Descripción del título
The book is a collection of invited papers on Computational Intelligence for Privacy and Security. The majority of the chapters are extended versions of works presented at the special session on Computational Intelligence for Privacy and Security of the International Joint Conference on Neural Networks (IJCNN-2010) held July 2010 in Barcelona, Spain. The book is devoted to Computational Intelligence for Privacy and Security. It provides an overview of the most recent advances on the Computational Intelligence techniques being developed for Privacy and Security. The book will be of interest to researchers in industry and academics and to post-graduate students interested in the latest advances and developments in the field of Computational Intelligence for Privacy and Security
Monografía
monografia Rebiun36093566 https://catalogo.rebiun.org/rebiun/record/Rebiun36093566 m o d | cr nn 008mamaa 120109s2012 gw s 00 0 eng d 9783642252372 9783642441448 9783642252365 9783642252389 10.1007/978-3-642-25237-2 doi UMA.RE eng UYQ bicssc COM004000 bisacsh 006.3 23 Computational Intelligence for Privacy and Security Recurso electrónico] edited by David A. Elizondo, Agusti Solanas, Antoni Martinez-Balleste Berlin, Heidelberg Springer Berlin Heidelberg 2012 Berlin, Heidelberg Berlin, Heidelberg Springer Berlin Heidelberg Berlin, Heidelberg Springer Berlin Heidelberg 2012 Berlin, Heidelberg Berlin, Heidelberg Springer Berlin Heidelberg VIII, 260 p VIII, 260 p Text txt rdacontent computer c rdamedia online resource cr rdacarrier text file PDF rda Studies in computational intelligence 1860-949X v. 394 Studies in Computational Intelligence 394 Bibliographic Level Mode of Issuance: Monograph Includes bibliographical references and index From the content: Computational Intelligence for Privacy and Security: Introduction -- An Introduction to the Use of Neural Networks for Network Intrusion Detection -- Evolutionary Computation in Computer Security and Forensics: an Overview -- Application of Fuzzy Logic in Computer Security and Forensics -- A Topological Study of Chaotic Iterations Application to Hash Functions -- SOM-based Techniques towards Hierarchical Visualisation of Network Forensics Traffic Data The book is a collection of invited papers on Computational Intelligence for Privacy and Security. The majority of the chapters are extended versions of works presented at the special session on Computational Intelligence for Privacy and Security of the International Joint Conference on Neural Networks (IJCNN-2010) held July 2010 in Barcelona, Spain. The book is devoted to Computational Intelligence for Privacy and Security. It provides an overview of the most recent advances on the Computational Intelligence techniques being developed for Privacy and Security. The book will be of interest to researchers in industry and academics and to post-graduate students interested in the latest advances and developments in the field of Computational Intelligence for Privacy and Security English Engineering Artificial intelligence Computational Intelligence. Artificial Intelligence. Engineering Artificial intelligence Computational Intelligence Artificial Intelligence Elizondo, David A ed. lit Solanas, Agustí ed. lit Martínez Ballesté, Antoni ed. lit International Joint Conference on Neural Networks 2010 :. Barcelona, Spain) Studies in Computational Intelligence (CKB)1000000000238186 (DLC) (OCoLC) 1860-9503 3-642-25236-2 Studies in Computational Intelligence 394