Selected Papers from the Ninth International Conference on Computational Intelligence and Security

The 2012 International Conference on Computational Intelligence and Security (CIS) is the ninth one focusing on all areas of two crucial fields in information processing: computational intelligence (CI) and information security (IS). In particular, the CIS Conference provides a platform to explore the potential applications of CI models, algorithms, and technologies to IS.

[1]  Yuping Wang,et al.  Multiobjective programming using uniform design and genetic algorithm , 2000, IEEE Trans. Syst. Man Cybern. Part C.

[2]  Kouichi Sakurai,et al.  A behavior based malware detection scheme for avoiding false positive , 2010, 2010 6th IEEE Workshop on Secure Network Protocols.

[3]  Dasong Cao,et al.  Bounds on eigenvalues and chromatic numbers , 1998 .

[4]  Wang Ruliang,et al.  Observer-Based Adaptive Neural Network Robust Control of Nonlinear Time-Delay Systems with Unmodeled Dynamics , 2010, 2010 International Conference on Computational Intelligence and Security.

[5]  Li Jie,et al.  Adaptive neural control design for a class of perturbed nonlinear time-varying delay and input delay systems , 2011, 2011 International Conference on Machine Learning and Cybernetics.

[6]  Jadzia Cendrowska,et al.  PRISM: An Algorithm for Inducing Modular Rules , 1987, Int. J. Man Mach. Stud..

[7]  Yanbo Li,et al.  Robust Adaptive Sliding Mode Control Design for a Class of Uncertain Neutral Systems with Distributed Delays , 2011, 2011 Seventh International Conference on Computational Intelligence and Security.

[8]  B. Nath,et al.  A New Approach on Rare Association Rule Mining , 2012 .

[9]  David E. Goldberg,et al.  A niched Pareto genetic algorithm for multiobjective optimization , 1994, Proceedings of the First IEEE Conference on Evolutionary Computation. IEEE World Congress on Computational Intelligence.

[10]  Ludovic Mé,et al.  Code obfuscation techniques for metamorphic viruses , 2008, Journal in Computer Virology.

[11]  Mark Stamp,et al.  Metamorphic worm that carries its own morphing engine , 2013, Journal of Computer Virology and Hacking Techniques.

[12]  Rodrigo Lopez,et al.  Clustal W and Clustal X version 2.0 , 2007, Bioinform..

[13]  Graeme Hirst,et al.  Algorithms for language reconstruction , 2002 .

[14]  Fred Cohen,et al.  Computational aspects of computer viruses , 1989, Comput. Secur..

[15]  Mehmet Kaya Autonomous classifiers with understandable rule using multi-objective genetic algorithms , 2010, Expert Syst. Appl..

[16]  Bart Goethals,et al.  Memory issues in frequent itemset mining , 2004, SAC '04.

[17]  Jinlong Shu,et al.  A sharp upper bound on the largest eigenvalue of the Laplacian matrix of a graph , 2002 .

[18]  Wei Lin,et al.  Adaptive control of nonlinearly parameterized systems: the smooth feedback case , 2002, IEEE Trans. Autom. Control..

[19]  Fred Cohen,et al.  Computer viruses—theory and experiments , 1990 .

[20]  Tomasz Imielinski,et al.  Mining association rules between sets of items in large databases , 1993, SIGMOD Conference.

[21]  Anne H. H. Ngu,et al.  QoS-aware middleware for Web services composition , 2004, IEEE Transactions on Software Engineering.

[22]  Srinivasan Parthasarathy,et al.  New Algorithms for Fast Discovery of Association Rules , 1997, KDD.

[23]  Li Zhong-shen Design of Robust H_∞ Controller for Uncertain Systems with Time-varying Delay——LMI Approach , 2006 .

[24]  Thomas Risse,et al.  Selecting skyline services for QoS-based web service composition , 2010, WWW '10.

[25]  Aditya P. Mathur,et al.  A Survey of Malware Detection Techniques , 2007 .

[26]  Chengqi Zhang,et al.  Genetic algorithm-based strategy for identifying association rules without specifying actual minimum support , 2009, Expert Syst. Appl..

[27]  Arun N. Swami,et al.  Set-oriented mining for association rules in relational databases , 1995, Proceedings of the Eleventh International Conference on Data Engineering.

[28]  Lingsheng Shi Bounds on the (Laplacian) spectral radius of graphs , 2007 .

[29]  Erhan Akin,et al.  Rough particle swarm optimization and its applications in data mining , 2008, Soft Comput..

[30]  Yang Xiang,et al.  Classification of malware using structured control flow , 2010 .

[31]  Shaoning Pang,et al.  The Effects of Different Representations on Malware Motif Identification , 2012, 2012 Eighth International Conference on Computational Intelligence and Security.

[32]  Rajib Mall,et al.  Application of elitist multi-objective genetic algorithm for classification rule generation , 2008, Appl. Soft Comput..

[33]  Xu Huai-juan UPPER BOUND ON SPECTRAL RADIUS OF GRAPHS , 2005 .

[34]  Huaguang Zhang,et al.  Adaptive Synchronization Between Two Different Chaotic Neural Networks With Time Delay , 2007, IEEE Transactions on Neural Networks.

[35]  Xiao-Dong Zhang,et al.  Two sharp upper bounds for the Laplacian eigenvalues , 2004 .

[36]  V. J. Rayward-Smith,et al.  Data mining rules using multi-objective evolutionary algorithms , 2003, The 2003 Congress on Evolutionary Computation, 2003. CEC '03..

[37]  Siu Cheung Hui,et al.  Associative Classification With Artificial Immune System , 2009, IEEE Transactions on Evolutionary Computation.

[38]  Somesh Jha,et al.  A semantics-based approach to malware detection , 2007, POPL '07.

[39]  D. Mount Bioinformatics: Sequence and Genome Analysis , 2001 .

[40]  Somesh Jha,et al.  Semantics-aware malware detection , 2005, 2005 IEEE Symposium on Security and Privacy (S&P'05).

[41]  Guillaume Bonfante,et al.  On Abstract Computer Virology from a Recursion Theoretic Perspective , 2006, Journal in Computer Virology.

[42]  Zvi M. Kedem,et al.  Pincer-Search: A New Algorithm for Discovering the Maximum Frequent Set , 1998, EDBT.

[43]  Leonard M. Adleman,et al.  An Abstract Theory of Computer Viruses , 1988, CRYPTO.

[44]  Quan Z. Sheng,et al.  Quality driven web services composition , 2003, WWW '03.

[45]  Peter Martini,et al.  Classification and detection of metamorphic malware using value set analysis , 2009, 2009 4th International Conference on Malicious and Unwanted Software (MALWARE).

[46]  Clarisse Dhaenens,et al.  Parallel Genetic Algorithms for multi-objective rule mining , 2005 .

[47]  C. K. Kwong,et al.  A multi-objective genetic algorithm approach to rule mining for affective product design , 2012, Expert Syst. Appl..

[48]  Jian Pei,et al.  Mining Frequent Patterns without Candidate Generation: A Frequent-Pattern Tree Approach , 2006, Sixth IEEE International Conference on Data Mining - Workshops (ICDMW'06).

[49]  M S Waterman,et al.  Identification of common molecular subsequences. , 1981, Journal of molecular biology.

[50]  Ammar Ahmed E. Elhadi,et al.  Malware detection based on hybrid signature behavior application programming interface call graph , 2012 .

[51]  Rajeev Motwani,et al.  Dynamic itemset counting and implication rules for market basket data , 1997, SIGMOD '97.

[52]  Lihua Feng,et al.  SOME SHARP UPPER BOUNDS ON THE SPECTRAL RADIUS OF GRAPHS , 2007 .

[53]  Bilal Alatas,et al.  MODENAR: Multi-objective differential evolution algorithm for mining numeric association rules , 2008, Appl. Soft Comput..

[54]  Maude Manouvrier,et al.  CPN-TWS: a coloured petri-net approach for transactional-QoS driven Web Service composition , 2011, Int. J. Web Grid Serv..

[55]  Quanmin Zhu,et al.  Stable adaptive neurocontrol for nonlinear discrete-time systems , 2004, IEEE Trans. Neural Networks.

[56]  Marco Laumanns,et al.  SPEA2: Improving the strength pareto evolutionary algorithm , 2001 .

[57]  Refik Molva,et al.  Augmenting Web Services Composition with Transactional Requirements , 2006, 2006 IEEE International Conference on Web Services (ICWS'06).

[58]  Paulo F. Pires,et al.  Building Reliable Web Services Compositions , 2002, Web, Web-Services, and Database Systems.

[59]  Shengyuan Xu,et al.  Technical communique: New results on delay-dependent robust H∞ control for systems with time-varying delays , 2006 .

[60]  S. B. Needleman,et al.  A general method applicable to the search for similarities in the amino acid sequence of two proteins. , 1970, Journal of molecular biology.

[61]  J. Parikka Digital Contagions: A Media Archaeology of Computer Viruses , 2007 .

[62]  Shuzhi Sam Ge,et al.  Adaptive neural network control for strict-feedback nonlinear systems using backstepping design , 1999, Proceedings of the 1999 American Control Conference (Cat. No. 99CH36251).

[63]  Tzi-cker Chiueh,et al.  Automatic Generation of String Signatures for Malware Detection , 2009, RAID.

[64]  Y. Robiah,et al.  A New Generic Taxonomy on Hybrid Malware Detection Technique , 2009, ArXiv.

[65]  Lothar Thiele,et al.  Comparison of Multiobjective Evolutionary Algorithms: Empirical Results , 2000, Evolutionary Computation.

[66]  Mingtian Zhou,et al.  Some Further Theoretical Results about Computer Viruses , 2004, Comput. J..

[67]  Jian Pei,et al.  Mining frequent patterns without candidate generation , 2000, SIGMOD 2000.

[68]  Bing Chen,et al.  Novel adaptive neural control design for nonlinear MIMO time-delay systems , 2009, Autom..

[69]  Tian-fei Wang Several sharp upper bounds for the largest laplacian eigenvalue of a graph , 2007 .

[70]  Ibrahim Sogukpinar,et al.  Polymorphic worm detection using token-pair signatures , 2008, SecPerU '08.

[71]  Nicolás Marín,et al.  A Complexity Guided Algorithm for Association Rule Extraction on Fuzzy DataCubes , 2008, IEEE Transactions on Fuzzy Systems.

[72]  Xiao-Dong Zhang,et al.  On the Spectral Radius of Graphs with Cut Vertices , 2001, J. Comb. Theory, Ser. B.

[73]  Patrick Albert,et al.  Configuration based workflow composition , 2005, IEEE International Conference on Web Services (ICWS'05).

[74]  Peter Szor,et al.  The Art of Computer Virus Research and Defense , 2005 .

[75]  N. Biggs Algebraic Graph Theory , 1974 .

[76]  Diomidis Spinellis,et al.  Reliable identification of bounded-length viruses is NP-complete , 2003, IEEE Trans. Inf. Theory.

[77]  Kalyanmoy Deb,et al.  Muiltiobjective Optimization Using Nondominated Sorting in Genetic Algorithms , 1994, Evolutionary Computation.

[78]  Kalyanmoy Deb,et al.  A fast and elitist multiobjective genetic algorithm: NSGA-II , 2002, IEEE Trans. Evol. Comput..

[79]  Yanfang Ye,et al.  CIMDS: Adapting Postprocessing Techniques of Associative Classification for Malware Detection , 2010, IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews).

[80]  Qing Li,et al.  FACTS: A Framework for Fault-Tolerant Composition of Transactional Web Services , 2010, IEEE Transactions on Services Computing.

[81]  Shamkant B. Navathe,et al.  An Efficient Algorithm for Mining Association Rules in Large Databases , 1995, VLDB.

[82]  Li Bin New Upper Bounds for the Laplacian Spectral Radius of Graphs , 2010 .

[83]  Zvi M. Kedem,et al.  Pincer-Search: An Efficient Algorithm for Discovering the Maximum Frequent Set , 2002, IEEE Trans. Knowl. Data Eng..

[84]  B. Mohar,et al.  Eigenvalues and the max-cut problem , 1990 .

[85]  B. Mohar Some applications of Laplace eigenvalues of graphs , 1997 .

[86]  Liu Xin,et al.  Detecting network intrusions by data mining and variable-length sequence pattern matching , 2009 .

[87]  Gottfried Vossen,et al.  A Multi-Level Model for Web Service Composition , 2004 .

[88]  Marco Laumanns,et al.  A unified model for multi-objective evolutionary algorithms with elitism , 2000, Proceedings of the 2000 Congress on Evolutionary Computation. CEC00 (Cat. No.00TH8512).

[89]  Claude Godart,et al.  Ensuring required failure atomicity of composite Web services , 2005, WWW '05.

[90]  Christopher Krügel,et al.  Limits of Static Analysis for Malware Detection , 2007, Twenty-Third Annual Computer Security Applications Conference (ACSAC 2007).

[91]  Laurence A. Wolsey,et al.  Integer and Combinatorial Optimization , 1988 .

[92]  Peter J. Fleming,et al.  Genetic Algorithms for Multiobjective Optimization: FormulationDiscussion and Generalization , 1993, ICGA.

[93]  Liping Chen,et al.  Service Selection of Ensuring Transactional Reliability and QoS for Web Service Composition , 2012 .

[94]  Behrouz Minaei-Bidgoli,et al.  Multi objective association rule mining with genetic algorithm without specifying minimum support and minimum confidence , 2011, Expert Syst. Appl..

[95]  Rajib Mall,et al.  Predictive and comprehensible rule discovery using a multi-objective genetic algorithm , 2006, Knowl. Based Syst..

[96]  J. Lam,et al.  Exponential /spl epsiv/-regulation for multi-input nonlinear systems using neural networks , 2005, IEEE Transactions on Neural Networks.

[97]  Ramakrishnan Srikant,et al.  Fast algorithms for mining association rules , 1998, VLDB 1998.

[98]  Keng Peng Tee,et al.  Approximation-based control of nonlinear MIMO time-delay systems , 2007, Autom..

[99]  Ulrich Güntzer,et al.  Algorithms for association rule mining — a general survey and comparison , 2000, SKDD.

[100]  R. Merris Laplacian matrices of graphs: a survey , 1994 .

[101]  Christian S. Collberg,et al.  A Taxonomy of Obfuscating Transformations , 1997 .

[102]  Tao Li,et al.  Adaptive RBF neural-networks control for a class of time-delay nonlinear systems , 2008, Neurocomputing.

[103]  Yuping Wang,et al.  A clustering multi-objective evolutionary algorithm based on orthogonal and uniform design , 2009, 2009 IEEE Congress on Evolutionary Computation.

[104]  Ju H. Park,et al.  On improved delay-dependent robust control for uncertain time-delay systems , 2004, IEEE Transactions on Automatic Control.

[105]  Charles R. Johnson,et al.  Matrix analysis , 1985, Statistical Inference for Engineers and Data Scientists.

[106]  David W. Coit,et al.  Multi-objective optimization using genetic algorithms: A tutorial , 2006, Reliab. Eng. Syst. Saf..

[107]  Dirk Van den Poel,et al.  Faculteit Economie En Bedrijfskunde Hoveniersberg 24 B-9000 Gent Incorporating Sequential Information into Traditional Classification Models by Using an Element/position-sensitive Sam , 2022 .

[108]  Jiong Sheng Li,et al.  Upper Bounds for the Laplacian Graph Eigenvalues , 2004 .

[109]  Li-Chen Fu,et al.  A two-phase evolutionary algorithm for multiobjective mining of classification rules , 2010, IEEE Congress on Evolutionary Computation.

[110]  Kumpati S. Narendra,et al.  Nonlinear adaptive control using neural networks and multiple models , 2001, Autom..

[111]  Anne H. H. Ngu,et al.  QoS computation and policing in dynamic web service selection , 2004, WWW Alt. '04.

[112]  Behrouz Minaei-Bidgoli,et al.  Clustering Based Multi-Objective Rule Mining using Genetic Algorithm , 2010, J. Digit. Content Technol. its Appl..

[113]  Hisao Ishibuchi,et al.  Multiobjective Genetic Fuzzy Systems , 2009 .

[114]  Qingfu Zhang,et al.  Multiobjective evolutionary algorithms: A survey of the state of the art , 2011, Swarm Evol. Comput..

[115]  Bin Li,et al.  Improved Upper Bounds for the Laplacian Spectral Radius of a Graph , 2011, Electron. J. Comb..

[116]  Philippe Beaucamps,et al.  Advanced Metamorphic Techniques in Computer Viruses , 2007 .

[117]  Huiqing Liu,et al.  On the Laplacian spectral radius of a graph , 2004 .

[118]  Anthony J. Calise,et al.  Adaptive Control of a Class of Nonaffine Systems Using Neural Networks , 2007, IEEE Transactions on Neural Networks.

[119]  I. Maros Computational Techniques of the Simplex Method , 2002 .

[120]  Qinghua Zhang,et al.  MetaAware: Identifying Metamorphic Malware , 2007, Twenty-Third Annual Computer Security Applications Conference (ACSAC 2007).

[121]  Eric Filiol,et al.  Formalization of Viruses and Malware Through Process Algebras , 2010, 2010 International Conference on Availability, Reliability and Security.

[122]  Mirko Lepovic,et al.  The high-energy band in the photoelectron spectrum of alkanes and its dependence on molecular structure , 1999 .

[123]  Carlos A. Coello Coello,et al.  Evolutionary Multi-Objective Optimization: Basic Concepts and Some Applications in Pattern Recognition , 2011, MCPR.

[124]  Maude Manouvrier,et al.  TQoS: Transactional and QoS-Aware Selection Algorithm for Automatic Web Service Composition , 2010, IEEE Transactions on Services Computing.

[125]  Shaoning Pang,et al.  Multiple sequence alignment and artificial neural networks for malicious software detection , 2012, 2012 8th International Conference on Natural Computation.

[126]  Jie Li,et al.  Adaptive Neural Control for a Class of Perturbed Time-delay Nonlinear Systems , 2011, 2011 Seventh International Conference on Computational Intelligence and Security.

[127]  Sujatha Srinivasan,et al.  Evolutionary multi objective optimization for rule mining: a review , 2011, Artificial Intelligence Review.

[128]  Shu Jin-long,et al.  Ordering of trees with respect to their spectral radius of Nordhaus-Gaddum type , 2007 .

[129]  Robert M. Sanner,et al.  Gaussian Networks for Direct Adaptive Control , 1991, 1991 American Control Conference.

[130]  Alex A. Freitas,et al.  Discovering comprehensible classification rules with a genetic algorithm , 2000, Proceedings of the 2000 Congress on Evolutionary Computation. CEC00 (Cat. No.00TH8512).

[131]  Jun Zhang,et al.  Simlarity Search for Web Services , 2004, VLDB.

[132]  Yuping Wang,et al.  Uniform Design Based Hybrid Genetic Algorithm for Multiobjective Bilevel Convex Programming , 2011, 2011 Seventh International Conference on Computational Intelligence and Security.

[133]  Bhabesh Nath,et al.  Multi-objective rule mining using genetic algorithms , 2004, Inf. Sci..

[134]  Yuan Hong,et al.  A sharp upper bound for the spectral radius of the Nordhaus-Gaddum type , 2000, Discret. Math..

[135]  Jie Zhang,et al.  Parallel Multi-Swarm PSO Based on K-Medoids and Uniform Design , 2013 .

[136]  Shuzhi Sam Ge,et al.  Adaptive neural control of nonlinear time-delay systems with unknown virtual control coefficients , 2004, IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics).

[137]  Rajeev Rastogi,et al.  A transaction model for multidatabase systems , 1992, [1992] Proceedings of the 12th International Conference on Distributed Computing Systems.