia Bringas. 271-280 [doi]
- Adult Content Filtering through Compression-Based Text ClassificationIgor Santos, Patxi Galán-García, Aitor Santamaría-Ibirika, Borja Alonso-Isla, Iker Alabau-Sarasola, Pablo Garcia Bringas. 281-288 [doi]
- PUMA: Permission Usage to Detect Malware in AndroidBorja Sanz, Igor Santos, Carlos Laorden, Xabier Ugarte-Pedrero, Pablo Garcia Bringas, Gonzalo Álvarez Marañón. 289-298 [doi]
- Application of Soft Computing Technologies toward Assessment and Skills DevelopmentIgnacio Aliaga, Vicente Vera, Cristina González Losada, Alvaro Enrique Garcia, Héctor Quintián-Pardo, Emilio Corchado, Fanny Klett, Laura García-Hernández. 299-310 [doi]
- An Interactive Mathematica BookJosé Antonio Alvarez-Bermejo, J. Escoriza, Juan Antonio López Ramos, J. Peralta. 311-319 [doi]
- Biorefinery Virtual Lab-Integrating E-learning Techniques and Theoretical LearningM. Dolores Redel-Macías, S. Pinzi, Antonio J. Cubero-Atienza, M. P. Dorado, M. P. Martínez-Jiménez. 321-330 [doi]
- Approaching System Administration as a Group Project in Computer Engineering Higher EducationPedro Antonio Gutiérrez, Javier Sánchez-Monedero, César Hervás-Martínez, Manuel Cruz-Ramírez, Juan Carlos Fernández, Francisco Fernández-Navarro. 331-340 [doi]
- Speed Control of A.C. Drive with Induction Motor Using Genetic AlgorithmPavel Brandstetter, Marek Dobrovsky. 341-350 [doi]
- Applications of Artificial Neural Networks in Control of DC DrivePavel Brandstetter, Pavel Bilek. 351-360 [doi]
- Energy Optimization of a Dynamic System ControllerPavol Fedor, Daniela Perdukova. 361-369 [doi]
- Optimal Input Vector Based Fuzzy Controller Rules DesignPavol Fedor, Daniela Perdukova, Zelmira Ferkova. 371-380 [doi]
- Correlation Methods of OCR Algorithm for Traffic Sign Detection Implementable in MicrocontrollersRadim Hercik, Roman Slaby, Zdenek Machacek, Jiri Koziorek. 381-389 [doi]
- Takagi-Sugeno Fuzzy Model in Task of Controllers DesignJana Nowaková, Miroslav Pokorný, Martin Pies. 391-400 [doi]
- Real-Time Estimation of Induction Motor Parameters Based on the Genetic AlgorithmPetr Palacky, Petr Hudecek, Ales Havel. 401-409 [doi]
- Comparison of Fuzzy Logic Based and Sliding Mode Based Controller for IM Drive Fed by Matrix ConverterJan Bauer, Stanislav Fligl. 411-420 [doi]
- Discrete-Time Markov Chains in Reliability Analysis-Case StudyPavel Skalny, Bohumil Krajc. 421-427 [doi]
- Genetic Algorithm Based Optimization of MGP-FIR Current Reference Generator for Active Power FiltersJakub Talla, Zdenek Peroutka, Seppo J. Ovaska, Josef Stehlik. 429-438 [doi]
- Correlation-Based Neural Gas for Visualizing Correlations between EEG FeaturesKarla Stépánová, Martin Macas, Lenka Lhotská. 439-446 [doi]
- Built-in Smartphone Accelerometer Motion Pattern Recognition Using Wavelet TransformJakub Jirka, Michal Prauzek. 447-455 [doi]
- Temporal Analysis of Remotely Sensed Data for the Assessment of COPD Patients' Health StatusSara Colantonio, Ovidio Salvetti. 457-466 [doi]
- Encoding Time Series Data for Better Clustering ResultsTomás Barton, Pavel Kordík. 467-475 [doi]
- Pattern Recognition in EEG Cognitive Signals Accelerated by GPUPavel Dohnálek, Petr Gajdos, Tomas Peterek, Marek Penhaker. 477-485 [doi]
- On the Potential of Fuzzy Rule-Based Ensemble ForecastingDavid Sikora, Martin Stepnicka, Lenka Vavrickova. 487-496 [doi]
- Recognition of Damaged Letters Based on Mathematical Fuzzy Logic AnalysisVilém Novák, Hashim Habiballa. 497-506 [doi]
- Image Reconstruction with Usage of the F-TransformPavel Vlasánek, Irina Perfilieva. 507-514 [doi]
- Image Compression with Artificial Neural NetworksStephane Kouamo, Claude Tangha. 515-524 [doi]
- Image Compression Methodology Based on Fuzzy TransformPetr Hurtík, Irina Perfilieva. 525-532 [doi]
- Implementation of Background Knowledge and Properties Induced by Fuzzy Confirmation Measures in Apriori AlgorithmIva Tomanova, Jiri Kupka. 533-542 [doi]