000 03544nam a22005415i 4500
001 978-3-540-71078-3
003 DE-He213
005 20220801140106.0
007 cr nn 008mamaa
008 100301s2007 gw | s |||| 0|eng d
020 _a9783540710783
_9978-3-540-71078-3
024 7 _a10.1007/978-3-540-71078-3
_2doi
050 4 _aTA329-348
050 4 _aTA345-345.5
072 7 _aTBJ
_2bicssc
072 7 _aTEC009000
_2bisacsh
072 7 _aTBJ
_2thema
082 0 4 _a620
_223
245 1 0 _aComputational Intelligence in Information Assurance and Security
_h[electronic resource] /
_cedited by Ajith Abraham.
250 _a1st ed. 2007.
264 1 _aBerlin, Heidelberg :
_bSpringer Berlin Heidelberg :
_bImprint: Springer,
_c2007.
300 _aXX, 255 p.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
490 1 _aStudies in Computational Intelligence,
_x1860-9503 ;
_v57
505 0 _aCryptography and Cryptanalysis Through Computational Intelligence -- Multimedia Content Protection Based on Chaotic Neural Networks -- Evolutionary Regular Substitution Boxes -- Industrial Applications Using Wavelet Packets for Gross Error Detection -- Immune-inspired Algorithm for Anomaly Detection -- How to Efficiently Process Uncertainty within a Cyberinfrastructure without Sacrificing Privacy and Confidentiality -- Fingerprint Recognition Using a Hierarchical Approach -- Smart Card Security -- Governance of Information Security: New Paradigm of Security Management.
520 _aThe global economic infrastructure is becoming increasingly dependent upon information technology, with computer and communication technology being essential and vital components of Government facilities, power plant systems, medical infrastructures, financial centers and military installations to name a few. Finding effective ways to protect information systems, networks and sensitive data within the critical information infrastructure is challenging even with the most advanced technology and trained professionals. This volume provides the academic and industrial community with a medium for presenting original research and applications related to information assurance and security using computational intelligence techniques. The included chapters communicate current research on information assurance and security regarding both the theoretical and methodological aspects, as well as various applications in solving real world information security problems using computational intelligence.
650 0 _aEngineering mathematics.
_93254
650 0 _aEngineering—Data processing.
_931556
650 0 _aArtificial intelligence.
_93407
650 1 4 _aMathematical and Computational Engineering Applications.
_931559
650 2 4 _aArtificial Intelligence.
_93407
700 1 _aAbraham, Ajith.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
_932008
710 2 _aSpringerLink (Online service)
_932009
773 0 _tSpringer Nature eBook
776 0 8 _iPrinted edition:
_z9783642090165
776 0 8 _iPrinted edition:
_z9783540835790
776 0 8 _iPrinted edition:
_z9783540710776
830 0 _aStudies in Computational Intelligence,
_x1860-9503 ;
_v57
_932010
856 4 0 _uhttps://doi.org/10.1007/978-3-540-71078-3
912 _aZDB-2-ENG
912 _aZDB-2-SXE
942 _cEBK
999 _c75173
_d75173