Normal view MARC view ISBD view

Computational Intelligence for Privacy and Security [electronic resource] / edited by David A. Elizondo, Agusti Solanas, Antoni Martinez-Balleste.

By: Elizondo, David A [editor.].
Contributor(s): Solanas, Agusti [editor.] | Martinez-Balleste, Antoni [editor.] | SpringerLink (Online service).
Material type: materialTypeLabelBookSeries: Studies in Computational Intelligence: 394Publisher: Berlin, Heidelberg : Springer Berlin Heidelberg, 2012Description: VIII, 260p. 69 illus., 36 illus. in color. online resource.Content type: text Media type: computer Carrier type: online resourceISBN: 9783642252372.Subject(s): Engineering | Artificial intelligence | Engineering | Computational Intelligence | Artificial Intelligence (incl. Robotics)DDC classification: 006.3 Online resources: Click here to access online
Contents:
From the content: Computational Intelligence for Privacy and Security: Introduction -- An Introduction to the Use of Neural Networks for Network Intrusion Detection -- Evolutionary Computation in Computer Security and Forensics: an Overview -- Application of Fuzzy Logic in Computer Security and Forensics -- A Topological Study of Chaotic Iterations Application to Hash Functions -- SOM-based Techniques towards Hierarchical Visualisation of Network Forensics Traffic Data.
In: Springer eBooksSummary: The book is a collection of invited papers on Computational Intelligence for Privacy and Security. The majority of the chapters are extended versions of works presented at the special session on Computational Intelligence for Privacy and Security of the International Joint Conference on Neural Networks (IJCNN-2010) held July 2010 in Barcelona, Spain. The book is devoted to Computational Intelligence for Privacy and Security. It provides an overview of the most recent advances on the Computational Intelligence techniques being developed for Privacy and Security. The book will be of interest to researchers in industry and academics and to post-graduate students interested in the latest advances and developments in the field of Computational Intelligence for Privacy and Security.
Tags from this library: No tags from this library for this title. Log in to add tags.
No physical items for this record

From the content: Computational Intelligence for Privacy and Security: Introduction -- An Introduction to the Use of Neural Networks for Network Intrusion Detection -- Evolutionary Computation in Computer Security and Forensics: an Overview -- Application of Fuzzy Logic in Computer Security and Forensics -- A Topological Study of Chaotic Iterations Application to Hash Functions -- SOM-based Techniques towards Hierarchical Visualisation of Network Forensics Traffic Data.

The book is a collection of invited papers on Computational Intelligence for Privacy and Security. The majority of the chapters are extended versions of works presented at the special session on Computational Intelligence for Privacy and Security of the International Joint Conference on Neural Networks (IJCNN-2010) held July 2010 in Barcelona, Spain. The book is devoted to Computational Intelligence for Privacy and Security. It provides an overview of the most recent advances on the Computational Intelligence techniques being developed for Privacy and Security. The book will be of interest to researchers in industry and academics and to post-graduate students interested in the latest advances and developments in the field of Computational Intelligence for Privacy and Security.

There are no comments for this item.

Log in to your account to post a comment.

2017 | The Technical University of Kenya Library | +254(020) 2219929, 3341639, 3343672 | library@tukenya.ac.ke | Haile Selassie Avenue