001431856 000__ 08453cam\a2200721\a\4500 001431856 001__ 1431856 001431856 003__ OCoLC 001431856 005__ 20230309003246.0 001431856 006__ m\\\\\o\\d\\\\\\\\ 001431856 007__ cr\un\nnnunnun 001431856 008__ 200919s2021\\\\sz\\\\\\o\\\\\101\0\eng\d 001431856 019__ $$a1191801608$$a1197840535$$a1240513581$$a1249218162$$a1253407745 001431856 020__ $$a9783030578053$$q(electronic bk.) 001431856 020__ $$a3030578054$$q(electronic bk.) 001431856 020__ $$a9783030578060$$q(print) 001431856 020__ $$a3030578062 001431856 020__ $$z9783030578046$$q(print) 001431856 020__ $$z3030578046 001431856 0247_ $$a10.1007/978-3-030-57805-3$$2doi 001431856 035__ $$aSP(OCoLC)1193124886 001431856 040__ $$aEBLCP$$beng$$epn$$cEBLCP$$dGW5XE$$dYDX$$dLQU$$dGZM$$dOCLCF$$dUKMGB$$dVT2$$dVLB$$dLIP$$dOCLCQ$$dOCLCO$$dOCLCQ 001431856 049__ $$aISEA 001431856 050_4 $$aTK5105.59$$b.I58 13th 2020eb 001431856 08204 $$a005.8$$223 001431856 1112_ $$aInternational Conference on Computational Intelligence in Security for Information Systems$$n(13th :$$d2020 :$$cBurgos, Spain) 001431856 24510 $$a13th International Conference on Computational Intelligence in Security for Information Systems (CISIS 2020) /$$cÁlvaro Herrero, Carlos Cambra, Daniel Urda, Javier Sedano, Héctor Quintián, Emilio Corchado, editors. 001431856 2463_ $$aCISIS 2020 001431856 264_1 $$aCham :$$bSpringer,$$c[2021] 001431856 264_4 $$c©2021 001431856 300__ $$a1 online resource (xvii, 472 pages) 001431856 336__ $$atext$$btxt$$2rdacontent 001431856 337__ $$acomputer$$bc$$2rdamedia 001431856 338__ $$aonline resource$$bcr$$2rdacarrier 001431856 347__ $$atext file 001431856 347__ $$bPDF 001431856 4901_ $$aAdvances in Intelligent Systems and Computing ;$$vv. 1267 001431856 500__ $$aIncludes author index. 001431856 50500 $$gPart I.$$tCryptocurrencies and Blockchain --$$tAttacking with Bitcoin: Using Bitcoin to Build Resilient Botnet Armies --$$tBlockchain-Based Systems in Land Registry, A Survey of Their Use and Economic Implications --$$tThe Evolution of Privacy in the Blockchain: A Historical Survey --$$tThe evolution of privacy in the blockchain: a historical survey --$$tSecuring Cryptoasset Insurance Services with Multisignatures --$$tBuilding an Ethereum-Based Decentralized Vehicle Rental System --$$gPart II$$tMachine Learning --$$tOff-Line Writer Verification Using Segments of Handwritten Samples and SVM --$$tA Comparative Study to Detect Flowmeter Deviations Using One-Class Classifiers --$$tIoT Device Identification Using Deep Learning --$$tImpact of Current Phishing Strategies in Machine Learning Models for Phishing Detection --$$tCrime Prediction for Patrol Routes Generation Using Machine Learning --$$gPart III.$$tApplications --$$tHealth Access Broker: Secure, Patient-Controlled Management of Personal Health Records in the Cloud --$$tShort Message Multichannel Broadcast Encryption --$$tCybersecurity Overview of a Robot as a Service Platform --$$tProbabilistic and Timed Analysis of Security Protocols --$$tDomain Knowledge: Predicting the Kind of Content Hosted by a Domain --$$tEvidence Identification and Acquisition Based on Network Link in an Internet of Things Environment --$$tProposition of Innovative and Scalable Information System for Call Detail Records Analysis and Visualisation --$$tAutomatic Detection of Sensitive Information in Educative Social Networks --$$gPart IV.$$tSpecial Session: Fake News Detection and Prevention --$$tDetection of Artificial Images and Changes in Real Images Using Convolutional Neural Networks --$$tDistributed Architecture for Fake News Detection --$$tMulti-stage News-Stance Classification Based on Lexical and Neural Features --$$tFake news direction --$$tApplication of the BERT-Based Architecture in Fake News Detection --$$gPart V.$$tSpecial Session: Mathematical Methods and Models in Cybersecurity --$$tSimulating Malware Propagation with Different Infection Rates --$$tA Data Quality Assessment Model and Its Application to Cybersecurity Data Sources --$$tTowards Forecasting Time-Series of Cyber-Security Data Aggregates --$$tHybrid Approximate Convex Hull One-Class Classifier for an Industrial Plant --$$gPart VI.$$tSpecial Session: Measurements for a Dynamic Cyber-risk Assessment --$$tTraceability and Accountability in Autonomous Agents --$$tThe Order of the Factors DOES Alter the Product: Cyber Resilience Policies' Implementation Order --$$tDeep Learning Defenses Against Adversarial Examples for Dynamic Risk Assessment --$$tA New Approach for Dynamic and Risk-Based Data Anonymization --$$gPart VII.$$tSpecial Session: Cybersecurity in a Hybrid Quantum World --$$tAn Innovative Linear Complexity Computation for Cryptographic Sequences --$$tRandomness Analysis for GSS-sequences Concatenated --$$tStudy of the Reconciliation Mechanism of NewHope --$$tSecuring Blockchain with Quantum Safe Cryptography: When and How? --$$tBlockchain in Education: New Challenges --$$gPart VIII.$$tSpecial Session: Anomaly/Intrusion Detection --$$tImpact of Generative Adversarial Networks on NetFlow-Based Traffic Classification --$$tHybrid Model for Improving the Classification Effectiveness of Network Intrusion Detection --$$tAdaptive Approach for Density-Approximating Neural Network Models for Anomaly Detection --$$tSystematic Mapping of Detection Techniques for Advanced Persistent Threats --$$tNeural Network Analysis of PLC Traffic in Smart City Street Lighting Network --$$tBeta-Hebbian Learning for Visualizing Intrusions in Flows --$$tDetecting Intrusion via Insider Attack in Database Transactions by Learning Disentangled Representation with Deep Metric Neural Network. 001431856 506__ $$aAccess limited to authorized users. 001431856 520__ $$aThis book contains accepted papers presented at CISIS 2020 held in the beautiful and historic city of Burgos (Spain), in September 2020. The aim of the CISIS 2020 conference is to offer a meeting opportunity for academic and industry-related researchers belonging to the various, vast communities of computational intelligence, information security, and data mining. The need for intelligent, flexible behaviour by large, complex systems, especially in mission-critical domains, is intended to be the catalyst and the aggregation stimulus for the overall event. After a thorough peer-review process, the CISIS 2020 International Program Committee selected 43 papers which are published in these conference proceedings achieving an acceptance rate of 28%. Due to the COVID-19 outbreak, the CISIS 2020 edition was blended, combining on-site and on-line participation. In this relevant edition, a special emphasis was put on the organization of five special sessions related to relevant topics as Fake News Detection and Prevention, Mathematical Methods and Models in Cybersecurity, Measurements for a Dynamic Cyber-Risk Assessment, Cybersecurity in a Hybrid Quantum World, Anomaly/Intrusion Detection, and From the least to the least: cryptographic and data analytics solutions to fulfil least minimum privilege and endorse least minimum effort in information systems. The selection of papers was extremely rigorous in order to maintain the high quality of the conference and we would like to thank the members of the Program Committees for their hard work in the reviewing process. This is a crucial process to the creation of a high standard conference, and the CISIS conference would not exist without their help. 001431856 588__ $$aDescription based on print version record. 001431856 650_0 $$aComputer networks$$xSecurity measures$$vCongresses. 001431856 650_0 $$aComputer security$$vCongresses. 001431856 650_0 $$aComputational intelligence$$vCongresses. 001431856 650_6 $$aRéseaux d'ordinateurs$$xSécurité$$xMesures$$vCongrès. 001431856 650_6 $$aSécurité informatique$$vCongrès. 001431856 650_6 $$aIntelligence informatique$$vCongrès. 001431856 655_7 $$aConference papers and proceedings.$$2fast$$0(OCoLC)fst01423772 001431856 655_0 $$aElectronic books. 001431856 7001_ $$aHerrero, Alvaro. 001431856 7001_ $$aCambra, Carlos. 001431856 7001_ $$aUrda, Daniel. 001431856 7001_ $$aSedano, Javier. 001431856 7001_ $$aQuintián, Héctor. 001431856 7001_ $$aCorchado, Emilio. 001431856 77608 $$iPrint version:$$aHerrero, Álvaro$$t13th International Conference on Computational Intelligence in Security for Information Systems (CISIS 2020)$$dCham : Springer International Publishing AG,c2020$$z9783030578046 001431856 830_0 $$aAdvances in intelligent systems and computing ;$$v1267. 001431856 852__ $$bebk 001431856 85640 $$3Springer Nature$$uhttps://univsouthin.idm.oclc.org/login?url=https://link.springer.com/10.1007/978-3-030-57805-3$$zOnline Access$$91397441.1 001431856 909CO $$ooai:library.usi.edu:1431856$$pGLOBAL_SET 001431856 980__ $$aBIB 001431856 980__ $$aEBOOK 001431856 982__ $$aEbook 001431856 983__ $$aOnline 001431856 994__ $$a92$$bISE