Investigation on Operating Systems Identification by Means of Fractal Geometry and OS Pseudorandom Number Generators (English)
- New search for: Zelinka, Ivan
- New search for: Merhaut, Filip
- New search for: Skanderova, Lenka
- New search for: Herrero, Álvaro
- New search for: Snášel, Václav
- New search for: Abraham, Ajith
- New search for: Zelinka, Ivan
- New search for: Baruque, Bruno
- New search for: Quintián, Héctor
- New search for: Calvo, José Luis
- New search for: Sedano, Javier
- New search for: Corchado, Emilio
- New search for: Zelinka, Ivan
- New search for: Merhaut, Filip
- New search for: Skanderova, Lenka
In:
International Joint Conference CISIS’12-ICEUTE´12-SOCO´12 Special Sessions
;
Chapter: 15
;
151-158
;
2013
- Article/Chapter (Book) / Electronic Resource
-
Title:Investigation on Operating Systems Identification by Means of Fractal Geometry and OS Pseudorandom Number Generators
-
Additional title:Advs in Intelligent Syst., Computing
-
Contributors:Herrero, Álvaro ( editor ) / Snášel, Václav ( editor ) / Abraham, Ajith ( editor ) / Zelinka, Ivan ( editor ) / Baruque, Bruno ( editor ) / Quintián, Héctor ( editor ) / Calvo, José Luis ( editor ) / Sedano, Javier ( editor ) / Corchado, Emilio ( editor ) / Zelinka, Ivan ( author )
-
Published in:International Joint Conference CISIS’12-ICEUTE´12-SOCO´12 Special Sessions ; Chapter: 15 ; 151-158Advances in Intelligent Systems and Computing ; 189 ; 151-158
-
Publisher:
- New search for: Springer Berlin Heidelberg
-
Place of publication:Berlin, Heidelberg
-
Publication date:2013-01-01
-
Size:8 pages
-
ISBN:
-
ISSN:
-
DOI:
-
Type of media:Article/Chapter (Book)
-
Type of material:Electronic Resource
-
Language:English
-
Keywords:
-
Source:
Table of contents eBook
The tables of contents are generated automatically and are based on the data records of the individual contributions available in the index of the TIB portal. The display of the Tables of Contents may therefore be incomplete.
- 1
-
Automatic Analysis of Web Service Honeypot Data Using Machine Learning TechniquesGhourabi, Abdallah / Abbes, Tarek / Bouhoula, Adel et al. | 2013
- 2
-
A Security Pattern-Driven Approach toward the Automation of Risk Treatment in Business ProcessesVarela-Vaca, Angel Jesus / Warschofsky, Robert / Gasca, Rafael M. / Pozo, Sergio / Meinel, Christoph et al. | 2013
- 3
-
Neural Network Ensembles Design with Self-Configuring Genetic Programming Algorithm for Solving Computer Security ProblemsSemenkin, Eugene / Semenkina, Maria / Panfilov, Ilia et al. | 2013
- 4
-
Clustering for Intrusion Detection: Network Scans as a Case of StudySánchez, Raúl / Herrero, Álvaro / Corchado, Emilio et al. | 2013
- 5
-
Sensor Networks Security Based on Sensitive Robots Agents: A Conceptual ModelPintea, Camelia-M. / Pop, Petrica C. et al. | 2013
- 6
-
Comments on a Cryptosystem Proposed by Wang and HuDurán Díaz, R. / Hernández Encinas, L. / Muñoz Masqué, J. et al. | 2013
- 7
-
Equivalent Inner Key Recovery Attack to NMACLiu, Fanbao / Shen, Changxiang / Xie, Tao et al. | 2013
- 8
-
Hybrid Compression of the Aho-Corasick Automaton for Static Analysis in Intrusion Detection SystemsPungila, Ciprian et al. | 2013
- 9
-
Tracking Traitors in Web Services via Blind SignaturesÁlvarez-Bermejo, J. A. / López-Ramos, J. A. et al. | 2013
- 10
-
C&C Techniques in Botnet DevelopmentBrezo, Félix / de la Puerta, José Gaviria / Santos, Igor / Barroso, David / Bringas, Pablo Garcia et al. | 2013
- 11
-
How Political Illusions Harm National Stability: Fiscal Illusion as a Source of TaxationMourao, Paulo / Cabral, José Pedro et al. | 2013
- 12
-
Software Implementation of Linear Feedback Shift Registers over Extended FieldsDelgado-Mohatar, O. / Fúster-Sabater, A. et al. | 2013
- 13
-
Simulation Analysis of Static and Dynamic Intermediate Nodes and Performance Comparison of MANETS Routing ProtocolsKhan, Jahangir / Bojkovic, Zoran / Hayder, Syed Irfan / Mallah, Gulam Ali / Haseeb, Abdul / Atta, Fariha et al. | 2013
- 14
-
On Fitness Function Based upon Quasigroups Power SequencesOchodková, Eliška / Dvorský, Jiří / Krömer, Pavel / Tuček, Pavel et al. | 2013
- 15
-
Investigation on Operating Systems Identification by Means of Fractal Geometry and OS Pseudorandom Number GeneratorsZelinka, Ivan / Merhaut, Filip / Skanderova, Lenka et al. | 2013
- 16
-
Usability of Software Intrusion-Detection System in Web ApplicationsVala, Radek / Malaník, David / Jašek, Roman et al. | 2013
- 17
-
A Genetic Algorithm for Solving RSA Problem in Elastic Optical Networks with Dedicated Path ProtectionKlinkowski, Mirosław et al. | 2013
- 18
-
Correlation Approach for SQL Injection Attacks DetectionChoraś, Michał / Kozik, Rafał / Puchalski, Damian / Hołubowicz, Witold et al. | 2013
- 19
-
Information Exchange Mechanism between Federated Domains: P2P ApproachChoraś, Michał / Kozik, Rafał / Renk, Rafał / Hołubowicz, Witold et al. | 2013
- 20
-
Web Spam Detection Using MapReduce Approach to Collective ClassificationIndyk, Wojciech / Kajdanowicz, Tomasz / Kazienko, Przemyslaw / Plamowski, Slawomir et al. | 2013
- 21
-
Analysis of Selected Aspects of “IBM I” SecurityPiec, Maciej / Pozniak-Koszalka, Iwona / Koziol, Mariusz et al. | 2013
- 22
-
Metaheuristic Approach for Survivable P2P Multicasting Flow Assignment in Dual Homing NetworksKmiecik, Wojciech / Walkowiak, Krzysztof et al. | 2013
- 23
-
A Tabu Search Algorithm for Optimization of Survivable Overlay Computing SystemsWalkowiak, Krzysztof / Charewicz, Wojciech / Donajski, Maciej / Rak, Jacek et al. | 2013
- 24
-
Greedy Algorithms for Network Anomaly DetectionAndrysiak, Tomasz / Saganowski, Łukasz / Choraś, Michał et al. | 2013
- 25
-
Combined Classifiers with Neural Fuser for Spam DetectionZmyślony, Marcin / Krawczyk, Bartosz / Woźniak, Michał et al. | 2013
- 26
-
Combined Bayesian Classifiers Applied to Spam Filtering ProblemWrótniak, Karol / Woźniak, Michał et al. | 2013
- 27
-
Negobot: A Conversational Agent Based on Game Theory for the Detection of Paedophile BehaviourLaorden, Carlos / Galán-García, Patxi / Santos, Igor / Sanz, Borja / Hidalgo, Jose María Gómez / Bringas, Pablo Garcia et al. | 2013
- 28
-
OPEM: A Static-Dynamic Approach for Machine-Learning-Based Malware DetectionSantos, Igor / Devesa, Jaime / Brezo, Félix / Nieves, Javier / Bringas, Pablo Garcia et al. | 2013
- 29
-
Adult Content Filtering through Compression-Based Text ClassificationSantos, Igor / Galán-García, Patxi / Santamaría-Ibirika, Aitor / Alonso-Isla, Borja / Alabau-Sarasola, Iker / Bringas, Pablo Garcia et al. | 2013
- 30
-
PUMA: Permission Usage to Detect Malware in AndroidSanz, Borja / Santos, Igor / Laorden, Carlos / Ugarte-Pedrero, Xabier / Bringas, Pablo Garcia / Álvarez, Gonzalo et al. | 2013
- 31
-
Application of Soft Computing Technologies toward Assessment and Skills DevelopmentAliaga, Ignacio / Vera, Vicente / Losada, Cristina González / García, Álvaro Enrique / Quintián, Héctor / Corchado, Emilio / Klett, Fanny / García-Hernández, Laura et al. | 2013
- 32
-
An Interactive Mathematica BookÁlvarez-Bermejo, J. A. / Escoriza, J. / López-Ramos, J. A. / Peralta, J. et al. | 2013
- 33
-
Biorefinery Virtual Lab-Integrating E-learning Techniques and Theoretical LearningRedel-Macías, M. D. / Pinzi, S. / Cubero-Atienza, A. J. / Dorado, M. P. / Martínez-Jiménez, M. P. et al. | 2013
- 34
-
Approaching System Administration as a Group Project in Computer Engineering Higher EducationGutiérrez, P. A. / Sánchez-Monedero, J. / Hervás-Martínez, C. / Cruz-Ramírez, M. / Fernández, J. C. / Fernández-Navarro, F. et al. | 2013
- 35
-
Speed Control of A.C. Drive with Induction Motor Using Genetic AlgorithmBrandstetter, Pavel / Dobrovsky, Marek et al. | 2013
- 36
-
Applications of Artificial Neural Networks in Control of DC DriveBrandstetter, Pavel / Bilek, Pavel et al. | 2013
- 37
-
Energy Optimization of a Dynamic System ControllerFedor, Pavol / Perdukova, Daniela et al. | 2013
- 38
-
Optimal Input Vector Based Fuzzy Controller Rules DesignFedor, Pavol / Perdukova, Daniela / Ferkova, Zelmira et al. | 2013
- 39
-
Correlation Methods of OCR Algorithm for Traffic Sign Detection Implementable in MicrocontrollersHercik, Radim / Slaby, Roman / Machacek, Zdenek / Koziorek, Jiri et al. | 2013
- 40
-
Takagi-Sugeno Fuzzy Model in Task of Controllers DesignNowaková, Jana / Pokorný, Miroslav / Pieš, Martin et al. | 2013
- 41
-
Real-Time Estimation of Induction Motor Parameters Based on the Genetic AlgorithmPalacky, Petr / Hudecek, Petr / Havel, Ales et al. | 2013
- 42
-
Comparison of Fuzzy Logic Based and Sliding Mode Based Controller for IM Drive Fed by Matrix ConverterBauer, Jan / Fligl, Stanislav et al. | 2013
- 43
-
Discrete-Time Markov Chains in Reliability Analysis-Case StudySkalny, Pavel / Krajc, Bohumil et al. | 2013
- 44
-
Genetic Algorithm Based Optimization of MGP-FIR Current Reference Generator for Active Power FiltersTalla, Jakub / Peroutka, Zdenek / Ovaska, Seppo J. / Stehlik, Josef et al. | 2013
- 45
-
Correlation-Based Neural Gas for Visualizing Correlations between EEG FeaturesŠtépánová, Karla / Macaš, Martin / Lhotská, Lenka et al. | 2013
- 46
-
Built-in Smartphone Accelerometer Motion Pattern Recognition Using Wavelet TransformJirka, Jakub / Prauzek, Michal et al. | 2013
- 47
-
Temporal Analysis of Remotely Sensed Data for the Assessment of COPD Patients’ Health StatusColantonio, Sara / Salvetti, Ovidio et al. | 2013
- 48
-
Encoding Time Series Data for Better Clustering ResultsBartoň, Tomáš / Kordík, Pavel et al. | 2013
- 49
-
Pattern Recognition in EEG Cognitive Signals Accelerated by GPUDohnálek, Pavel / Gajdoš, Petr / Peterek, Tomáš / Penhaker, Marek et al. | 2013
- 50
-
On the Potential of Fuzzy Rule-Based Ensemble ForecastingSikora, David / Štěpnička, Martin / Vavříčková, Lenka et al. | 2013
- 51
-
Recognition of Damaged Letters Based on Mathematical Fuzzy Logic AnalysisNovak, Vilem / Habiballa, Hashim et al. | 2013
- 52
-
Image Reconstruction with Usage of the F-TransformVlašánek, Pavel / Perfilieva, Irina et al. | 2013
- 53
-
Image Compression with Artificial Neural NetworksKouamo, Stephane / Tangha, Claude et al. | 2013
- 54
-
Image Compression Methodology Based on Fuzzy TransformHurtik, Petr / Perfilieva, Irina et al. | 2013
- 55
-
Implementation of Background Knowledge and Properties Induced by Fuzzy Confirmation Measures in Apriori AlgorithmTomanová, Iva / Kupka, Jiří et al. | 2013