Computer supported communication and infrastructure are integral parts of modern economy. Their security is of incredible importance to a wide variety of practical domains ranging from Internet service providers to the banking industry and e-commerce, from corporate networks to the intelligence community. The CSI-KDD workshop focuses on novel knowledge discovery methods addressing CyberSecurity and intelligence issues as well as innovative applications demonstrating the effectiveness of data mining in solving real-world security problems. The challenge for novel methods originates from the emergence of new types of contents and protocols, and only an integrated view on all modes promises optimal results. Innovative applications are essentia...
This proceedings volume provides a snapshot of the latest issues encountered in technical convergenc...
This book constitutes the refereed proceedings of the three international workshops PAISI 2008, PACC...
This book contains selected papers from the 7th International Conference on Information Science and ...
Computer supported communication and infrastructure are integral parts of modern economy. Their secu...
As our dependence on the cyber infrastructure grows ever larger, more complex and more distributed, ...
Our reliance on the cyber infrastructure has further grown and the dependencies have become more com...
The deliberate misuse of technical infrastructure (including the Web and social media) for cyber dev...
As our dependence on the cyber infrastructure grows more complex and more distributed, the systems t...
The deliberate misuse of technical infrastructure (including the Web and social media) for cyber dev...
This volume of Advances in Intelligent and Soft Computing contains accepted papers presented at the ...
Today, the socio-political and technological transformation of mankind is being challenged by a seri...
This book is a practical handbook of research on dealing with mathematical methods in crime preventi...
This volume is an initiative undertaken by the IEEE Computational Intelligence Society’s Task Force ...
This paper is devoted to the analysis of modern trends in economic cybersecurity. We analysed the dy...
Abstract: Data science may be used to detect, prevent, and address ever-evolving cybersecurity risks...
This proceedings volume provides a snapshot of the latest issues encountered in technical convergenc...
This book constitutes the refereed proceedings of the three international workshops PAISI 2008, PACC...
This book contains selected papers from the 7th International Conference on Information Science and ...
Computer supported communication and infrastructure are integral parts of modern economy. Their secu...
As our dependence on the cyber infrastructure grows ever larger, more complex and more distributed, ...
Our reliance on the cyber infrastructure has further grown and the dependencies have become more com...
The deliberate misuse of technical infrastructure (including the Web and social media) for cyber dev...
As our dependence on the cyber infrastructure grows more complex and more distributed, the systems t...
The deliberate misuse of technical infrastructure (including the Web and social media) for cyber dev...
This volume of Advances in Intelligent and Soft Computing contains accepted papers presented at the ...
Today, the socio-political and technological transformation of mankind is being challenged by a seri...
This book is a practical handbook of research on dealing with mathematical methods in crime preventi...
This volume is an initiative undertaken by the IEEE Computational Intelligence Society’s Task Force ...
This paper is devoted to the analysis of modern trends in economic cybersecurity. We analysed the dy...
Abstract: Data science may be used to detect, prevent, and address ever-evolving cybersecurity risks...
This proceedings volume provides a snapshot of the latest issues encountered in technical convergenc...
This book constitutes the refereed proceedings of the three international workshops PAISI 2008, PACC...
This book contains selected papers from the 7th International Conference on Information Science and ...