Description: Computational Intelligence in Information Assurance and Security by Ajith Abraham This volume provides the academic and industrial community with a medium for presenting original research and applications related to information assurance and security using computational intelligence techniques. FORMAT Paperback LANGUAGE English CONDITION Brand New Publisher Description This volume provides the academic and industrial community with a medium for presenting original research and applications related to information assurance and security using computational intelligence techniques. It details current research on information assurance and security regarding both the theoretical and methodological aspects, as well as various applications in solving real world problems using computational intelligence. Notes Presents recent advances of Computational Intelligence in Information Assurance and Security Back Cover The global economic infrastructure is becoming increasingly dependent upon information technology, with computer and communication technology being essential and vital components of Government facilities, power plant systems, medical infrastructures, financial centers and military installations to name a few. Finding effective ways to protect information systems, networks and sensitive data within the critical information infrastructure is challenging even with the most advanced technology and trained professionals. This volume provides the academic and industrial community with a medium for presenting original research and applications related to information assurance and security using computational intelligence techniques. The included chapters communicate current research on information assurance and security regarding both the theoretical and methodological aspects, as well as various applications in solving real world information security problems using computational intelligence. Table of Contents Cryptography and Cryptanalysis Through Computational Intelligence.- Multimedia Content Protection Based on Chaotic Neural Networks.- Evolutionary Regular Substitution Boxes.- Industrial Applications Using Wavelet Packets for Gross Error Detection.- Immune-inspired Algorithm for Anomaly Detection.- How to Efficiently Process Uncertainty within a Cyberinfrastructure without Sacrificing Privacy and Confidentiality.- Fingerprint Recognition Using a Hierarchical Approach.- Smart Card Security.- Governance of Information Security: New Paradigm of Security Management. Long Description The global economic infrastructure is becoming increasingly dependent upon information technology, with computer and communication technology being essential and vital components of Government facilities, power plant systems, medical infrastructures, ?nancial centers and military installations to name a few. Finding eective ways to protect information systems, networks and sensitivedatawithinthecriticalinformationinfrastructureischallengingeven with the most advanced technology and trained professionals. This volume provides the academic and industrial community with a medium for presenting original research and applications related to infor- tion assurance and security using computational intelligence techniques. The includedchapterscommunicatecurrentresearchoninformationassuranceand security regarding both the theoretical and methodological aspects, as well as various applications in solving real world information security problems using computational intelligence. In Chapter 1, which is entitled Cryptography and Cryptanalysis Through Computational Intelligence, the authors give a brief introduction to crypt- raphy and Computational Intelligence methods, followed by a short survey of the applications of Computational Intelligence to cryptographic problems. Their contribution in this ?eld is presented. Specically, some cryptographic problems are viewed as discrete optimization tasks and Evolutionary Com- tation methods are utilized to address them. The authors show that Articial NeuralNetworks areeective inapproximating somecryptographic functions. They also present some theoretical issues of Ridge Polynomial Networks and cryptography. Feature Presents recent advances of Computational Intelligence in Information Assurance and Security Details ISBN3642090168 Publisher Springer-Verlag Berlin and Heidelberg GmbH & Co. KG Series Studies in Computational Intelligence Year 2010 ISBN-10 3642090168 ISBN-13 9783642090165 Format Paperback Publication Date 2010-11-23 Imprint Springer-Verlag Berlin and Heidelberg GmbH & Co. K Place of Publication Berlin Country of Publication Germany Edited by Ajith Abraham DEWEY 006.3 Edition 1st Short Title COMPUTATIONAL INTELLIGENCE IN Language English Media Book Series Number 57 Birth 1968 Pages 255 DOI 10.1007/978-3-540-71078-3 Author Ajith Abraham Edition Description Softcover reprint of hardcover 1st ed. 2007 Alternative 9783540710776 Audience Professional & Vocational Illustrations XX, 255 p. We've got this At The Nile, if you're looking for it, we've got it. With fast shipping, low prices, friendly service and well over a million items - you're bound to find what you want, at a price you'll love! TheNile_Item_ID:137878580;
Price: 242.84 AUD
Location: Melbourne
End Time: 2024-12-05T11:27:23.000Z
Shipping Cost: 0 AUD
Product Images
Item Specifics
Restocking fee: No
Return shipping will be paid by: Buyer
Returns Accepted: Returns Accepted
Item must be returned within: 30 Days
ISBN-13: 9783642090165
Book Title: Computational Intelligence in Information Assurance and Security
Number of Pages: 255 Pages
Language: English
Publication Name: Computational Intelligence in Information Assurance and Security
Publisher: Springer-Verlag Berlin and Heidelberg Gmbh & Co. Kg
Publication Year: 2010
Subject: Engineering & Technology, Computer Science
Item Height: 235 mm
Item Weight: 427 g
Type: Textbook
Author: Ajith Abraham
Item Width: 155 mm
Format: Paperback