


default search action
CISIS 2020: Burgos, Spain
- Álvaro Herrero, Carlos Cambra, Daniel Urda, Javier Sedano, Héctor Quintián, Emilio Corchado:
13th International Conference on Computational Intelligence in Security for Information Systems, CISIS 2020, Burgos, Spain, September 2020. Advances in Intelligent Systems and Computing 1267, Springer 2021, ISBN 978-3-030-57804-6
Cryptocurrencies and Blockchain
- Dimitri Kamenski, Arash Shaghaghi, Matthew J. Warren
, Salil S. Kanhere
:
Attacking with Bitcoin: Using Bitcoin to Build Resilient Botnet Armies. 3-12 - Yeray Mezquita Martín
, Javier Parra
, Eugenia Pérez
, Javier Prieto
, Juan Manuel Corchado
:
Blockchain-Based Systems in Land Registry, A Survey of Their Use and Economic Implications. 13-22 - Sergio Marciante
, Álvaro Herrero
:
The Evolution of Privacy in the Blockchain: A Historical Survey. 23-34 - Daniel Wilusz
, Adam Wójtowicz
:
Securing Cryptoasset Insurance Services with Multisignatures. 35-44 - Néstor García-Moreno, Pino Caballero-Gil
, Cándido Caballero-Gil
, Jezabel Molina-Gil:
Building an Ethereum-Based Decentralized Vehicle Rental System. 45-53
Machine Learning
- Verónica Aubin, Matilde Santos
, Marco Mora:
Off-Line Writer Verification Using Segments of Handwritten Samples and SVM. 57-65 - Esteban Jove
, José Luís Casteleiro-Roca
, Héctor Quintián
, Francisco Zayas-Gato
, Paulo Novais
, Juan Albino Méndez Pérez, José Luís Calvo-Rolle
:
A Comparative Study to Detect Flowmeter Deviations Using One-Class Classifiers. 66-75 - Jaidip Kotak, Yuval Elovici:
IoT Device Identification Using Deep Learning. 76-86 - Manuel Sánchez-Paniagua
, Eduardo Fidalgo, Víctor González-Castro, Enrique Alegre:
Impact of Current Phishing Strategies in Machine Learning Models for Phishing Detection. 87-96 - César Guevara
, Matilde Santos
:
Crime Prediction for Patrol Routes Generation Using Machine Learning. 97-107
Applications
- Zainab Abaid, Arash Shaghaghi, Ravin Gunawardena, Suranga Seneviratne, Aruna Seneviratne, Sanjay Jha
:
Health Access Broker: Secure, Patient-Controlled Management of Personal Health Records in the Cloud. 111-121 - José Luis Salazar, Jose Saldana
, Julián Fernández-Navajas
, José Ruíz-Mas, Guillermo Azuara:
Short Message Multichannel Broadcast Encryption. 122-131 - Laura Fernández-Becerra
, David Fernández González, Ángel Manuel Guerrero-Higueras, Francisco Javier Rodríguez-Lera, Camino Fernández Llamas:
Cybersecurity Overview of a Robot as a Service Platform. 132-141 - Olga Siedlecka-Lamch
:
Probabilistic and Timed Analysis of Security Protocols. 142-151 - Suriyan Laohaprapanon, Gaurav Sood:
Domain Knowledge: Predicting the Kind of Content Hosted by a Domain. 152-162 - Saad Khalid Alabdulsalam, Trung Q. Duong, Kim-Kwang Raymond Choo, Nhien-An Le-Khac
:
Evidence Identification and Acquisition Based on Network Link in an Internet of Things Environment. 163-173 - Rafal Kozik
, Michal Choras, Marek Pawlicki
, Aleksandra Pawlicka, Wojciech Warczak, Grzegorz Mazgaj:
Proposition of Innovative and Scalable Information System for Call Detail Records Analysis and Visualisation. 174-183 - Víctor Botti-Cebriá
, Elena del Val, Ana García-Fornes
:
Automatic Detection of Sensitive Information in Educative Social Networks. 184-194
Special Session: Fake News Detection and Prevention
- Mariusz Kubanek
, Kamila Bartlomiejczyk
, Janusz Bobulski
:
Detection of Artificial Images and Changes in Real Images Using Convolutional Neural Networks. 197-207 - Rafal Kozik
, Michal Choras, Sebastian Kula
, Marek Pawlicki
:
Distributed Architecture for Fake News Detection. 208-217 - Fuad Mire Hassan, Mark Lee
:
Multi-stage News-Stance Classification Based on Lexical and Neural Features. 218-228 - Ignacio Palacio Marín, David Arroyo:
Fake News Detection - Do Complex Problems Need Complex Solutions? 229-238 - Sebastian Kula
, Michal Choras, Rafal Kozik
:
Application of the BERT-Based Architecture in Fake News Detection. 239-249
Special Session: Mathematical Methods and Models in Cybersecurity
- José Diamantino Hernández Guillén
, Ángel Martín del Rey
:
Simulating Malware Propagation with Different Infection Rates. 253-262 - Noemí DeCastro-García
, Enrique Pinto:
A Data Quality Assessment Model and Its Application to Cybersecurity Data Sources. 263-272 - Miguel V. Carriegos
, Ramón Ángel Fernández Díaz
:
Towards Forecasting Time-Series of Cyber-Security Data Aggregates. 273-281 - Iago Núñez, Esteban Jove
, José Luís Casteleiro-Roca
, Héctor Quintián
, Francisco Zayas-Gato
, Dragan Simic, José Luís Calvo-Rolle
:
Hybrid Approximate Convex Hull One-Class Classifier for an Industrial Plant. 282-292
Special Session: Measurements for a Dynamic Cyber-risk Assessment
- Francisco Javier Rodríguez-Lera, Miguel Ángel González Santamarta
, Ángel Manuel Guerrero, Francisco Martín
, Vicente Matellán:
Traceability and Accountability in Autonomous Agents. 295-305 - Juan Francisco Carias
, Marcos R. S. Borges
, Leire Labaka
, Saioa Arrizabalaga
, Josune Hernantes
:
The Order of the Factors DOES Alter the Product: Cyber Resilience Policies' Implementation Order. 306-315 - Xabier Echeberria-Barrio
, Amaia Gil-Lerchundi, Ines Goicoechea-Telleria, Raul Orduna Urrutia:
Deep Learning Defenses Against Adversarial Examples for Dynamic Risk Assessment. 316-326 - Lilian Adkinson-Orellana, Pablo Dago Casas, Marta Sestelo
, Borja Pintos Castro:
A New Approach for Dynamic and Risk-Based Data Anonymization. 327-336
Special Session: Cybersecurity in a Hybrid Quantum World
- Sara Díaz Cardell
, Amparo Fúster-Sabater
, Amalia Beatriz Orúe López
, Verónica Requena
:
Randomness Analysis for GSS-sequences Concatenated. 350-360 - Victor Gayoso Martínez, Luis Hernández Encinas
, Agustín Martín Muñoz
:
Study of the Reconciliation Mechanism of NewHope. 361-370 - Veronica Fernandez
, Amalia Beatriz Orúe López
, David Arroyo:
Securing Blockchain with Quantum Safe Cryptography: When and How? 371-379 - Wilson Rojas, Victor Gayoso Martínez, Araceli Queiruga Dios:
Blockchain in Education: New Challenges. 380-389
Special Session: Anomaly/Intrusion Detection
- Maximilian Wolf, Markus Ring, Dieter Landes
:
Impact of Generative Adversarial Networks on NetFlow-Based Traffic Classification. 393-404 - Vibekananda Dutta
, Michal Choras, Rafal Kozik
, Marek Pawlicki
:
Hybrid Model for Improving the Classification Effectiveness of Network Intrusion Detection. 405-414 - Martin Flusser
, Petr Somol:
Adaptive Approach for Density-Approximating Neural Network Models for Anomaly Detection. 415-425 - David Sobrín-Hidalgo
, Adrián Campazas Vega, Ángel Manuel Guerrero-Higueras, Francisco Javier Rodríguez-Lera, Camino Fernández Llamas:
Systematic Mapping of Detection Techniques for Advanced Persistent Threats. 426-435 - Tomasz Andrysiak, Lukasz Saganowski
:
Neural Network Analysis of PLC Traffic in Smart City Street Lighting Network. 436-445 - Héctor Quintián
, Esteban Jove
, José Luís Casteleiro-Roca
, Daniel Urda
, Ángel Arroyo
, José Luís Calvo-Rolle
, Álvaro Herrero
, Emilio Corchado:
Beta-Hebbian Learning for Visualizing Intrusions in Flows. 446-459 - Gwang-Myong Go, Seok-Jun Bu
, Sung-Bae Cho:
Detecting Intrusion via Insider Attack in Database Transactions by Learning Disentangled Representation with Deep Metric Neural Network. 460-469

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.