دسترسی نامحدود
برای کاربرانی که ثبت نام کرده اند
برای ارتباط با ما می توانید از طریق شماره موبایل زیر از طریق تماس و پیامک با ما در ارتباط باشید
در صورت عدم پاسخ گویی از طریق پیامک با پشتیبان در ارتباط باشید
برای کاربرانی که ثبت نام کرده اند
درصورت عدم همخوانی توضیحات با کتاب
از ساعت 7 صبح تا 10 شب
ویرایش: [1 ed.] نویسندگان: Juan José Gude Prego, José Gaviria de la Puerta, Pablo García Bringas, Héctor Quintián, Emilio Corchado سری: ISBN (شابک) : 3030878716, 9783030878719 ناشر: Springer سال نشر: 2021 تعداد صفحات: 436 [430] زبان: English فرمت فایل : PDF (درصورت درخواست کاربر به PDF، EPUB یا AZW3 تبدیل می شود) حجم فایل: 36 Mb
در صورت تبدیل فایل کتاب 14th International Conference on Computational Intelligence in Security for Information Systems and 12th International Conference on European ... in Intelligent Systems and Computing) به فرمت های PDF، EPUB، AZW3، MOBI و یا DJVU می توانید به پشتیبان اطلاع دهید تا فایل مورد نظر را تبدیل نمایند.
توجه داشته باشید کتاب چهاردهمین کنفرانس بین المللی هوش محاسباتی در امنیت سیستم های اطلاعاتی و دوازدهمین کنفرانس بین المللی اروپا در سیستم های هوشمند و محاسبات) نسخه زبان اصلی می باشد و کتاب ترجمه شده به فارسی نمی باشد. وبسایت اینترنشنال لایبرری ارائه دهنده کتاب های زبان اصلی می باشد و هیچ گونه کتاب ترجمه شده یا نوشته شده به فارسی را ارائه نمی دهد.
این کتاب پیشرفت در محاسبات هوشمند و نرم شامل مقالات پذیرفته شده ارائه شده در CISIS 2021 و ICEUTE 2021، همه کنفرانس هایی است که در شهر زیبا و تاریخی بیلبائو (اسپانیا)، در سپتامبر 2021 برگزار شد. هدف چهاردهمین کنفرانس CISIS 20121 ارائه فرصتی برای ملاقات برای محققان دانشگاهی و مرتبط با صنعت که متعلق به جوامع مختلف و گسترده هوش محاسباتی، امنیت اطلاعات و داده کاوی هستند. نیاز به رفتار هوشمند و انعطافپذیر توسط سیستمهای بزرگ و پیچیده، بهویژه در حوزههای حیاتی مأموریت، به عنوان کاتالیزور و محرک تجمع برای رویداد کلی در نظر گرفته شده است. کمیته برنامه بینالمللی CISIS 2021 پس از یک فرآیند بررسی همتا، 23 مقاله را انتخاب کرد که در مجموعه مقالات این کنفرانس منتشر شدهاند و نرخ پذیرش 40 درصد را به دست آوردند. در این ویرایش مربوطه، تاکید ویژه ای بر تشکیل جلسات ویژه شده است. یک جلسه ویژه در ارتباط با موضوعات مرتبط به شرح زیر سازماندهی شده است: ایجاد اعتماد در اکوسیستم ها و اجزای اکوسیستم. در مورد ICEUTE 12th 2021، کمیته برنامه بین المللی 17 مقاله را انتخاب کرد که در مجموعه مقالات این کنفرانس منتشر شده است. یک جلسه ویژه در ارتباط با موضوعات مرتبط به شرح زیر سازماندهی شده است: اهداف شخصی پایدار: درگیر کردن دانش آموزان در فرآیند یادگیری آنها. انتخاب مقالات به منظور حفظ کیفیت بالای کنفرانس بسیار دقیق است و از زحمات اعضای کمیته های برنامه در فرآیند بررسی تشکر می کنیم. این یک فرآیند حیاتی برای ایجاد یک کنفرانس با استاندارد بالا است و کنفرانس های CISIS و ICEUTE بدون کمک آنها وجود نداشتند.
This book of Advances in Intelligent and Soft Computing contains accepted papers presented at CISIS 2021 and ICEUTE 2021, all conferences held in the beautiful and historic city of Bilbao (Spain), in September 2021. The aim of the 14th CISIS 20121 conference is to offer a meeting opportunity for academic and industry-related researchers belonging to the various, vast communities of computational intelligence, information security, and data mining. The need for intelligent, flexible behavior by large, complex systems, especially in mission-critical domains, is intended to be the catalyst and the aggregation stimulus for the overall event. After a through peer-review process, the CISIS 2021 International Program Committee selected 23 papers which are published in these conference proceedings achieving an acceptance rate of 40%. In this relevant edition, a special emphasis was put on the organization of special sessions. One special session is organized related to relevant topics as follows: building trust in ecosystems and ecosystem components. In the case of 12th ICEUTE 2021, the International Program Committee selected 17 papers, which are published in these conference proceedings. One special session is organized related to relevant topics as follows: sustainable personal goals: engaging students in their learning process. The selection of papers is extremely rigorous in order to maintain the high quality of the conference, and we would like to thank the members of the program committees for their hard work in the reviewing process. This is a crucial process to the creation of a high standard conference, and the CISIS and ICEUTE conferences would not exist without their help.
Preface CISIS 2021 Organization General Chair Local Chair Local Co-chairs Program Committee Chairs Program Committee CISIS 2021: Special Sessions Building Trust in Ecosystems and Ecosystem Components Program Committee CISIS 2021 Organizing Committee Chairs CISIS 2021 Organizing Committee ICEUTE 2021 Organization General Chair Local Chair Local Co-chairs Program Committee Chairs Program Committee ICEUTE 2021: Special Sessions Sustainable Personal Goals: Engaging Students in their Learning Process Program Committee ICEUTE 2021 Organizing Committee Chairs ICEUTE 2021 Organizing Committee Contents General Track A Fast Heterogeneous Approach to Enhanced Blockchain Attack Resilience and Mitigation 1 Introduction 2 Related Work 2.1 The CUDA Framework 2.2 Challenges in Heterogeneous Implementations 3 Implementation 4 Experimental Results 5 Conclusion References Estimating Re-identification Risk by Means of Formal Conceptualization 1 Introduction 2 Background 2.1 Risk-Based Methodologies for Preserving Privacy 2.2 Formal Concept Analysis 3 Estimating Risk Using Formal Concepts 3.1 Semantic Interpretation of Risk Metrics 3.2 Semantic Risk 3.3 Semantic Risk Management 4 Conclusions and Future Work References Beta Hebbian Learning for Intrusion Detection in Networks of IoT Devices 1 Introduction 2 Case Study 3 Dataset 4 Beta Hebbian Learning Algorithm as Projection Model for CyberActtacks Visualization 5 Experiments and Results 6 Conclusions and Future Works References Attacks Detection on Sampled Netflow Traffic Through Image Analysis with Convolutional Neural Networks (CNN) 1 Introduction 2 Materials and Methods 2.1 Data Gathering 2.2 Image Generation 2.3 Training the CNN 3 Results 4 Conclusions and Further Work References Analysis of the Performance of Different Accountability Strategies for Autonomous Robots 1 Introduction 2 System Architecture 3 System Application Using Sysdig, Librdkafka, Apache Kafka and MongoDB 3.1 Sysdig 3.2 Librdkafka Message Producer 3.3 Apache Kafka 3.4 MongoDB 4 Experimentation 4.1 Software Artifacts 5 Evaluation 5.1 Assessment Scenarios 5.2 Metrics 6 Results and Discussion 6.1 Log Benchmarking 6.2 System Benchmarking 7 Conclusions References Analysis of NetFlow Features' Importance in Malicious Network Traffic Detection 1 Introduction 2 Materials and Methods 2.1 NetFlow 2.2 RedCAYLE 2.3 MoEv 2.4 DOROTHEA 2.5 Data Gathering 2.6 Evaluation 3 Results and Discussion 4 Conclusions References Localizing Worst-Parent Rank Attack Using Intelligent Edges of Smart Buildings 1 Introduction 1.1 Background 1.2 Related Work 2 System Description 3 Worst-Parent Attack 4 Simulation of Worst-Parent Attack 5 Results and Discussion 5.1 Preprocessing and Machine Learning 5.2 Results 5.3 Discussion 6 Conclusions References Towards a Fog Based Computing Conceptual Framework for Biometric Digital Identification Systems 1 Introduction 1.1 Motivation 1.2 Background of the Problem 1.3 Statement of Background of the Problem 2 Related Works 3 Current State of Research 4 A Conceptual Framework for IOT and Data Cloud Biometric Digital Identities 5 Evaluation of the Conceptual Framework 5.1 Results 6 Conclusion and Future Work References Detection of Denial of Service Attacks in an MQTT Environment Using a One-Class Approach 1 Introduction 2 Case Study 2.1 Dataset Description 3 Classifier Approach to Detect DoS Attacks 3.1 Classifier Approach 3.2 Methods 3.3 Experiments Setup 3.4 Preprocessing 3.5 Results 4 Conclusions and Futures Works References Fuzzy Logic System for Risk and Energy Efficiency Estimation of Driving Maneuvers 1 Introduction 2 Road and Vehicle Dynamics 3 Risky Maneuvers Identification by a Fuzzy Mamdani System 3.1 Variables of the Fuzzy Inference System 3.2 Mamdani-Type Fuzzy Identification System 4 Results and Discussion 5 Conclusions and Future Work References Machine Learning Ensemble Methods for Optical Network Traffic Prediction 1 Introduction 2 Datasets 3 Network Model and Machine Learning Approach 4 Numerical Results 5 Conclusions References Assessing the Impact of Batch-Based Data Aggregation Techniques for Feature Engineering on Machine Learning-Based Network IDSs 1 Introduction 2 Dataset and Methods 2.1 UGR'16 Dataset 2.2 Methods 3 Experimental Design 4 Results and Discussion 5 Conclusions and Future Work References Gait-Based Authentication Using a RGB Camera 1 Introduction 2 Materials and Methods 2.1 OpenPose 2.2 Dataset 2.3 Data Labeling 2.4 Model Fitting 2.5 Methods of Evaluation 3 Results 4 Discussion 5 Conclusions References The Neverending Story: Memory Corruption 30 Years Later 1 Introduction 2 Background 3 Memory Error Detection 3.1 Static Analysis 3.2 Instrumentation and Runtime Monitoring 3.3 Fuzzing 3.4 Symbolic Execution 4 Memory Corruption Exploitation 4.1 Code-Reuse Attacks 4.2 Data-Only Attacks 5 Defense Strategies 5.1 Enhanced Software Diversity 5.2 Control-Flow Integrity 5.3 Data-Flow Integrity 5.4 Software Fault Isolation 6 Related Work 7 Conclusion References StegoPass – Utilization of Steganography to Produce a Novel Unbreakable Biometric Based Password Authentication Scheme 1 Introduction 2 Methodology 3 Experimental Results 4 Conclusion and Future Work References A Repeated Mistake is a Choice: Considering Security Issues and Risks in Quantum Computing from Scratch 1 Introduction 2 Quantum Programming Languages (QPL) 2.1 Imperative Languages 3 Limitations of the Hardware 4 Analysis for Security in Quantum Languages 4.1 Analysis of the Base Language 4.2 Analysis of Errors in the Definition of Circuits 4.3 Dynamic Analysis of the Program 4.4 Work of Mention 5 Conclusions References Advanced 3D Visualization of Android Malware Families 1 Introduction 2 HUEPs 3 Experimental Study 3.1 Android Malware Genome Dataset 3.2 Obtained HUEP Visualizations 4 Conclusions and Future Work References SPECIAL SESSION: Building Trust in Ecosystems and Ecosystem Components BIECO Runtime Auditing Framework 1 Introduction 2 Related Work 3 Conceptual Idea 4 BIECO Auditing Process 5 Runtime Auditing Framework 5.1 Predictive Simulation 5.2 Runtime Monitoring 6 Conclusions and Future Work References Basic Aspects in Redundancy-Based Intrusion Tolerance 1 Introduction and Related Work 2 Overview of Redundancy-Based Intrusion Tolerance 3 Cyber Attack Model 4 Categories of System Components Targeted by Attacks 5 System Model and Failure Assumptions 6 Type of Redundancy 7 Final Considerations and Next Steps References A Survey on the State of the Art of Vulnerability Assessment Techniques 1 Introduction 2 Vulnerability Detection Techniques 2.1 Anomaly Detection-Based Techniques 2.2 Vulnerable Code Pattern Recognition 2.3 Vulnerability Prediction Models 3 Vulnerability Exploitability Forecasting Techniques 4 Vulnerability Propagation Models 5 Conclusions References Data Based Message Validation as a Security Cornerstone in Loose Coupling Software Architecture 1 Introduction 1.1 Related Work 2 Context of the Work 2.1 Functional Requirements for the Communication Channel 2.2 Non-functional Requirements for the Communication Channel 3 Architecture of the Communication Channel 4 Architecture Validation 5 Conclusions References A Comparative Study of the Most Important Methods for Forecasting the ICT Systems Vulnerabilities 1 Introduction 2 Methods of Forecasting the ICT Systems Vulnerabilities 2.1 Time Series Forecasting Based Models 2.2 Artificial Intelligence-Based Models 2.3 ICT Vulnerabilities Forecasting 3 Conclusions References Comparison of Safety and Security Analysis Techniques 1 Introduction 2 Background 3 State-of-the-Art 3.1 CHASSIS 3.2 FMEVA 3.3 SAHARA 3.4 STPA-Sec 4 Applying Safety and Security Analysis Methods on Collaborating Systems 4.1 Use Case Definition 5 Conclusions and Future Work References General Track A Simple User Guide for Erasmus+ Teaching and Training. The Case of the University of Catania 1 Introduction, Approaches, Methodologies and Dataset of the REALISE Project 2 Results: The Case Study of the University of Catania 3 Conclusions References Virtual Implementation of Practical Control Subjects as an Alternative to Face-to-Face Laboratory Lessons 1 Introduction 2 Background 3 Case Study 3.1 Tank-Level Plant 3.2 Control System 4 Integration Approach 4.1 Virtual Plant with Factory I/O 4.2 Interface and Control with Node-RED 5 Implemented Solution 5.1 Communicating Applications over Modbus TCP 5.2 PID Control with Node-RED 5.3 Visualization, Analysis and Results 6 Conclusions and Future Works References Longitudinal Study of the Learning Styles Evolution in Engineering Degrees 1 Introduction 2 Academic Context 3 Evaluation Methodologies 4 Project Results 5 Conclusions References Peer Assessments in Engineering: A Pilot Project 1 Introduction 2 Academic Context 3 Evaluation Methodologies 4 Project Results 5 Discussion 6 Conclusions References Game-Based Student Response System Applied to Soil Mechanics and Foundations 1 Introduction 2 Method and Materials 2.1 Research Approach 2.2 Procedure 2.3 Curriculum Material 3 Analysis of the Results 4 Conclusion 5 Appendix References Longitudinal Study of Grades for the Industrial Electronics and Automation Engineering Degree Programme 1 Introduction 2 Methodology 3 Results 3.1 Analysis of the Subjects with the Worst Rates of Performance 4 Conclusions References Analysis of Students' Online Interactions in the Covid Era from the Perspective of Anomaly Detection 1 Introduction 2 Data Acquisition and Processing 2.1 Activity Logging and Metrics Extraction 2.2 Metrics and Data Preprocessing 2.3 Anomaly Detection 2.4 Outlier Analysis Discussion 3 Experimental Set-Up 4 Results 5 Conclusions and Future Work References Low Cost Three-Phase Motor Speed Control System Design for Educational Laboratory Practices 1 Introduction 2 The Control Engineering Laboratory 2.1 Laboratory Background 2.2 Motivation and Objectives 3 Proposal 3.1 Motor-Loads-Sensor Arrangement 3.2 Motor Selection and Load System Design 3.3 Selection and Arrangement of the Speed Sensor 3.4 Variable Frequency Drive (VFD) Selection 3.5 Data Acquisition Card (DAQ) 3.6 Safety Devices 4 Results 5 Conclusions and Future Works References Evaluation of E-learning Criteria to Improve the Academic and Functional Results of PhD Studies 1 Introduction 2 E-learning Context in Third Cycle (PhD) Studies 2.1 Doctoral Program Review. A Particular Case Study (UBU) 3 Summative Dimensions of E-learning. A Criteria Rubric for PhD Studies 4 Analysis of Survey Results 5 Conclusions and Future Work References Learning by Doing in Higher Education: An Experience to Increase Self-learning and Motivation in First Courses 1 Introduction 2 Description of the PjBL Activity 3 Results 4 Conclusions References Experience of a Lifetime: Erasmus+ Traineeship Mobility on a Wind Energy Project 1 Introduction 2 The University of Origin 2.1 A Personal Experience: A Long Process to Get There 2.2 Pros and Cons 3 From the Host University 3.1 The Destination University 4 Joining a Research Project on Renewable Energies 4.1 The Project of the Traineeship 4.2 The Floating Wind Turbine Prototype 5 Conclusions References Social Perceptions of Science and Technology Among Students of Early Childhood and Primary Education 1 Introduction and Rationale 2 Objectives 3 Methodology 4 Results 5 Conclusions References SPECIAL SESSION: Sustainable Personal Goals: Engaging Students in their Learning Process Wind Turbines Control Optimization: A Problem-Driven Proposal to Learn Genetic Algorithms 1 Introduction 2 Didactic Proposal 2.1 Competences 2.2 Objectives 2.3 Contents and Planning 2.4 Evaluation 3 Script of the Practical Exercises 4 Conclusions and Future Works References Development of Competencies Applying the Project Method. Application in Environmental Engineering 1 Introduction 2 Methodology 3 Results 4 Discussion References A Systematic Review of the Inclusion of Education for Sustainable Development in Environmental Engineering 1 Introduction 2 Methodology 3 Results 3.1 Applied Competencies in Environmental Engineering 3.2 University Strategies to Promote SD 3.3 Specific Activities Around ESD 3.4 University Methodologies that Promote Sustainable Development 4 Discussion References Bioengineering as a Strategy for the Consolidation of Innovation and Technological Development Processes in the Central Zone of Colombia 1 Introduction 2 Objectives 2.1 General Objective 2.2 Specific Objectives 3 Methodology 4 Analysis and Results 4.1 Analysis 4.2 Results 5 Conclusions References Challenges and Competences in Master Degrees from a Comprehensive Security Perspective 1 Introduction 2 Comprehensive Security Background 3 Master’s Degree in Comprehensive Security 3.1 MCS Objectives 3.2 MCS Competences 3.3 MCS Curriculum and Program 4 Conclusions References Author Index