๐”– Bobbio Scriptorium
โœฆ   LIBER   โœฆ

[Lecture Notes in Computer Science] Computational Intelligence and Security Volume 4456 || Modeling and Simulation for Security Risk Propagation in Critical Information Systems

โœ Scribed by Wang, Yuping; Cheung, Yiu-ming; Liu, Hailin


Book ID
120427188
Publisher
Springer Berlin Heidelberg
Year
2007
Tongue
German
Weight
267 KB
Category
Article
ISBN
3540743774

No coin nor oath required. For personal study only.

โœฆ Synopsis


The Refereed Post-proceedings Of The International Conference On Computational Intelligence And Security Are Presented In This Volume. The 116 Papers Were Submitted To Two Rounds Of Careful Review. Papers Cover Bio-inspired Computing, Evolutionary Computation, Learning Systems And Multi-agents, Cryptography, Information Processing And Intrusion Detection, Systems And Security, Image And Signal Processing, And Pattern Recognition.


๐Ÿ“œ SIMILAR VOLUMES


[Lecture Notes in Computer Science] Comp
โœ Wang, Yuping; Cheung, Yiu-ming; Liu, Hailin ๐Ÿ“‚ Article ๐Ÿ“… 2007 ๐Ÿ› Springer Berlin Heidelberg ๐ŸŒ German โš– 437 KB

The Refereed Post-proceedings Of The International Conference On Computational Intelligence And Security Are Presented In This Volume. The 116 Papers Were Submitted To Two Rounds Of Careful Review. Papers Cover Bio-inspired Computing, Evolutionary Computation, Learning Systems And Multi-agents, Cryp

[Lecture Notes in Computer Science] Comp
โœ Wang, Yuping; Cheung, Yiu-ming; Liu, Hailin ๐Ÿ“‚ Article ๐Ÿ“… 2007 ๐Ÿ› Springer Berlin Heidelberg ๐ŸŒ German โš– 262 KB

The Refereed Post-proceedings Of The International Conference On Computational Intelligence And Security Are Presented In This Volume. The 116 Papers Were Submitted To Two Rounds Of Careful Review. Papers Cover Bio-inspired Computing, Evolutionary Computation, Learning Systems And Multi-agents, Cryp

[Lecture Notes in Computer Science] Comp
โœ Wang, Yuping; Cheung, Yiu-ming; Liu, Hailin ๐Ÿ“‚ Article ๐Ÿ“… 2007 ๐Ÿ› Springer Berlin Heidelberg ๐ŸŒ German โš– 980 KB

The Refereed Post-proceedings Of The International Conference On Computational Intelligence And Security Are Presented In This Volume. The 116 Papers Were Submitted To Two Rounds Of Careful Review. Papers Cover Bio-inspired Computing, Evolutionary Computation, Learning Systems And Multi-agents, Cryp