Autonomous intelligent systems : agents and data mining : international workshop, AIS-ADM 2005, St. Petersburg, Russia, June 6-8, 2005 : proceedings / / Vladimir Gorodetsky, Jiming Liu, Victor A. Skormin (eds.)
| Autonomous intelligent systems : agents and data mining : international workshop, AIS-ADM 2005, St. Petersburg, Russia, June 6-8, 2005 : proceedings / / Vladimir Gorodetsky, Jiming Liu, Victor A. Skormin (eds.) |
| Edizione | [1st ed. 2005.] |
| Pubbl/distr/stampa | Berlin ; ; New York, : Springer, c2005 |
| Descrizione fisica | 1 online resource (XIII, 303 p.) |
| Disciplina | 006.3/3 |
| Altri autori (Persone) |
GorodetskiVladimir I. <1937->
LiuJiming <1962-> SkorminVictor A. <1946-> |
| Collana | Lecture notes in computer science,Lecture notes in artificial intelligence |
| Soggetto topico |
Intelligent agents (Computer software)
Data mining |
| ISBN |
3-540-31932-8
3-540-26164-8 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | Invited Papers -- Negotiation Technologies -- Knowledge Discovery for Training Intelligent Agents: Methodology, Tools and Applications -- Artificial Immune Systems—An Emergent Technology for Autonomous Intelligent Systems and Data Mining -- Evolving Agents: Communication and Cognition -- Agents and Data Mining: Mutual Enhancement by Integration -- Soft-Device Inheritance in the Knowledge Grid -- Agent Based Data Mining Issues -- Towards the Adaptive Organization: Formation and Conservative Reconfiguration of Agents Coalitions -- A Cooperative Multi-agent Data Mining Model and Its Application to Medical Data on Diabetes -- Technology of Agent-Based Decision Making System Development -- An Architecture for Distributed Agent-Based Data Preprocessing -- Meta-reasoning Methods for Agent’s Intention Modelling -- Execution Engine of Meta-learning System for KDD in Multi-agent Environment -- A Methodology for Predicting Agent Behavior by the Use of Data Mining Techniques -- Ontology and Web Mining -- Topic-Specific Text Filtering Based on Multiple Reducts -- Parallel Algorithm for Mining Frequent Closed Sequences -- Decision Trees Capacity and Probability of Misclassification -- Querying Dynamic and Context-Sensitive Metadata in Semantic Web -- Ontology Issue in Multi-agent Distributed Learning -- Ontology-Based Users and Requests Clustering in Customer Service Management System -- Multi-agent Approach for Community Clustering Based on Individual Ontology Annotations -- Applications and Case Studies -- Effective Discovery of Intrusion Protection Strategies -- Integrating Knowledge Through Cooperative Negotiation – A Case Study in Bioinformatics -- Data Mining Techniques for RoboCup Soccer Agents. |
| Altri titoli varianti | AIS-ADM 2005 |
| Record Nr. | UNINA-9910484421803321 |
| Berlin ; ; New York, : Springer, c2005 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Computer network security : 5th International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2010, St. Petersburg, Russia, September 8-10, 2010 : proceedings / / Igor Kotenko, Victor Skormin (eds.)
| Computer network security : 5th International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2010, St. Petersburg, Russia, September 8-10, 2010 : proceedings / / Igor Kotenko, Victor Skormin (eds.) |
| Edizione | [1st ed. 2010.] |
| Pubbl/distr/stampa | Berlin, : Springer, 2010 |
| Descrizione fisica | 1 online resource (XIII, 345 p. 92 illus.) |
| Disciplina | 005.8 |
| Altri autori (Persone) |
KotenkoIgor
SkorminVictor A. <1946-> |
| Collana |
LNCS sublibrary. SL 5, Computer communication networks and telecommunications
Lecture notes in computer science |
| Soggetto topico |
Computer networks - Security measures
Computer networks - Access control |
| ISBN | 3-642-14706-2 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | Invited Papers -- Service Dependencies in Information Systems Security -- Secure Applications without Secure Infrastructures -- Integrating Types and Specifications for Secure Software Development -- Cryptography for Network Security: Failures, Successes and Challenges -- Group-Centric Models for Secure and Agile Information Sharing -- Security Modeling and Covert Channels -- A Predictive Model for Cache-Based Side Channels in Multicore and Multithreaded Microprocessors -- Attack and Defense Modeling with BDMP -- QoS-T: QoS Throttling to Elicit User Cooperation in Computer Systems -- Problems of Modeling in the Analysis of Covert Channels -- Security Policies and Formal Analysis of Security Properties -- Policy-Based Design and Verification for Mission Assurance -- Using Equivalence Relations for Corrective Enforcement of Security Policies -- Model Checking of Location and Mobility Related Security Policy Specifications in Ambient Calculus -- Authentication, Authorization, Access Control and Public Key Cryptography -- Credentials Management for High-Value Transactions -- A New Hard Problem over Non-commutative Finite Groups for Cryptographic Protocols -- Credential Chain Discovery in RTT Trust Management Language -- Genetic Optimization of Access Control Schemes in Virtual Local Area Networks -- Intrusion and Malware Detection -- Intellectual Intrusion Detection with Sequences Alignment Methods -- Symptoms-Based Detection of Bot Processes -- A Comparison of Feature-Selection Methods for Intrusion Detection -- From NLP (Natural Language Processing) to MLP (Machine Language Processing) -- Security of Multi-agent Systems and Software Protection -- Secure Multi-Agent System for Multi-Hop Environments -- In the Track of the Agent Protection: A Solution Based on Cryptographic Hardware -- Security and Scalability of Remote Entrusting Protection -- Adaptive Security, Security Analysis and Virtualization -- A Novel Genetic Approach to Provide Differentiated Levels of Service Resilience in IP-MPLS/WDM Networks -- Predictive Security Analysis for Event-Driven Processes -- Virtual Environment Security Modeling -- Clarifying Integrity Control at the Trusted Information Environment. |
| Altri titoli varianti | MMM-ACNS 2010 |
| Record Nr. | UNINA-9910484328903321 |
| Berlin, : Springer, 2010 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Computer network security : Third International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2005, St. Petersburg, Russia, September 25-27, 2005 : proceedings / / Vladimir Gorodetsky, Igor Kotenko, Victor Skormin (eds.)
| Computer network security : Third International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2005, St. Petersburg, Russia, September 25-27, 2005 : proceedings / / Vladimir Gorodetsky, Igor Kotenko, Victor Skormin (eds.) |
| Edizione | [1st ed. 2005.] |
| Pubbl/distr/stampa | Berlin ; ; New York, : Springer, c2005 |
| Descrizione fisica | 1 online resource (XIV, 482 p.) |
| Disciplina | 005.8 |
| Altri autori (Persone) |
GorodetskiVladimir I. <1937->
KotenkoIgor SkorminVictor A. <1946-> |
| Collana | Lecture notes in computer science |
| Soggetto topico |
Computer networks - Security measures
Computer networks - Access control |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | Invited Papers -- Self-managed Cells for Ubiquitous Systems -- Critical Information Assurance Challenges for Modern Large-Scale Infrastructures -- Rule-Based Topological Vulnerability Analysis -- Models and Analysis of Active Worm Defense -- Prevention of Information Attacks by Run-Time Detection of Self-replication in Computer Codes -- Mathematical Models, Architectures and Protocols for Computer Network Security -- Calibrating Entropy Functions Applied to Computer Networks -- A Passive External Web Surveillance Technique for Private Networks -- A Secure Way to Combine IPsec, NAT & DHCP -- A Generic Model for Analyzing Security Protocols -- Networks, Markov Lie Monoids, and Generalized Entropy -- Trust by Workflow in Autonomic Communication -- An Ontology-Based Approach to Information Systems Security Management -- Authentication, Authorization and Access Control -- Safety Problems in Access Control with Temporal Constraints -- A Modal Logic for Role-Based Access Control -- Unique User-Generated Digital Pseudonyms -- Information Flow Analysis, Covert Channels and Trust Management -- A Probabilistic Property-Specific Approach to Information Flow -- Generalized Abstract Non-interference: Abstract Secure Information-Flow Analysis for Automata -- Detection of Illegal Information Flow -- Towards More Controllable and Practical Delegation -- Security Policy and Operating System Security -- Policy-Driven Routing Management Using CIM -- Secure Hybrid Operating System “Linux over Fenix” -- A Formal Description of SECIMOS Operating System -- Threat Modeling, Vulnerability Assessment and Network Forensics -- A Theoretical Model for the Average Impact of Attacks on Billing Infrastructures -- Analyzing Vulnerabilities and Measuring Security Level at Design and Exploitation Stages of Computer Network Life Cycle -- A Temporal Logic-Based Model for Forensic Investigation in Networked System Security -- Vulnerabilities Detection in the Configurations of MS Windows Operating System -- Intrusion Detection -- Hybrid Intrusion Detection Model Based on Ordered Sequences -- Asynchronous Alert Correlation in Multi-agent Intrusion Detection Systems -- Behavior-Based Model of Detection and Prevention of Intrusions in Computer Networks -- A Formal Immune Network and Its Implementation for On-line Intrusion Detection -- Short Papers -- Foundation for a Time Interval Access Control Model -- Developing an Insider Threat Model Using Functional Decomposition -- An XML-Seamless Policy Based Management Framework -- Statistical Covert Channels Through PROXY Server -- Encoding Private Key in Fingerprint -- A New Scheme for the Location Information Protection in Mobile Communication Environments -- Region Protection/Restoration Scheme in Survivable Networks -- Massive Data Mining for Polymorphic Code Detection -- Key Escrow with Tree-Based Access Structure -- Security Checker Architecture for Policy-Based Security Management -- An Efficient Access Control Model Utilized the Attribute Certificate Structuring -- Secure Protected Password Change Scheme. |
| Altri titoli varianti |
Third International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security
International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security MMM-ACNS 2005 |
| Record Nr. | UNINA-9910484246003321 |
| Berlin ; ; New York, : Springer, c2005 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||