Computational Intelligence for Privacy and Security by David A. ElizondoComputational Intelligence for Privacy and Security by David A. Elizondo

Computational Intelligence for Privacy and Security

byDavid A. ElizondoEditorAgusti Solanas, Antoni Martinez-Balleste

Paperback | February 23, 2014

Pricing and Purchase Info

$171.59 online 
$206.95 list price save 17%
Earn 858 plum® points

Prices and offers may vary in store

Quantity:

In stock online

Ships free on orders over $25

Not available in stores

about

The book is a collection of invited papers on Computational Intelligence for Privacy and Security. The majority of the chapters are extended versions of works presented at the special session on Computational Intelligence for Privacy and Security of the International Joint Conference on Neural Networks (IJCNN-2010) held July 2010 in Barcelona, Spain.

The book is devoted to Computational Intelligence for Privacy and Security. It provides an overview of the most recent advances on the Computational Intelligence techniques being developed for Privacy and Security. The book will be of interest to researchers in industry and academics and to post-graduate students interested in the latest advances and developments in the field of Computational Intelligence for Privacy and Security.

Title:Computational Intelligence for Privacy and SecurityFormat:PaperbackDimensions:260 pagesPublished:February 23, 2014Publisher:Springer-Verlag/Sci-Tech/TradeLanguage:English

The following ISBNs are associated with this title:

ISBN - 10:3642441440

ISBN - 13:9783642441448

Look for similar items by category:

Reviews

Table of Contents

From the content: Computational Intelligence for Privacy and Security: Introduction.- An Introduction to the Use of Neural Networks for Network Intrusion Detection.- Evolutionary Computation in Computer Security and Forensics: an Overview.- Application of Fuzzy Logic in Computer Security and Forensics.- A Topological Study of Chaotic Iterations Application to Hash Functions.- SOM-based Techniques towards Hierarchical Visualisation of Network Forensics Traffic Data.