2. CISIS 2009: Burgos, Spain
Álvaro Herrero, Paolo Gastaldo, Rodolfo Zunino, Emilio Corchado (Eds.): Computational Intelligence in Security for Information Systems - CISIS'09, 2nd International Workshop, Burgos, Spain, 23-26 September 2009 Proceedings. Springer 2009 Advances in Intelligent and Soft Computing 63 ISBN 978-3-642-04090-0
João Paulo S. Medeiros, Agostinho M. Brito, Paulo S. Motta Pires: A Data Mining Based Analysis of Nmap Operating System Fingerprint Database. 1-8
Menchaca García Felipe Rolando, Contreras Hernández Salvador: Knowledge System for Application of Computer Security Rules. 9-17
Rosa Basagoiti, Urko Zurutuza, Asier Aztiria, Guzmán Santafé, Mario Reyes: Clustering of Windows Security Events by Means of Frequent Pattern Mining. 19-27
Sergio Decherchi, Simone Tacconi, Judith Redi, Alessio Leoncini, Fabio Sangiacomo, Rodolfo Zunino: Text Clustering for Digital Forensics Analysis. 29-36
Davide Leoncini, Sergio Decherchi, Osvaldo Faggioni, Paolo Gastaldo, Maurizio Soldani, Rodolfo Zunino: A Preliminary Study on SVM Based Analysis of Underwater Magnetic Signals for Port Protection. 37-44
Joydeb Roy Choudhury, Tribeni Prasad Banerjee, Swagatam Das, Ajith Abraham, Václav Snásel: Fuzzy Rule Based Intelligent Security and Fire Detector System. 45-51
Andrés Ortiz, Alberto Peinado, Jorge Munilla: A Scaled Test Bench for Vanets with RFID Signalling. 53-59
Y. Jiang, J. Jiang, P. Capodieci: A SVM-Based Behavior Monitoring Algorithm towards Detection of Un-desired Events in Critical Infrastructures. 61-68
T. Menakadevi, M. Madheswaran: Design and Implementation of High Performance Viterbi Decoder for Mobile Communication Data Security. 69-76
Cristian Pinzón, Juan Francisco de Paz, Javier Bajo, Juan M. Corchado: An Adaptive Multi-agent Solution to Detect DoS Attack in SOAP Messages. 77-84
Carmen Torrano-Gimenez, Alejandro Perez-Villegas, Gonzalo Álvarez: A Self-learning Anomaly-Based Web Application Firewall. 85-92
Carlos Bacquet, A. Nur Zincir-Heywood, Malcolm I. Heywood: An Investigation of Multi-objective Genetic Algorithms for Encrypted Traffic Identification. 93-100
Hao Chen, John A. Clark, Juan E. Tapiador, Siraj A. Shaikh, Howard Chivers, Philip Nobles: A Multi-objective Optimisation Approach to IDS Sensor Placement. 101-108
Gustavo A. Isaza, Andrés G. Castillo, Manuel López, Luis Fernando Castillo: Towards Ontology-Based Intelligent Model for Intrusion Detection and Prevention. 109-116
Cataldo Basile, Antonio Lioy, Salvatore Scozzi, Marco Vallini: Ontology-Based Policy Translation. 117-126
Guillermo Suarez-Tangil, Esther Palomar, José María de Fuentes, Jorge Blasco Alís, Arturo Ribagorda: Automatic Rule Generation Based on Genetic Programming for Event Correlation. 127-134
Hira Agrawal, Clifford Behrens, Balakrishnan Dasarathy, Leslie Lee Fook: Learning Program Behavior for Run-Time Software Assurance. 135-142
Álvaro Herrero, Emilio Corchado: Multiagent Systems for Network Intrusion Detection: A Review. 143-154
Luis A. Puente, Maria Jesús Poza, Juan Miguel Gómez, Diego Carrero: Multimodal Biometrics: Topics in Score Fusion. 155-162
Fernando Hernández Álvarez, Luis Hernández Encinas: Security Efficiency Analysis of a Biometric Fuzzy Extractor for Iris Templates. 163-170
Slobodan Bojanic, Vukasin Pejovic, Gabriel Caffarena, Vladimir Milovanovic, Carlos Carreras, Jelena Popovic: Behavioural Biometrics Hardware Based on Bioinformatics Matching. 171-178
Paramveer S. Dhillon: Robust Real-Time Face Tracking Using an Active Camera. 179-186
Rosaura Palma-Orozco, Gisela Palma-Orozco, José de Jesús Medel Juárez, José Alfredo Jiménez-Benítez: An Approach to Centralized Control Systems Based on Cellular Automata. 187-191
Maria Belén Vaquerizo García: Intelligent Methods and Models in Transportation. 193-201
Héctor Alaiz-Moretón, José Luís Calvo-Rolle, Javier Alfonso-Cendón, Angel Alonso, Ramón Ferreiro García: Knowledge Based Expert System for PID Controller Tuning under Hazardous Operating Conditions. 203-210



