ورود به حساب

نام کاربری گذرواژه

گذرواژه را فراموش کردید؟ کلیک کنید

حساب کاربری ندارید؟ ساخت حساب

ساخت حساب کاربری

نام نام کاربری ایمیل شماره موبایل گذرواژه

برای ارتباط با ما می توانید از طریق شماره موبایل زیر از طریق تماس و پیامک با ما در ارتباط باشید


09117307688
09117179751

در صورت عدم پاسخ گویی از طریق پیامک با پشتیبان در ارتباط باشید

دسترسی نامحدود

برای کاربرانی که ثبت نام کرده اند

ضمانت بازگشت وجه

درصورت عدم همخوانی توضیحات با کتاب

پشتیبانی

از ساعت 7 صبح تا 10 شب

دانلود کتاب 14th International Conference on Computational Intelligence in Security for Information Systems and 12th International Conference on European ... in Intelligent Systems and Computing)

دانلود کتاب چهاردهمین کنفرانس بین المللی هوش محاسباتی در امنیت سیستم های اطلاعاتی و دوازدهمین کنفرانس بین المللی اروپا در سیستم های هوشمند و محاسبات)

14th International Conference on Computational Intelligence in Security for Information Systems and 12th International Conference on European ... in Intelligent Systems and Computing)

مشخصات کتاب

14th International Conference on Computational Intelligence in Security for Information Systems and 12th International Conference on European ... in Intelligent Systems and Computing)

ویرایش: [1 ed.] 
نویسندگان: , , , ,   
سری:  
ISBN (شابک) : 3030878716, 9783030878719 
ناشر: Springer 
سال نشر: 2021 
تعداد صفحات: 436
[430] 
زبان: English 
فرمت فایل : PDF (درصورت درخواست کاربر به PDF، EPUB یا AZW3 تبدیل می شود) 
حجم فایل: 36 Mb 

قیمت کتاب (تومان) : 29,000



ثبت امتیاز به این کتاب

میانگین امتیاز به این کتاب :
       تعداد امتیاز دهندگان : 3


در صورت تبدیل فایل کتاب 14th International Conference on Computational Intelligence in Security for Information Systems and 12th International Conference on European ... in Intelligent Systems and Computing) به فرمت های PDF، EPUB، AZW3، MOBI و یا DJVU می توانید به پشتیبان اطلاع دهید تا فایل مورد نظر را تبدیل نمایند.

توجه داشته باشید کتاب چهاردهمین کنفرانس بین المللی هوش محاسباتی در امنیت سیستم های اطلاعاتی و دوازدهمین کنفرانس بین المللی اروپا در سیستم های هوشمند و محاسبات) نسخه زبان اصلی می باشد و کتاب ترجمه شده به فارسی نمی باشد. وبسایت اینترنشنال لایبرری ارائه دهنده کتاب های زبان اصلی می باشد و هیچ گونه کتاب ترجمه شده یا نوشته شده به فارسی را ارائه نمی دهد.


توضیحاتی در مورد کتاب چهاردهمین کنفرانس بین المللی هوش محاسباتی در امنیت سیستم های اطلاعاتی و دوازدهمین کنفرانس بین المللی اروپا در سیستم های هوشمند و محاسبات)

این کتاب پیشرفت در محاسبات هوشمند و نرم شامل مقالات پذیرفته شده ارائه شده در CISIS 2021 و ICEUTE 2021، همه کنفرانس هایی است که در شهر زیبا و تاریخی بیلبائو (اسپانیا)، در سپتامبر 2021 برگزار شد. هدف چهاردهمین کنفرانس CISIS 20121 ارائه فرصتی برای ملاقات برای محققان دانشگاهی و مرتبط با صنعت که متعلق به جوامع مختلف و گسترده هوش محاسباتی، امنیت اطلاعات و داده کاوی هستند. نیاز به رفتار هوشمند و انعطاف‌پذیر توسط سیستم‌های بزرگ و پیچیده، به‌ویژه در حوزه‌های حیاتی مأموریت، به عنوان کاتالیزور و محرک تجمع برای رویداد کلی در نظر گرفته شده است. کمیته برنامه بین‌المللی CISIS 2021 پس از یک فرآیند بررسی همتا، 23 مقاله را انتخاب کرد که در مجموعه مقالات این کنفرانس منتشر شده‌اند و نرخ پذیرش 40 درصد را به دست آوردند. در این ویرایش مربوطه، تاکید ویژه ای بر تشکیل جلسات ویژه شده است. یک جلسه ویژه در ارتباط با موضوعات مرتبط به شرح زیر سازماندهی شده است: ایجاد اعتماد در اکوسیستم ها و اجزای اکوسیستم. در مورد ICEUTE 12th 2021، کمیته برنامه بین المللی 17 مقاله را انتخاب کرد که در مجموعه مقالات این کنفرانس منتشر شده است. یک جلسه ویژه در ارتباط با موضوعات مرتبط به شرح زیر سازماندهی شده است: اهداف شخصی پایدار: درگیر کردن دانش آموزان در فرآیند یادگیری آنها. انتخاب مقالات به منظور حفظ کیفیت بالای کنفرانس بسیار دقیق است و از زحمات اعضای کمیته های برنامه در فرآیند بررسی تشکر می کنیم. این یک فرآیند حیاتی برای ایجاد یک کنفرانس با استاندارد بالا است و کنفرانس های CISIS و ICEUTE بدون کمک آنها وجود نداشتند.


توضیحاتی درمورد کتاب به خارجی

This book of Advances in Intelligent and Soft Computing contains accepted papers presented at CISIS 2021 and ICEUTE 2021, all conferences held in the beautiful and historic city of Bilbao (Spain), in September 2021. The aim of the 14th CISIS 20121 conference is to offer a meeting opportunity for academic and industry-related researchers belonging to the various, vast communities of computational intelligence, information security, and data mining. The need for intelligent, flexible behavior by large, complex systems, especially in mission-critical domains, is intended to be the catalyst and the aggregation stimulus for the overall event. After a through peer-review process, the CISIS 2021 International Program Committee selected 23 papers which are published in these conference proceedings achieving an acceptance rate of 40%. In this relevant edition, a special emphasis was put on the organization of special sessions. One special session is organized related to relevant topics as follows: building trust in ecosystems and ecosystem components. In the case of 12th ICEUTE 2021, the International Program Committee selected 17 papers, which are published in these conference proceedings. One special session is organized related to relevant topics as follows: sustainable personal goals: engaging students in their learning process. The selection of papers is extremely rigorous in order to maintain the high quality of the conference, and we would like to thank the members of the program committees for their hard work in the reviewing process. This is a crucial process to the creation of a high standard conference, and the CISIS and ICEUTE conferences would not exist without their help.



فهرست مطالب

Preface
CISIS 2021
	Organization
	General Chair
	Local Chair
	Local Co-chairs
	Program Committee Chairs
	Program Committee
	CISIS 2021: Special Sessions
	Building Trust in Ecosystems and Ecosystem Components
	Program Committee
	CISIS 2021 Organizing Committee Chairs
	CISIS 2021 Organizing Committee
ICEUTE 2021
	Organization
	General Chair
	Local Chair
	Local Co-chairs
	Program Committee Chairs
	Program Committee
	ICEUTE 2021: Special Sessions
	Sustainable Personal Goals: Engaging Students in their Learning Process
	Program Committee
	ICEUTE 2021 Organizing Committee Chairs
	ICEUTE 2021 Organizing Committee
Contents
General Track
A Fast Heterogeneous Approach to Enhanced Blockchain Attack Resilience and Mitigation
	1 Introduction
	2 Related Work
		2.1 The CUDA Framework
		2.2 Challenges in Heterogeneous Implementations
	3 Implementation
	4 Experimental Results
	5 Conclusion
	References
Estimating Re-identification Risk by Means of Formal Conceptualization
	1 Introduction
	2 Background
		2.1 Risk-Based Methodologies for Preserving Privacy
		2.2 Formal Concept Analysis
	3 Estimating Risk Using Formal Concepts
		3.1 Semantic Interpretation of Risk Metrics
		3.2 Semantic Risk
		3.3 Semantic Risk Management
	4 Conclusions and Future Work
	References
Beta Hebbian Learning for Intrusion Detection in Networks of IoT Devices
	1 Introduction
	2 Case Study
	3 Dataset
	4 Beta Hebbian Learning Algorithm as Projection Model for CyberActtacks Visualization
	5 Experiments and Results
	6 Conclusions and Future Works
	References
Attacks Detection on Sampled Netflow Traffic Through Image Analysis with Convolutional Neural Networks (CNN)
	1 Introduction
	2 Materials and Methods
		2.1 Data Gathering
		2.2 Image Generation
		2.3 Training the CNN
	3 Results
	4 Conclusions and Further Work
	References
Analysis of the Performance of Different Accountability Strategies for Autonomous Robots
	1 Introduction
	2 System Architecture
	3 System Application Using Sysdig, Librdkafka, Apache Kafka and MongoDB
		3.1 Sysdig
		3.2 Librdkafka Message Producer
		3.3 Apache Kafka
		3.4 MongoDB
	4 Experimentation
		4.1 Software Artifacts
	5 Evaluation
		5.1 Assessment Scenarios
		5.2 Metrics
	6 Results and Discussion
		6.1 Log Benchmarking
		6.2 System Benchmarking
	7 Conclusions
	References
Analysis of NetFlow Features' Importance in Malicious Network Traffic Detection
	1 Introduction
	2 Materials and Methods
		2.1 NetFlow
		2.2 RedCAYLE
		2.3 MoEv
		2.4 DOROTHEA
		2.5 Data Gathering
		2.6 Evaluation
	3 Results and Discussion
	4 Conclusions
	References
Localizing Worst-Parent Rank Attack Using Intelligent Edges of Smart Buildings
	1 Introduction
		1.1 Background
		1.2 Related Work
	2 System Description
	3 Worst-Parent Attack
	4 Simulation of Worst-Parent Attack
	5 Results and Discussion
		5.1 Preprocessing and Machine Learning
		5.2 Results
		5.3 Discussion
	6 Conclusions
	References
Towards a Fog Based Computing Conceptual Framework for Biometric Digital Identification Systems
	1 Introduction
		1.1 Motivation
		1.2 Background of the Problem
		1.3 Statement of Background of the Problem
	2 Related Works
	3 Current State of Research
	4 A Conceptual Framework for IOT and Data Cloud Biometric Digital Identities
	5 Evaluation of the Conceptual Framework
		5.1 Results
	6 Conclusion and Future Work
	References
Detection of Denial of Service Attacks in an MQTT Environment Using a One-Class Approach
	1 Introduction
	2 Case Study
		2.1 Dataset Description
	3 Classifier Approach to Detect DoS Attacks
		3.1 Classifier Approach
		3.2 Methods
		3.3 Experiments Setup
		3.4 Preprocessing
		3.5 Results
	4 Conclusions and Futures Works
	References
Fuzzy Logic System for Risk and Energy Efficiency Estimation of Driving Maneuvers
	1 Introduction
	2 Road and Vehicle Dynamics
	3 Risky Maneuvers Identification by a Fuzzy Mamdani System
		3.1 Variables of the Fuzzy Inference System
		3.2 Mamdani-Type Fuzzy Identification System
	4 Results and Discussion
	5 Conclusions and Future Work
	References
Machine Learning Ensemble Methods for Optical Network Traffic Prediction
	1 Introduction
	2 Datasets
	3 Network Model and Machine Learning Approach
	4 Numerical Results
	5 Conclusions
	References
Assessing the Impact of Batch-Based Data Aggregation Techniques for Feature Engineering on Machine Learning-Based Network IDSs
	1 Introduction
	2 Dataset and Methods
		2.1 UGR'16 Dataset
		2.2 Methods
	3 Experimental Design
	4 Results and Discussion
	5 Conclusions and Future Work
	References
Gait-Based Authentication Using a RGB Camera
	1 Introduction
	2 Materials and Methods
		2.1 OpenPose
		2.2 Dataset
		2.3 Data Labeling
		2.4 Model Fitting
		2.5 Methods of Evaluation
	3 Results
	4 Discussion
	5 Conclusions
	References
The Neverending Story: Memory Corruption 30 Years Later
	1 Introduction
	2 Background
	3 Memory Error Detection
		3.1 Static Analysis
		3.2 Instrumentation and Runtime Monitoring
		3.3 Fuzzing
		3.4 Symbolic Execution
	4 Memory Corruption Exploitation
		4.1 Code-Reuse Attacks
		4.2 Data-Only Attacks
	5 Defense Strategies
		5.1 Enhanced Software Diversity
		5.2 Control-Flow Integrity
		5.3 Data-Flow Integrity
		5.4 Software Fault Isolation
	6 Related Work
	7 Conclusion
	References
StegoPass – Utilization of Steganography to Produce a Novel Unbreakable Biometric Based Password Authentication Scheme
	1 Introduction
	2 Methodology
	3 Experimental Results
	4 Conclusion and Future Work
	References
A Repeated Mistake is a Choice: Considering Security Issues and Risks in Quantum Computing from Scratch
	1 Introduction
	2 Quantum Programming Languages (QPL)
		2.1 Imperative Languages
	3 Limitations of the Hardware
	4 Analysis for Security in Quantum Languages
		4.1 Analysis of the Base Language
		4.2 Analysis of Errors in the Definition of Circuits
		4.3 Dynamic Analysis of the Program
		4.4 Work of Mention
	5 Conclusions
	References
Advanced 3D Visualization of Android Malware Families
	1 Introduction
	2 HUEPs
	3 Experimental Study
		3.1 Android Malware Genome Dataset
		3.2 Obtained HUEP Visualizations
	4 Conclusions and Future Work
	References
SPECIAL SESSION: Building Trust in Ecosystems and Ecosystem Components
BIECO Runtime Auditing Framework
	1 Introduction
	2 Related Work
	3 Conceptual Idea
	4 BIECO Auditing Process
	5 Runtime Auditing Framework
		5.1 Predictive Simulation
		5.2 Runtime Monitoring
	6 Conclusions and Future Work
	References
Basic Aspects in Redundancy-Based Intrusion Tolerance
	1 Introduction and Related Work
	2 Overview of Redundancy-Based Intrusion Tolerance
	3 Cyber Attack Model
	4 Categories of System Components Targeted by Attacks
	5 System Model and Failure Assumptions
	6 Type of Redundancy
	7 Final Considerations and Next Steps
	References
A Survey on the State of the Art of Vulnerability Assessment Techniques
	1 Introduction
	2 Vulnerability Detection Techniques
		2.1 Anomaly Detection-Based Techniques
		2.2 Vulnerable Code Pattern Recognition
		2.3 Vulnerability Prediction Models
	3 Vulnerability Exploitability Forecasting Techniques
	4 Vulnerability Propagation Models
	5 Conclusions
	References
Data Based Message Validation as a Security Cornerstone in Loose Coupling Software Architecture
	1 Introduction
		1.1 Related Work
	2 Context of the Work
		2.1 Functional Requirements for the Communication Channel
		2.2 Non-functional Requirements for the Communication Channel
	3 Architecture of the Communication Channel
	4 Architecture Validation
	5 Conclusions
	References
A Comparative Study of the Most Important Methods for Forecasting the ICT Systems Vulnerabilities
	1 Introduction
	2 Methods of Forecasting the ICT Systems Vulnerabilities
		2.1 Time Series Forecasting Based Models
		2.2 Artificial Intelligence-Based Models
		2.3 ICT Vulnerabilities Forecasting
	3 Conclusions
	References
Comparison of Safety and Security Analysis Techniques
	1 Introduction
	2 Background
	3 State-of-the-Art
		3.1 CHASSIS
		3.2 FMEVA
		3.3 SAHARA
		3.4 STPA-Sec
	4 Applying Safety and Security Analysis Methods on Collaborating Systems
		4.1 Use Case Definition
	5 Conclusions and Future Work
	References
General Track
A Simple User Guide for Erasmus+ Teaching and Training. The Case of the University of Catania
	1 Introduction, Approaches, Methodologies and Dataset of the REALISE Project
	2 Results: The Case Study of the University of Catania
	3 Conclusions
	References
Virtual Implementation of Practical Control Subjects as an Alternative to Face-to-Face Laboratory Lessons
	1 Introduction
	2 Background
	3 Case Study
		3.1 Tank-Level Plant
		3.2 Control System
	4 Integration Approach
		4.1 Virtual Plant with Factory I/O
		4.2 Interface and Control with Node-RED
	5 Implemented Solution
		5.1 Communicating Applications over Modbus TCP
		5.2 PID Control with Node-RED
		5.3 Visualization, Analysis and Results
	6 Conclusions and Future Works
	References
Longitudinal Study of the Learning Styles Evolution in Engineering Degrees
	1 Introduction
	2 Academic Context
	3 Evaluation Methodologies
	4 Project Results
	5 Conclusions
	References
Peer Assessments in Engineering: A Pilot Project
	1 Introduction
	2 Academic Context
	3 Evaluation Methodologies
	4 Project Results
	5 Discussion
	6 Conclusions
	References
Game-Based Student Response System Applied to Soil Mechanics and Foundations
	1 Introduction
	2 Method and Materials
		2.1 Research Approach
		2.2 Procedure
		2.3 Curriculum Material
	3 Analysis of the Results
	4 Conclusion
	5 Appendix
	References
Longitudinal Study of Grades for the Industrial Electronics and Automation Engineering Degree Programme
	1 Introduction
	2 Methodology
	3 Results
		3.1 Analysis of the Subjects with the Worst Rates of Performance
	4 Conclusions
	References
Analysis of Students' Online Interactions in the Covid Era from the Perspective of Anomaly Detection
	1 Introduction
	2 Data Acquisition and Processing
		2.1 Activity Logging and Metrics Extraction
		2.2 Metrics and Data Preprocessing
		2.3 Anomaly Detection
		2.4 Outlier Analysis Discussion
	3 Experimental Set-Up
	4 Results
	5 Conclusions and Future Work
	References
Low Cost Three-Phase Motor Speed Control System Design for Educational Laboratory Practices
	1 Introduction
	2 The Control Engineering Laboratory
		2.1 Laboratory Background
		2.2 Motivation and Objectives
	3 Proposal
		3.1 Motor-Loads-Sensor Arrangement
		3.2 Motor Selection and Load System Design
		3.3 Selection and Arrangement of the Speed Sensor
		3.4 Variable Frequency Drive (VFD) Selection
		3.5 Data Acquisition Card (DAQ)
		3.6 Safety Devices
	4 Results
	5 Conclusions and Future Works
	References
Evaluation of E-learning Criteria to Improve the Academic and Functional Results of PhD Studies
	1 Introduction
	2 E-learning Context in Third Cycle (PhD) Studies
		2.1 Doctoral Program Review. A Particular Case Study (UBU)
	3 Summative Dimensions of E-learning. A Criteria Rubric for PhD Studies
	4 Analysis of Survey Results
	5 Conclusions and Future Work
	References
Learning by Doing in Higher Education: An Experience to Increase Self-learning and Motivation in First Courses
	1 Introduction
	2 Description of the PjBL Activity
	3 Results
	4 Conclusions
	References
Experience of a Lifetime: Erasmus+ Traineeship Mobility on a Wind Energy Project
	1 Introduction
	2 The University of Origin
		2.1 A Personal Experience: A Long Process to Get There
		2.2 Pros and Cons
	3 From the Host University
		3.1 The Destination University
	4 Joining a Research Project on Renewable Energies
		4.1 The Project of the Traineeship
		4.2 The Floating Wind Turbine Prototype
	5 Conclusions
	References
Social Perceptions of Science and Technology Among Students of Early Childhood and Primary Education
	1 Introduction and Rationale
	2 Objectives
	3 Methodology
	4 Results
	5 Conclusions
	References
SPECIAL SESSION: Sustainable Personal Goals: Engaging Students in their Learning Process
Wind Turbines Control Optimization: A Problem-Driven Proposal to Learn Genetic Algorithms
	1 Introduction
	2 Didactic Proposal
		2.1 Competences
		2.2 Objectives
		2.3 Contents and Planning
		2.4 Evaluation
	3 Script of the Practical Exercises
	4 Conclusions and Future Works
	References
Development of Competencies Applying the Project Method. Application in Environmental Engineering
	1 Introduction
	2 Methodology
	3 Results
	4 Discussion
	References
A Systematic Review of the Inclusion of Education for Sustainable Development in Environmental Engineering
	1 Introduction
	2 Methodology
	3 Results
		3.1 Applied Competencies in Environmental Engineering
		3.2 University Strategies to Promote SD
		3.3 Specific Activities Around ESD
		3.4 University Methodologies that Promote Sustainable Development
	4 Discussion
	References
Bioengineering as a Strategy for the Consolidation of Innovation and Technological Development Processes in the Central Zone of Colombia
	1 Introduction
	2 Objectives
		2.1 General Objective
		2.2 Specific Objectives
	3 Methodology
	4 Analysis and Results
		4.1 Analysis
		4.2 Results
	5 Conclusions
	References
Challenges and Competences in Master Degrees from a Comprehensive Security Perspective
	1 Introduction
	2 Comprehensive Security Background
	3 Master’s Degree in Comprehensive Security
		3.1 MCS Objectives
		3.2 MCS Competences
		3.3 MCS Curriculum and Program
	4 Conclusions
	References
Author Index




نظرات کاربران