3. CISIS 2010: León, Spain
Álvaro Herrero, Emilio Corchado, Carlos Redondo, Ángel Alonso (Eds.): Computational Intelligence in Security for Information Systems 2010 - Proceedings of the 3rd International Conference on Computational Intelligence in Security for Information Systems (CISIS'10), León, Spain, November 11-12, 2010. Springer 2010 Advances in Intelligent and Soft Computing 85 ISBN 978-3-642-16625-9
Machine Learning and Intelligence
Saif ur Rehman, Muhammed Naeem Ahmed Khan: An Incremental Density-Based Clustering Technique for Large Datasets. 3-11
Pavel Krömer, Václav Snásel, Jan Platos, Ajith Abraham: Evolving Fuzzy Classifier for Data Mining - an Information Retrieval Approach. 25-32
Gonzalo A. Aranda-Corral, Joaquín Borrego-Díaz: Mereotopological Analysis of Formal Concepts in Security Ontologies. 33-40
Agents and Multi-Agent Systems
Javier Alfonso-Cendón, Ana González-Marcos, Manuel Castejón Limas, Joaquín B. Ordieres Meré: A Multi-agent Data Mining System for Defect Forecasting in a Decentralized Manufacturing Environment. 43-50
Cristian Pinzón, Juan Francisco de Paz, Álvaro Herrero, Emilio Corchado, Javier Bajo: A Distributed Hierarchical Multi-agent Architecture for Detecting Injections in SQL Queries. 51-59
Image, Video and Speech Processing
Dzati Athiar Ramli, Salina Abdul Samad, Aini Hussain: Performances of Speech Signal Biometric Systems Based on Signal to Noise Ratio Degradation. 73-80
Preety Singh, Vijay Laxmi, Deepika Gupta, Manoj Singh Gaur: Lipreading Using n-Gram Feature Vector. 81-88
Network Security
Verónica Mateos Lanchas, Víctor A. Villagrá González, Francisco Romero Bueno: Ontologies-Based Automated Intrusion Response System. 99-106
Jérôme François, Humberto J. Abdelnur, Radu State, Olivier Festor: Semi-supervised Fingerprinting of Protocol Messages. 107-115
Cynthia Wagner, Gérard Wagener, Radu State, Thomas Engel: Monitoring of Spatial-Aggregated IP-Flow Records. 117-124
Aitor Corchero Rodriguez, Mario Reyes de los Mozos: Improving Network Security through Traffic Log Anomaly Detection Using Time Series Analysis. 125-133
Carlos Laorden, Borja Sanz, Gonzalo Álvarez Marañón, Pablo Garcia Bringas: A Threat Model Approach to Threats and Vulnerabilities in On-line Social Networks. 135-142
Yasser Yasami: An SLA-Based Approach for Network Anomaly Detection. 143-150
Álvaro Alonso, Santiago Porras, Enaitz Ezpeleta, Ekhiotz Vergara, Ignacio Arenaza, Roberto Uribeetxeberria, Urko Zurutuza, Álvaro Herrero, Emilio Corchado: Understanding Honeypot Data by an Unsupervised Neural Visualization. 151-160
Watermarking
Reena Gunjan, Saurabh Maheshwari, Manoj Singh Gaur, Vijay Laxmi: Permuted Image DCT Watermarking. 163-171
Hazem M. El-Bakry, Mohamed Hamada: A Developed WaterMark Technique for Distributed Database Security. 173-180
Cryptography
Amalia Beatriz Orúe López, Gonzalo Álvarez Marañón, Alberto Guerra Estévez, Gerardo Pastor Dégano, Miguel Romera García, Fausto Montoya Vitini: Trident, a New Pseudo Random Number Generator Based on Coupled Chaotic Maps. 183-190
Manuel J. Martínez, Roberto Uribeetxeberria, Urko Zurutuza, Miguel Fernández: The Impact of the SHA-3 Casting Cryptography Competition on the Spanish IT Market. 191-199
Industrial and Commercial Applications of Intelligent Methods for Security
Hanan El Bakkali, Hamid Hatim, Ilham Berrada: A New Task Engineering Approach for Workflow Access Control. 203-212
Angel Jesus Varela-Vaca, Rafael Martinez Gasca: OPBUS: Fault Tolerance Against Integrity Attacks in Business Processes. 213-222
Juan Álvaro Muñoz Naranjo, Juan Antonio López Ramos, Leocadio González Casado: A Key Distribution Scheme for Live Streaming Multi-tree Overlays. 223-230
Maria Belén Vaquerizo García: Intelligent Methods for Scheduling in Transportation. 231-238



