-
- Conference Information
- Sponsors
- Invited talks
- Roy Maxion: Science of security and behavioral biometrics
- P.Degano: Formalizing Security in Ubiquitous and Cloud Scenarios
- Y.I.Cho: Designing Smart Cities: Security Issues
- Submissions
- Proceedings
- Previous Events
- CISIM Book Series
Accepted Papers
- Jerzy Pejaś and Tomasz Hyla: Certificate-Based Encryption Scheme with General Access Structure
- Imed El Fray: A comparative study of risk assessment methods, MEHARI & CRAMM with a new formal model of risk assessment (FoMRA) in Information Systems
- Pawel Morawiecki, Marian Srebrny, Ekawat Homsirikamol and Marcin Rogawski: Security margin evaluation of SHA-3 contest finalists through SAT-based attacks
- Rahma Boucetta and Mohamed Naceur Abdelkrim: Neural Network Modeling of a Flexible Manipulator Robot
- Krzysztof Misztal, Jacek Tabor and Khalid Saeed: A new algorithm for rotation detection in iris pattern recognition
- Ryszard Kozera and Jacek Tchorzewski: Outlier Removal in 2D Leap Frog Algorithm
- Piotr Porwik and Tomasz Orczyk: DTW and voting-based lip print recognition system
- Rafal Doroz and Krzysztof Wrobel: Dynamic Signature Recognition Based on Modified Windows Technique
- Andrzej Chmielewski and Sławomir T. Wierzchoń: Hybrid Negative Selection Approach for Anomaly Detection
- Ume Ghazia, Awais Shibli, Rahat Masood and Muhammad Bilal: USAGE CONTROL MODEL SPECIFICATION IN XACML
- Małgorzata Lucińska and Sławomir Wierzchoń: Spectral clustering based on k-nearest neighbor graph
- Novarun Deb and Nabendu Chaki: TIDS: Trust-based Intrusion Detection System for Wireless Ad-hoc Networks
- Manali Chakraborty and Nabendu Chaki: ETSeM: A Energy-aware, Trust-based, Selective Multi-path Routing Protocol
- Pavel Moravec and Petr Gajdos: Intruder Data Classification using GM-SOM
- Agnieszka Jastrzebska and Wladyslaw Homenda: Modeling Consumer Decision Making Process Using Triangular Norms
- Soumyabrata Saha and Rituparna Chaki: Weighted Energy Efficient Cluster Based Routing for Wireless Sensor Networks
- Pavla Drazdilova, Alisa Babskova, Jan Martinovic, Katerina Slaninova and Stepan Minks: Method for Identification of Suitable Persons in Collaborators’ Networks
- Soumya Sen, Anjan Dutta, Agostino Cortesi and Nabendu Chaki: A New Scale for Attribute Dependency in Large Database Systems
- Subhasis Dasgupta and Aditya Bagchi: A Graph-Based Formalism for Controlling Access to a Digital Library Ontology
- Katerina Slaninova, Jan Martinovic, Tomáš Kocyan, Pavla Drazdilova and Vaclav Snasel: Left-Right Oscillate Algorithm for Community Detection used in E-learning system
- Bartłomiej Dzieńkowski and Urszula Markowska-Kaczmar: Plan and goal structure reconstruction: an automated and incremental method based on observation of a single agent
- Andrea Albarelli, Filippo Bergamasco and Andrea Torsello: Rigid and Non-rigid Shape Matching for Mechanical Components Retrieval
- Vaclav Snasel, Pavel Kromer, Jan Platos, Milos Kudelka and Zdenek Horak: On Spectral Partitioning of Co-authorship Networks
- Aneta Poniszewska-Maranda: Role approach in access control development with the usage control concept
- Jiri Dvorsky, Zbynek Janoska and Lukas Vojacek: P systems for traffic flow simulation
- Aida Saeed-Bagińska and Romuald Mosdorf: Network traffic anomaly detection of TCP and UDP protocols based on recurrence plot windowing method
- Mariusz Rybnik and Wladyslaw Homenda: Tuning of a Knowledge-driven Harmonization Model for Tonal Music
- Tomasz Sitarek and Wladyslaw Homenda: Effcient Processing the Music Notation
- Michal Radecky, Jan Martinovic, Dusan Fedorcak, Radek Tomis and Ivo Vondrák: Using Extended Raster File for Real Time Traffic Information Mining
- Bartosz Marcinkowski and Michal Kuciapski: A Business Process Modeling Notation Extension for Risk Handling
- Marek Penhaker and Vladimir Kasik: Cloud Computing Environments for Biomedical Data Services
- Saswati Mukherjee, Ayan Lahiri, Samiran Chattopadhyay and Matangini Chattopadhyay: An Efficient Binary Playfair Algorithm using a 4×4 Playfair Key Matrix
- Marek Penhaker, Petr Klimes and Jakub Pindor: Advanced Intracardial Biosignal Processing
- Hazar Mliki, Mohamed Hammami and Hanêne Ben-Abdallah: Multi-constraints face detect-track system
- Martin Augustynek, Ondrej Adamec and David Micanik: Using different pressure sensor as spirometers
- Bogusław Cyganek: Embedding of the Extended Euclidean Distance into Pattern Recognition with Higher-Order Singular Value Decomposition of Prototype Tensors
- Mariusz Rybnik, Piotr Panasiuk and Khalid Saeed: Advances in the Keystroke Dynamics: the Practical Impact of Database Quality