<div><div>This book provides the state-of-the-art development on security and privacy for fog/edge computing, together with their system architectural support and applications. This book is organized into five parts with a total of 15 chapters. Each area corresponds to an important snapshot. The fir
Computational Intelligence for Privacy and Security
โ Scribed by David A. Elizondo, Agusti Solanas (auth.), David A. Elizondo, Agusti Solanas, Antoni Martinez-Balleste (eds.)
- Publisher
- Springer-Verlag Berlin Heidelberg
- Year
- 2012
- Tongue
- English
- Leaves
- 261
- Series
- Studies in Computational Intelligence 394
- Edition
- 1
- Category
- Library
No coin nor oath required. For personal study only.
โฆ Synopsis
The book is a collection of invited papers on Computational Intelligence for Privacy and Security. The majority of the chapters are extended versions of works presented at the special session on Computational Intelligence for Privacy and Security of the International Joint Conference on Neural Networks (IJCNN-2010) held July 2010 in Barcelona, Spain.
The book is devoted to Computational Intelligence for Privacy and Security. It provides an overview of the most recent advances on the Computational Intelligence techniques being developed for Privacy and Security. The book will be of interest to researchers in industry and academics and to post-graduate students interested in the latest advances and developments in the field of Computational Intelligence for Privacy and Security.
โฆ Table of Contents
Front Matter....Pages 1-7
Computational Intelligence for Privacy and Security: Introduction....Pages 1-4
An Introduction to the Use of Neural Networks for Network Intrusion Detection....Pages 5-24
Evolutionary Computation in Computer Security and Forensics: An Overview....Pages 25-34
Application of Fuzzy Logic in Computer Security and Forensics....Pages 35-49
A Topological Study of Chaotic Iterations Application to Hash Functions....Pages 51-73
SOM-Based Techniques towards Hierarchical Visualisation of Network Forensics Traffic Data....Pages 75-95
The Application of Evolutionary Heuristics for Solving Soft Security Issues in MANETs....Pages 97-114
Mixing Genetic Algorithms and V-MDAV to Protect Microdata....Pages 115-133
Breaching Privacy Using Data Mining: Removing Noise from Perturbed Data....Pages 135-157
Feature Selection of Hand Biometrical Traits Based on Computational Intelligence Techniques....Pages 159-180
Building Visual Surveillance Systems with Neural Networks....Pages 181-198
Advances in Spam Filtering Techniques....Pages 199-214
Computational Intelligent Techniques and Similarity Measures for Malware Classification....Pages 215-236
Intelligence Techniques in Computer Security and Forensics: At the Boundaries of Ethics and Law....Pages 237-258
Back Matter....Pages 1-1
โฆ Subjects
Computational Intelligence; Artificial Intelligence (incl. Robotics)
๐ SIMILAR VOLUMES
This book provides the state-of-the-art development on security and privacy for fog/edge computing, together with their system architectural support and applications. This book is organized into five parts with a total of 15 chapters. Each area corresponds to an important snapshot. The first part of
<p>This book analyzes the latest advances in privacy, security and risk technologies within cloud environments. With contributions from leading experts, the text presents both a solid overview of the field and novel, cutting-edge research. A Glossary is also included at the end of the book. Topics a
<p>This book states that the major aim audience are people who have some familiarity with Internet of things (IoT) but interested to get a comprehensive interpretation of the role of deep Learning in maintaining the security and privacy of IoT. A reader should be friendly with Python and the basics
<p>This book states that the major aim audience are people who have some familiarity with Internet of things (IoT) but interested to get a comprehensive interpretation of the role of deep Learning in maintaining the security and privacy of IoT. A reader should be friendly with Python and the basics
<p><span>This book states that the major aim audience are people who have some familiarity with Internet of things (IoT) but interested to get a comprehensive interpretation of the role of deep Learning in maintaining the security and privacy of IoT. A reader should be friendly with Python and the b