| 000 | 02935nam a22004695i 4500 | ||
|---|---|---|---|
| 001 | 978-3-642-25237-2 | ||
| 003 | DE-He213 | ||
| 005 | 20140220083305.0 | ||
| 007 | cr nn 008mamaa | ||
| 008 | 120109s2012 gw | s |||| 0|eng d | ||
| 020 |
_a9783642252372 _9978-3-642-25237-2 |
||
| 024 | 7 |
_a10.1007/978-3-642-25237-2 _2doi |
|
| 050 | 4 | _aQ342 | |
| 072 | 7 |
_aUYQ _2bicssc |
|
| 072 | 7 |
_aCOM004000 _2bisacsh |
|
| 082 | 0 | 4 |
_a006.3 _223 |
| 100 | 1 |
_aElizondo, David A. _eeditor. |
|
| 245 | 1 | 0 |
_aComputational Intelligence for Privacy and Security _h[electronic resource] / _cedited by David A. Elizondo, Agusti Solanas, Antoni Martinez-Balleste. |
| 264 | 1 |
_aBerlin, Heidelberg : _bSpringer Berlin Heidelberg, _c2012. |
|
| 300 |
_aVIII, 260p. 69 illus., 36 illus. in color. _bonline resource. |
||
| 336 |
_atext _btxt _2rdacontent |
||
| 337 |
_acomputer _bc _2rdamedia |
||
| 338 |
_aonline resource _bcr _2rdacarrier |
||
| 347 |
_atext file _bPDF _2rda |
||
| 490 | 1 |
_aStudies in Computational Intelligence, _x1860-949X ; _v394 |
|
| 505 | 0 | _aFrom the content: Computational Intelligence for Privacy and Security: Introduction -- An Introduction to the Use of Neural Networks for Network Intrusion Detection -- Evolutionary Computation in Computer Security and Forensics: an Overview -- Application of Fuzzy Logic in Computer Security and Forensics -- A Topological Study of Chaotic Iterations Application to Hash Functions -- SOM-based Techniques towards Hierarchical Visualisation of Network Forensics Traffic Data. | |
| 520 | _aThe book is a collection of invited papers on Computational Intelligence for Privacy and Security. The majority of the chapters are extended versions of works presented at the special session on Computational Intelligence for Privacy and Security of the International Joint Conference on Neural Networks (IJCNN-2010) held July 2010 in Barcelona, Spain. The book is devoted to Computational Intelligence for Privacy and Security. It provides an overview of the most recent advances on the Computational Intelligence techniques being developed for Privacy and Security. The book will be of interest to researchers in industry and academics and to post-graduate students interested in the latest advances and developments in the field of Computational Intelligence for Privacy and Security. | ||
| 650 | 0 | _aEngineering. | |
| 650 | 0 | _aArtificial intelligence. | |
| 650 | 1 | 4 | _aEngineering. |
| 650 | 2 | 4 | _aComputational Intelligence. |
| 650 | 2 | 4 | _aArtificial Intelligence (incl. Robotics). |
| 700 | 1 |
_aSolanas, Agusti. _eeditor. |
|
| 700 | 1 |
_aMartinez-Balleste, Antoni. _eeditor. |
|
| 710 | 2 | _aSpringerLink (Online service) | |
| 773 | 0 | _tSpringer eBooks | |
| 776 | 0 | 8 |
_iPrinted edition: _z9783642252365 |
| 830 | 0 |
_aStudies in Computational Intelligence, _x1860-949X ; _v394 |
|
| 856 | 4 | 0 | _uhttp://dx.doi.org/10.1007/978-3-642-25237-2 |
| 912 | _aZDB-2-ENG | ||
| 999 |
_c102403 _d102403 |
||