<< back

3rd Workshop on Computer Security

 

 

Computer security is an important research topic that requires developments in several areas of Artificial Intelligence (AI) such as search, heuristics, pattern recognition, data mining, automated reasoning, expert systems, user modeling, etc. The objective of this workshop is to put together outstanding pieces of research covering different aspects of computer security, including but not limited to intrusion detection, protocol verification, protocol repair, information flow control, etc. Intended readers include academics and students working in these and other related areas in AI, as well as researchers working on statistics, in particular pattern recognition, signal processing, etc.

Chairs:

  • Carlos Mex-Perera

  • Raul Monroy

Program committee:

  • Arnulfo Alanís, T. de Tijuana

  • Juan J. Flores, U. Michoacana 

  • Dieter Hutter, DFKI

  • Eduardo Lleida, U. of Zaragoza           

  • Juan A. Nolazco, ITESM MTY  

  • Francisco Rodríguez H., CINVESTAV     

  • Erika Sánchez, ITESM CEM

  • Luis A. Trejo, ITESM CEM

Accepted papers:

Karen A.García-Gamboa, Eduardo Aguirre-Bermudez, Raúl Monroy and Carlos Mex-Perera. Forensic Intrusion Detection on System Logs.

Juan J. Flores, Anastacio Antolino and Juan M. Garcia. Evolving Hidden Markov Models for Network Anomaly Detection.

R. Alonso-Rodríguez, J. Vázquez-Islas, L.A. Trejo-Rodríguez, R. Monroy and E. Sánchez-Velázquez. How Social Networks can Help to Detect DDoS Attacks on DNS servers.

Luis M. Fernández-Carrasco, Hugo Terashima-Marín and Manuel Valenzuela-Rendón. An Autonomic Computing Mechanism to Enable Self-Protection and Self-Healing.

Eduardo Aguirre, Karen A. García-Gamboa and Raúl Monroy. Coloured Petri Nets for Modeling of Host-Based Attacks.
 

 

 


Sociedad Mexicana de Inteligencia Artificial
2009


<< back