7. CISIS/ICEUTE/SOCO Special Sessions 2012: Ostrava, Czech Republic
Álvaro Herrero, Václav Snásel, Ajith Abraham, Ivan Zelinka, Bruno Baruque, Héctor Quintián-Pardo, José Luís Calvo-Rolle, Javier Sedano, Emilio Corchado (Eds.): International Joint Conference CISIS'12-ICEUTE'12-SOCO'12 Special Sessions, Ostrava, Czech Republic, September 5th-7th, 2012. Springer 2013 Advances in Intelligent Systems and Computing 189 ISBN 978-3-642-33017-9
Abdallah Ghourabi, Tarek Abbes, Adel Bouhoula: Automatic Analysis of Web Service Honeypot Data Using Machine Learning Techniques. 1-11
Angel Jesus Varela-Vaca, Robert Warschofsky, Rafael M. Gasca, Sergio Pozo, Christoph Meinel: A Security Pattern-Driven Approach toward the Automation of Risk Treatment in Business Processes. 13-23
Eugene Semenkin, Maria Semenkina, Ilia Panfilov: Neural Network Ensembles Design with Self-Configuring Genetic Programming Algorithm for Solving Computer Security Problems. 25-32
Raúl Marticorena Sánchez, Álvaro Herrero, Emilio Corchado: Clustering for Intrusion Detection: Network Scans as a Case of Study. 33-45
Camelia-Mihaela Pintea, Petrica C. Pop: Sensor Networks Security Based on Sensitive Robots Agents: A Conceptual Model. 47-56
Raúl Durán Díaz, Luis Hernández Encinas, Jaime Muñoz Masqué: Comments on a Cryptosystem Proposed by Wang and Hu. 57-65
Ciprian Pungila: Hybrid Compression of the Aho-Corasick Automaton for Static Analysis in Intrusion Detection Systems. 77-86
José Antonio Alvarez-Bermejo, Juan Antonio López Ramos: Tracking Traitors in Web Services via Blind Signatures. 87-96
Felix Brezo, José Gaviria de la Puerta, Igor Santos, David Barroso, Pablo Garcia Bringas: C&C Techniques in Botnet Development. 97-108
Paulo Mourão, José Pedro Cabral: How Political Illusions Harm National Stability: Fiscal Illusion as a Source of Taxation. 109-115
Oscar Delgado-Mohatar, Amparo Fúster-Sabater: Software Implementation of Linear Feedback Shift Registers over Extended Fields. 117-126
Jahangir Khan, Zoran S. Bojkovic, Syed Irfan Hayder, Gulam Ali Mallah, Abdul Haseeb, Fariha Atta: Simulation Analysis of Static and Dynamic Intermediate Nodes and Performance Comparison of MANETS Routing Protocols. 127-140
Eliska Ochodkova, Jiri Dvorský, Pavel Krömer, Pavel Tucek: On Fitness Function Based upon Quasigroups Power Sequences. 141-150
Ivan Zelinka, Filip Merhaut, Lenka Skanderova: Investigation on Operating Systems Identification by Means of Fractal Geometry and OS Pseudorandom Number Generators. 151-158
Radek Vala, David Malaník, Roman Jasek: Usability of Software Intrusion-Detection System in Web Applications. 159-166
Miroslaw Klinkowski: A Genetic Algorithm for Solving RSA Problem in Elastic Optical Networks with Dedicated Path Protection. 167-176
Michal Choras, Rafal Kozik, Damian Puchalski, Witold Holubowicz: Correlation Approach for SQL Injection Attacks Detection. 177-185
Michal Choras, Rafal Kozik, Rafal Renk, Witold Holubowicz: Information Exchange Mechanism between Federated Domains: P2P Approach. 187-196
Wojciech Indyk, Tomasz Kajdanowicz, Przemyslaw Kazienko, Slawomir Plamowski: Web Spam Detection Using MapReduce Approach to Collective Classification. 197-206
Maciej Piec, Iwona Pozniak-Koszalka, Mariusz Koziol: Analysis of Selected Aspects of "IBM I" Security. 207-214
Wojciech Kmiecik, Krzysztof Walkowiak: Metaheuristic Approach for Survivable P2P Multicasting Flow Assignment in Dual Homing Networks. 215-224
Krzysztof Walkowiak, Wojciech Charewicz, Maciej Donajski, Jacek Rak: A Tabu Search Algorithm for Optimization of Survivable Overlay Computing Systems. 225-234
Tomasz Andrysiak, Lukasz Saganowski, Michal Choras: Greedy Algorithms for Network Anomaly Detection. 235-244
Marcin Zmyslony, Bartosz Krawczyk, Michal Wozniak: Combined Classifiers with Neural Fuser for Spam Detection. 245-252
Karol Wrótniak, Michal Wozniak: Combined Bayesian Classifiers Applied to Spam Filtering Problem. 253-260
Carlos Laorden, Patxi Galán-García, Igor Santos, Borja Sanz, José María Gómez Hidalgo, Pablo Garcia Bringas: Negobot: A Conversational Agent Based on Game Theory for the Detection of Paedophile Behaviour. 261-270
Igor Santos, Jaime Devesa, Felix Brezo, Javier Nieves, Pablo Garcia Bringas: OPEM: A Static-Dynamic Approach for Machine-Learning-Based Malware Detection. 271-280
Igor Santos, Patxi Galán-García, Aitor Santamaría-Ibirika, Borja Alonso-Isla, Iker Alabau-Sarasola, Pablo Garcia Bringas: Adult Content Filtering through Compression-Based Text Classification. 281-288
Borja Sanz, Igor Santos, Carlos Laorden, Xabier Ugarte-Pedrero, Pablo Garcia Bringas, Gonzalo Álvarez Marañón: PUMA: Permission Usage to Detect Malware in Android. 289-298
Ignacio Aliaga, Vicente Vera, Cristina González Losada, Alvaro Enrique Garcia, Héctor Quintián-Pardo, Emilio Corchado, Fanny Klett, Laura García-Hernández: Application of Soft Computing Technologies toward Assessment and Skills Development. 299-310
José Antonio Alvarez-Bermejo, J. Escoriza, Juan Antonio López Ramos, J. Peralta: An Interactive Mathematica Book. 311-319
M. Dolores Redel-Macías, S. Pinzi, Antonio J. Cubero-Atienza, M. P. Dorado, M. P. Martínez-Jiménez: Biorefinery Virtual Lab-Integrating E-learning Techniques and Theoretical Learning. 321-330
Pedro Antonio Gutiérrez, Javier Sánchez-Monedero, César Hervás-Martínez, Manuel Cruz-Ramírez, Juan Carlos Fernández, Francisco Fernández-Navarro: Approaching System Administration as a Group Project in Computer Engineering Higher Education. 331-340
Pavel Brandstetter, Marek Dobrovsky: Speed Control of A.C. Drive with Induction Motor Using Genetic Algorithm. 341-350
Pavel Brandstetter, Pavel Bilek: Applications of Artificial Neural Networks in Control of DC Drive. 351-360
Pavol Fedor, Daniela Perdukova, Zelmira Ferkova: Optimal Input Vector Based Fuzzy Controller Rules Design. 371-380
Radim Hercik, Roman Slaby, Zdenek Machacek, Jiri Koziorek: Correlation Methods of OCR Algorithm for Traffic Sign Detection Implementable in Microcontrollers. 381-389
Jana Nowaková, Miroslav Pokorný, Martin Pies: Takagi-Sugeno Fuzzy Model in Task of Controllers Design. 391-400
Petr Palacky, Petr Hudecek, Ales Havel: Real-Time Estimation of Induction Motor Parameters Based on the Genetic Algorithm. 401-409
Jan Bauer, Stanislav Fligl: Comparison of Fuzzy Logic Based and Sliding Mode Based Controller for IM Drive Fed by Matrix Converter. 411-420
Pavel Skalny, Bohumil Krajc: Discrete-Time Markov Chains in Reliability Analysis-Case Study. 421-427
Jakub Talla, Zdenek Peroutka, Seppo J. Ovaska, Josef Stehlik: Genetic Algorithm Based Optimization of MGP-FIR Current Reference Generator for Active Power Filters. 429-438
Karla Stépánová, Martin Macas, Lenka Lhotská: Correlation-Based Neural Gas for Visualizing Correlations between EEG Features. 439-446
Jakub Jirka, Michal Prauzek: Built-in Smartphone Accelerometer Motion Pattern Recognition Using Wavelet Transform. 447-455
Sara Colantonio, Ovidio Salvetti: Temporal Analysis of Remotely Sensed Data for the Assessment of COPD Patients' Health Status. 457-466
Pavel Dohnálek, Petr Gajdos, Tomas Peterek, Marek Penhaker: Pattern Recognition in EEG Cognitive Signals Accelerated by GPU. 477-485
David Sikora, Martin Stepnicka, Lenka Vavrickova: On the Potential of Fuzzy Rule-Based Ensemble Forecasting. 487-496
Vilem Novak, Hashim Habiballa: Recognition of Damaged Letters Based on Mathematical Fuzzy Logic Analysis. 497-506


Iva Tomanova, Jiri Kupka: Implementation of Background Knowledge and Properties Induced by Fuzzy Confirmation Measures in Apriori Algorithm. 533-542



