𝔖 Scriptorium
✦   LIBER   ✦

📁

13th International Conference on Computational Intelligence in Security for Information Systems (CISIS 2020)

✍ Scribed by Álvaro Herrero, Carlos Cambra, Daniel Urda, Javier Sedano, Héctor Quintián, Emilio Corchado


Publisher
Springer International Publishing;Springer
Year
2021
Tongue
English
Leaves
477
Series
Advances in Intelligent Systems and Computing 1267
Edition
1st ed.
Category
Library

⬇  Acquire This Volume

No coin nor oath required. For personal study only.

✦ Synopsis


This book contains accepted papers presented at CISIS 2020 held in the beautiful and historic city of Burgos (Spain), in September 2020.

The aim of the CISIS 2020 conference is to offer a meeting opportunity for academic and industry-related researchers belonging to the various, vast communities of computational intelligence, information security, and data mining. The need for intelligent, flexible behaviour by large, complex systems, especially in mission-critical domains, is intended to be the catalyst and the aggregation stimulus for the overall event.

After a thorough peer-review process, the CISIS 2020 International Program Committee selected 43 papers which are published in these conference proceedings achieving an acceptance rate of 28%. Due to the COVID-19 outbreak, the CISIS 2020 edition was blended, combining on-site and on-line participation. In this relevant edition, a special emphasis was put on the organization of five special sessions related to relevant topics as Fake News Detection and Prevention, Mathematical Methods and Models in Cybersecurity, Measurements for a Dynamic Cyber-Risk Assessment, Cybersecurity in a Hybrid Quantum World, Anomaly/Intrusion Detection, and From the least to the least: cryptographic and data analytics solutions to fulfil least minimum privilege and endorse least minimum effort in information systems.

The selection of papers was extremely rigorous in order to maintain the high quality of the conference and we would like to thank the members of the Program Committees for their hard work in the reviewing process. This is a crucial process to the creation of a high standard conference, and the CISIS conference would not exist without their help.


✦ Table of Contents


Front Matter ....Pages i-xvii
Front Matter ....Pages 1-1
Attacking with Bitcoin: Using Bitcoin to Build Resilient Botnet Armies (Dimitri Kamenski, Arash Shaghaghi, Matthew Warren, Salil S. Kanhere)....Pages 3-12
Blockchain-Based Systems in Land Registry, A Survey of Their Use and Economic Implications (Yeray Mezquita, Javier Parra, Eugenia Perez, Javier Prieto, Juan Manuel Corchado)....Pages 13-22
The Evolution of Privacy in the Blockchain: A Historical Survey (Sergio Marciante, Álvaro Herrero)....Pages 23-34
Securing Cryptoasset Insurance Services with Multisignatures (Daniel Wilusz, Adam Wójtowicz)....Pages 35-44
Building an Ethereum-Based Decentralized Vehicle Rental System (Néstor García-Moreno, Pino Caballero-Gil, Cándido Caballero-Gil, Jezabel Molina-Gil)....Pages 45-53
Front Matter ....Pages 55-55
Off-Line Writer Verification Using Segments of Handwritten Samples and SVM (Verónica Aubin, Matilde Santos, Marco Mora)....Pages 57-65
A Comparative Study to Detect Flowmeter Deviations Using One-Class Classifiers (Esteban Jove, José-Luis Casteleiro-Roca, Héctor Quintián, Francisco Zayas-Gato, Paulo Novais, Juan Albino Méndez-Pérez et al.)....Pages 66-75
IoT Device Identification Using Deep Learning (Jaidip Kotak, Yuval Elovici)....Pages 76-86
Impact of Current Phishing Strategies in Machine Learning Models for Phishing Detection (M. Sánchez-Paniagua, E. Fidalgo, V. González-Castro, E. Alegre)....Pages 87-96
Crime Prediction for Patrol Routes Generation Using Machine Learning (Cesar Guevara, Matilde Santos)....Pages 97-107
Front Matter ....Pages 109-109
Health Access Broker: Secure, Patient-Controlled Management of Personal Health Records in the Cloud (Zainab Abaid, Arash Shaghaghi, Ravin Gunawardena, Suranga Seneviratne, Aruna Seneviratne, Sanjay Jha)....Pages 111-121
Short Message Multichannel Broadcast Encryption (José Luis Salazar, Jose Saldana, Julián Fernández-Navajas, José Ruiz-Mas, Guillermo Azuara)....Pages 122-131
Cybersecurity Overview of a Robot as a Service Platform (Laura Fernández-Becerra, David Fernández González, Ángel Manuel Guerrero-Higueras, Francisco Javier Rodríguez Lera, Camino Fernández-Llamas)....Pages 132-141
Probabilistic and Timed Analysis of Security Protocols (Olga Siedlecka-Lamch)....Pages 142-151
Domain Knowledge: Predicting the Kind of Content Hosted by a Domain (Suriyan Laohaprapanon, Gaurav Sood)....Pages 152-162
Evidence Identification and Acquisition Based on Network Link in an Internet of Things Environment (Saad Khalid Alabdulsalam, Trung Q. Duong, Kim-Kwang Raymond Choo, Nhien-An Le-Khac)....Pages 163-173
Proposition of Innovative and Scalable Information System for Call Detail Records Analysis and Visualisation (Rafał Kozik, Michał Choraś, Marek Pawlicki, Aleksandra Pawlicka, Wojciech Warczak, Grzegorz Mazgaj)....Pages 174-183
Automatic Detection of Sensitive Information in Educative Social Networks (Víctor Botti-Cebriá, Elena del Val, Ana García-Fornes)....Pages 184-194
Front Matter ....Pages 195-195
Detection of Artificial Images and Changes in Real Images Using Convolutional Neural Networks (Mariusz Kubanek, Kamila Bartłomiejczyk, Janusz Bobulski)....Pages 197-207
Distributed Architecture for Fake News Detection (Rafał Kozik, Michał Choraś, Sebastian Kula, Marek Pawlicki)....Pages 208-217
Multi-stage News-Stance Classification Based on Lexical and Neural Features (Fuad Mire Hassan, Mark Lee)....Pages 218-228
Fake News Detection (Ignacio Palacio Marín, David Arroyo)....Pages 229-238
Application of the BERT-Based Architecture in Fake News Detection (Sebastian Kula, Michał Choraś, Rafał Kozik)....Pages 239-249
Front Matter ....Pages 251-251
Simulating Malware Propagation with Different Infection Rates (Jose Diamantino Hernández Guillén, Angel Martín del Rey)....Pages 253-262
A Data Quality Assessment Model and Its Application to Cybersecurity Data Sources (Noemí DeCastro-García, Enrique Pinto)....Pages 263-272
Towards Forecasting Time-Series of Cyber-Security Data Aggregates (Miguel V. Carriegos, Ramón Ángel Fernández-Díaz)....Pages 273-281
Hybrid Approximate Convex Hull One-Class Classifier for an Industrial Plant (Iago Núñez, Esteban Jove, José-Luis Casteleiro-Roca, Héctor Quintián, Francisco Zayas-Gato, Dragan Simić et al.)....Pages 282-292
Front Matter ....Pages 293-293
Traceability and Accountability in Autonomous Agents (Francisco Javier Rodríguez-Lera, Miguel Ángel González Santamarta, Ángel Manuel Guerrero, Francisco Martí­n, Vicente Matellán)....Pages 295-305
The Order of the Factors DOES Alter the Product: Cyber Resilience Policies’ Implementation Order (Juan Francisco Carias, Marcos R. S. Borges, Leire Labaka, Saioa Arrizabalaga, Josune Hernantes)....Pages 306-315
Deep Learning Defenses Against Adversarial Examples for Dynamic Risk Assessment (Xabier Echeberria-Barrio, Amaia Gil-Lerchundi, Ines Goicoechea-Telleria, Raul Orduna-Urrutia)....Pages 316-326
A New Approach for Dynamic and Risk-Based Data Anonymization (Lilian Adkinson Orellana, Pablo Dago Casas, Marta Sestelo, Borja Pintos Castro)....Pages 327-336
Front Matter ....Pages 337-337
An Innovative Linear Complexity Computation for Cryptographic Sequences (Jose Luis Martín-Navarro, Amparo Fúster-Sabater, Sara D. Cardell)....Pages 339-349
Randomness Analysis for GSS-sequences Concatenated (Sara Díaz Cardell, Amparo Fúster-Sabater, Amalia B. Orue, Verónica Requena)....Pages 350-360
Study of the Reconciliation Mechanism of NewHope (Víctor Gayoso Martínez, Luis Hernández Encinas, Agustín Martín Muñoz)....Pages 361-370
Securing Blockchain with Quantum Safe Cryptography: When and How? (Veronica Fernandez, Amalia B. Orue, David Arroyo)....Pages 371-379
Blockchain in Education: New Challenges (Wilson Rojas, Víctor Gayoso Martínez, Araceli Queiruga-Dios)....Pages 380-389
Front Matter ....Pages 391-391
Impact of Generative Adversarial Networks on NetFlow-Based Traffic Classification (Maximilian Wolf, Markus Ring, Dieter Landes)....Pages 393-404
Hybrid Model for Improving the Classification Effectiveness of Network Intrusion Detection (Vibekananda Dutta, Michał Choraś, Rafał Kozik, Marek Pawlicki)....Pages 405-414
Adaptive Approach for Density-Approximating Neural Network Models for Anomaly Detection (Martin Flusser, Petr Somol)....Pages 415-425
Systematic Mapping of Detection Techniques for Advanced Persistent Threats (David Sobrín-Hidalgo, Adrián Campazas Vega, Ángel Manuel Guerrero Higueras, Francisco Javier Rodríguez Lera, Camino Fernández-Llamas)....Pages 426-435
Neural Network Analysis of PLC Traffic in Smart City Street Lighting Network (Tomasz Andrysiak, Łukasz Saganowski)....Pages 436-445
Beta-Hebbian Learning for Visualizing Intrusions in Flows (Héctor Quintián, Esteban Jove, José-Luis Casteleiro-Roca, Daniel Urda, Ángel Arroyo, José Luis Calvo-Rolle et al.)....Pages 446-459
Detecting Intrusion via Insider Attack in Database Transactions by Learning Disentangled Representation with Deep Metric Neural Network (Gwang-Myong Go, Seok-Jun Bu, Sung-Bae Cho)....Pages 460-469
Back Matter ....Pages 471-472

✦ Subjects


Engineering; Computational Intelligence


📜 SIMILAR VOLUMES


International Joint Conference 15th Inte
✍ Pablo García Bringas (editor), Hilde Pérez García (editor), Francisco Javier Mar 📂 Library 📅 2022 🏛 Springer 🌐 English

<p><span>This book of Lecture Notes in Networks and Systems contains accepted papers presented at the 15th International Conference on Computational Intelligence in Security for Information Systems (CISIS 2022) and the 13th International Conference on EUropean Transnational Education (ICEUTE 2022).

Computational Intelligence in Security f
✍ Saif ur Rehman, Muhammed Naeem Ahmed Khan (auth.), Álvaro Herrero, Emilio Corcha 📂 Library 📅 2010 🏛 Springer-Verlag Berlin Heidelberg 🌐 English

<p><p>This volume of Advances in Intelligent and Soft Computing contains accepted papers presented at the 3<sup>rd</sup> International Conference on Computational Intelligence in Security for Information Systems (CISIS'10), which was held in the beautiful and historic city of León, Spain, in Novembe

14th International Conference on Computa
✍ Juan José Gude Prego, José Gaviria de la Puerta, Pablo García Bringas, Héctor Qu 📂 Library 📅 2021 🏛 Springer 🌐 English

<p>This book of Advances in Intelligent and Soft Computing contains accepted papers presented at CISIS 2021 and ICEUTE 2021, all conferences held in the beautiful and historic city of Bilbao (Spain), in September 2021.</p><p>The aim of the 14th CISIS 20121 conference is to offer a meeting opportunit

14th International Conference on Computa
✍ Juan José Gude Prego, José Gaviria de la Puerta, Pablo García Bringas, Héctor Qu 📂 Library 📅 2021 🏛 Springer 🌐 English

<p>This book of Advances in Intelligent and Soft Computing contains accepted papers presented at CISIS 2021 and ICEUTE 2021, all conferences held in the beautiful and historic city of Bilbao (Spain), in September 2021.</p><p>The aim of the 14th CISIS 20121 conference is to offer a meeting opportunit

International Joint Conference 16th Inte
✍ Pablo García Bringas (editor), Hilde Pérez García (editor), Francisco Javier Mar 📂 Library 📅 2023 🏛 Springer 🌐 English

<p><span>This book of Lecture Notes in Networks and Systems contains accepted papers presented at the 16th International Conference on Computational Intelligence in Security for Information Systems (CISIS 2023) and the 14th International Conference on EUropean Transnational Education (ICEUTE 2023).