1. CISIS 2008: Genoa, Italy
Emilio Corchado, Rodolfo Zunino, Paolo Gastaldo, Álvaro Herrero (Eds.): Proceedings of the International Workshop on Computational Intelligence in Security for Information Systems, CISIS'08, Genova, Italy, October 23-24, 2008. Springer 2009 Advances in Soft Computing 53 ISBN 978-3-540-88180-3
Computational Intelligence Methods for Fighting Crime
Carlo Guazzoni, Gaetano Bruno Ronsivalle: An Artificial Neural Network for Bank Robbery Risk Management: The OS.SI.F Web On-Line Tool of the ABI Anti-crime Department. 1-10
Mauro Cislaghi, George Eleftherakis, Roberto Mazzilli, Francois Mohier, Sara Ferri, Valerio Giuffrida, Elisa Negroni: Secure Judicial Communication Exchange Using Soft-computing Methods and Biometric Authentication. 11-18
Queen E. Booker: Identity Resolution in Criminal Justice Data: An Application of NORA. 19-26
Dario V. Forte, Angelo Cavallini, Cristiano Maruti, Luca Losio, Thomas Orlandi, Michele Zambelli: PTK: An Alternative Advanced Interface for the Sleuth Kit. 27-34
Text Mining and Intelligence
Federico Neri, Massimo Pettoni: Stalker, a Multilingual Text Mining Search Engine for Open Source Intelligence. 35-42
Enrico Appiani, Giuseppe Buslacchi: Computational Intelligence Solutions for Homeland Security. 43-52
Alessandro Zanasi: Virtual Weapons for Real Wars: Text Mining for National Security. 53-60
Sergio Decherchi, Paolo Gastaldo, Judith Redi, Rodolfo Zunino: Hypermetric k-Means Clustering for Content-Based Document Management. 61-68
Critical Infrastructure Protection
Demetrios G. Eliades, Marios M. Polycarpou: Security Issues in Drinking Water Distribution Networks. 69-76
Antonio Lioy, Gianluca Ramunno, Davide Vernizzi: Trusted-Computing Technologies for the Protection of Critical Information Systems. 77-83
Dennis K. Nilsson, Ulf Larson, Francesco Picasso, Erland Jonsson: A First Simulation of Attacks in the Automotive Network Communications Protocol FlexRay. 84-91
Francesco Flammini, Andrea Gaglione, Nicola Mazzocca, Vincenzo Moscato, Concetta Pragliola: Wireless Sensor Data Fusion for Critical Infrastructure Security. 92-99
Osvaldo Faggioni, Maurizio Soldani, Amleto Gabellone, Paolo Maggiani, Davide Leoncini: Development of Anti Intruders Underwater Systems: Time Domain Evaluation of the Self-informed Magnetic Networks Performance. 100-107
Viviana Mascardi, Daniela Briola, Maurizio Martelli, Riccardo Caccia, Carlo Milani: Monitoring and Diagnosing Railway Signalling with Logic-Based Distributed Agents. 108-115
Ermete Meda, Francesco Picasso, Andrea De Domenico, Paolo Mazzaron, Nadia Mazzino, Lorenzo Motta, Aldo Tamponi: SeSaR: Security for Safety. 116-122
Network Security
Soutaro Matsumoto, Adel Bouhoula: Automatic Verification of Firewall Configuration with Respect to Security Policy Requirements. 123-130
Gianluca Maiolini, Lorenzo Cignini, Andrea Baiocchi: Automated Framework for Policy Optimization in Firewalls and Security Gateways. 131-138
Esteban J. Palomo, Enrique Domínguez, Rafael Marcos Luque, José Muñoz: An Intrusion Detection System Based on Hierarchical Self-Organization. 139-146
Zorana Bankovic, Slobodan Bojanic, Octavio Nieto-Taladriz: Evaluating Sequential Combination of Two Genetic Algorithm-Based Solutions for Intrusion Detection. 147-154

Maurizio Aiello, Davide Chiarella, Gianluca Papaleo: Statistical Anomaly Detection on Real e-Mail Traffic. 170-177
Andrea Baiocchi, Gianluca Maiolini, Giacomo Molina, Antonello Rizzi: On-the-fly Statistical Classification of Internet Traffic at Application Layer Based on Cluster Analysis. 178-185
Nikolaos Chatzis, Radu Popescu-Zeletin: Flow Level Data Mining of DNS Query Streams for Email Worm Detection. 186-194
Bogdan Vrusias, Ian Golledge: Adaptable Text Filters and Unsupervised Neural Classifiers for Spam Detection. 195-202
Riyad Alshammari, A. Nur Zincir-Heywood: A Preliminary Performance Comparison of Two Feature Sets for Encrypted Traffic Classification. 203-210

Biometry
Stelvio Cimato, Marco Gamassi, Vincenzo Piuri, Roberto Sassi, Fabio Scotti: A Multi-biometric Verification System for the Privacy Protection of Iris Templates. 227-234
Dzati Athiar Ramli, Salina Abdul Samad, Aini Hussain: Score Information Decision Fusion Using Support Vector Machine for a Correlation Filter Based Speaker Authentication System. 235-242
Messaoud Bengherabi, Lamia Mezai, Farid Harizi, Abderrazak Guessoum, Mohamed Cheriet: Application of 2DPCA Based Techniques in DCT Domain for Face Recognition. 243-250
Petro M. Gopych: BSDT Multi-valued Coding in Discrete Spaces. 258-265
Thi Hoi Le, The Duy Bui: A Fast and Distortion Tolerant Hashing for Fingerprint Image Authentication. 266-273
Anatoly Sachenko, Arkadiusz Banasik, Adrian Kapczynski: The Concept of Application of Fuzzy Logic in Biometric Authentication Systems. 274-279
Information Protection
Fabio Antonio Bovino: Bidirectional Secret Communication by Quantum Collisions. 280-285
Paraskevi K. Tzouveli, Klimis S. Ntalianis, Stefanos D. Kollias: Semantic Region Protection Using Hu Moments and a Chaotic Pseudo-random Number Generator. 286-293
Tao Cai, Shiguang Ju, Wei Zhong, DeJiao Niu: Random r-Continuous Matching Rule for Immune-Based Secure Storage System. 294-300
Industrial Perspectives
Francesco Pedersoli, Massimiliano Cristiano: nokLINK: A New Solution for Enterprise Security. 301-308
Bruno Giacometti: SLA and LAC: New Solutions for Security Monitoring in the Enterprise. 309-315



