๐”– Scriptorium
โœฆ   LIBER   โœฆ

๐Ÿ“

Computational Intelligence in Information Assurance and Security

โœ Scribed by E. C. Laskari, G. C. Meletiou (auth.), Nadia Nedjah, Ajith Abraham, Luiza de Macedo Mourelle (eds.)


Publisher
Springer-Verlag Berlin Heidelberg
Year
2007
Tongue
English
Leaves
268
Series
Studies in Computational Intelligence 57
Edition
1
Category
Library

โฌ‡  Acquire This Volume

No coin nor oath required. For personal study only.

โœฆ Synopsis


The global economic infrastructure is becoming increasingly dependent upon information technology, with computer and communication technology being essential and vital components of Government facilities, power plant systems, medical infrastructures, financial centers and military installations to name a few. Finding effective ways to protect information systems, networks and sensitive data within the critical information infrastructure is challenging even with the most advanced technology and trained professionals. This volume provides the academic and industrial community with a medium for presenting original research and applications related to information assurance and security using computational intelligence techniques. The included chapters communicate current research on information assurance and security regarding both the theoretical and methodological aspects, as well as various applications in solving real world information security problems using computational intelligence.

โœฆ Table of Contents


Front Matter....Pages I-XX
Cryptography and Cryptanalysis Through Computational Intelligence....Pages 1-49
Multimedia Content Protection Based on Chaotic Neural Networks....Pages 51-78
Evolutionary Regular Substitution Boxes....Pages 79-88
Industrial Applications Using Wavelet Packets for Gross Error Detection....Pages 89-127
Immune-inspired Algorithm for Anomaly Detection....Pages 129-154
How to Efficiently Process Uncertainty within a Cyberinfrastructure without Sacrificing Privacy and Confidentiality....Pages 155-173
Fingerprint Recognition Using a Hierarchical Approach....Pages 175-199
Smart Card Security....Pages 201-233
Governance of Information Security: New Paradigm of Security Management....Pages 235-254
Back Matter....Pages 255-255

โœฆ Subjects


Appl.Mathematics/Computational Methods of Engineering; Artificial Intelligence (incl. Robotics)


๐Ÿ“œ SIMILAR VOLUMES


Computational intelligence in informatio
โœ Ajith Abraham ๐Ÿ“‚ Library ๐Ÿ“… 2007 ๐Ÿ› Springer ๐ŸŒ English

<P>The global economic infrastructure is becoming increasingly dependent upon information technology, with computer and communication technology being essential and vital components of Government facilities, power plant systems, medical infrastructures, financial centers and military installations t

Information Assurance: Security in the I
โœ Andrew Blyth ๐Ÿ“‚ Library ๐Ÿ“… 2006 ๐Ÿ› Springer ๐ŸŒ English

<span>When you first hear the term information assurance you tend to conjure up an image of a balanced set of reasonable measures that have been taken to protect the information after an assessment has been made of risks that are posed to it. In truth, this is the Holy Grail that all organisations t

Information Assurance and Computer Secur
โœ J.P. Thomas and M. Essaaidi; Editors ๐Ÿ“‚ Library ๐Ÿ“… 2006 ๐ŸŒ English

Today's society can no longer function without information technology. Essential infrastructure including the transportation system, banking, the entertainment industry, the healthcare system, government, the military and the education system can no longer survive without modern technology. This inc

Cyber Security in Intelligent Computing
โœ Rajeev Agrawal (editor), Jing He (editor), Emmanuel Shubhakar Pilli (editor), Sa ๐Ÿ“‚ Library ๐Ÿ“… 2022 ๐Ÿ› Springer ๐ŸŒ English

<p><span>This book looks at cyber security challenges with topical advancements in computational intelligence and communication technologies. This book includes invited peer-reviewed chapters on the emerging intelligent computing and communication technology research advancements, experimental outco

Computational Intelligence, Cyber Securi
โœ Indhumathi Raman (editor), Poonthalir Ganesan (editor), Venkatasamy Sureshkumar ๐Ÿ“‚ Library ๐Ÿ“… 2022 ๐Ÿ› Springer ๐ŸŒ English

<span>This book constitutes the proceedings of the 5th International Conference, ICC3 2021, held in Coimbatore, India, during December 16โ€“18, 2021. The 14 full papers included in this book were carefully reviewed and selected from 84 submissions. They were organized in topical sections as follows: c