Computational Intelligence in Information Assurance and Security
โ Scribed by E. C. Laskari, G. C. Meletiou (auth.), Nadia Nedjah, Ajith Abraham, Luiza de Macedo Mourelle (eds.)
- Publisher
- Springer-Verlag Berlin Heidelberg
- Year
- 2007
- Tongue
- English
- Leaves
- 268
- Series
- Studies in Computational Intelligence 57
- Edition
- 1
- Category
- Library
No coin nor oath required. For personal study only.
โฆ Synopsis
The global economic infrastructure is becoming increasingly dependent upon information technology, with computer and communication technology being essential and vital components of Government facilities, power plant systems, medical infrastructures, financial centers and military installations to name a few. Finding effective ways to protect information systems, networks and sensitive data within the critical information infrastructure is challenging even with the most advanced technology and trained professionals. This volume provides the academic and industrial community with a medium for presenting original research and applications related to information assurance and security using computational intelligence techniques. The included chapters communicate current research on information assurance and security regarding both the theoretical and methodological aspects, as well as various applications in solving real world information security problems using computational intelligence.
โฆ Table of Contents
Front Matter....Pages I-XX
Cryptography and Cryptanalysis Through Computational Intelligence....Pages 1-49
Multimedia Content Protection Based on Chaotic Neural Networks....Pages 51-78
Evolutionary Regular Substitution Boxes....Pages 79-88
Industrial Applications Using Wavelet Packets for Gross Error Detection....Pages 89-127
Immune-inspired Algorithm for Anomaly Detection....Pages 129-154
How to Efficiently Process Uncertainty within a Cyberinfrastructure without Sacrificing Privacy and Confidentiality....Pages 155-173
Fingerprint Recognition Using a Hierarchical Approach....Pages 175-199
Smart Card Security....Pages 201-233
Governance of Information Security: New Paradigm of Security Management....Pages 235-254
Back Matter....Pages 255-255
โฆ Subjects
Appl.Mathematics/Computational Methods of Engineering; Artificial Intelligence (incl. Robotics)
๐ SIMILAR VOLUMES
<P>The global economic infrastructure is becoming increasingly dependent upon information technology, with computer and communication technology being essential and vital components of Government facilities, power plant systems, medical infrastructures, financial centers and military installations t
<span>When you first hear the term information assurance you tend to conjure up an image of a balanced set of reasonable measures that have been taken to protect the information after an assessment has been made of risks that are posed to it. In truth, this is the Holy Grail that all organisations t
Today's society can no longer function without information technology. Essential infrastructure including the transportation system, banking, the entertainment industry, the healthcare system, government, the military and the education system can no longer survive without modern technology. This inc
<p><span>This book looks at cyber security challenges with topical advancements in computational intelligence and communication technologies. This book includes invited peer-reviewed chapters on the emerging intelligent computing and communication technology research advancements, experimental outco
<span>This book constitutes the proceedings of the 5th International Conference, ICC3 2021, held in Coimbatore, India, during December 16โ18, 2021. The 14 full papers included in this book were carefully reviewed and selected from 84 submissions. They were organized in topical sections as follows: c