Computational intelligence for privacy and security

This book collects papers on computational intelligence for privacy and security. The majority are extended versions of works presented at the special session on Computational Intelligence for Privacy and Security of IJCNN-2010

Bibliographic Details
Main Authors: Elizondo, David A. (Author), Marti´nez-Balleste´, Antoni (Author), Solanas, Agusti (Author)
Format: Book
Language:English
Published: Berlin, Germany : Springer , c2012
Series:Studies in computational intelligence v. 394
Subjects:

MARC

LEADER 00000cam a2200000 7i4500
001 0000079013
005 20180228.0
008 120627s2012 gw eng
020 |a 3642252362 (hardback : alk. paper) 
020 |a 3642252370 (ebook) 
020 |a 9783642252365 (hardback : alk. paper) 
020 |a 9783642252372 (ebook) 
050 0 0 |a Q342   |b .C66 2012 
090 0 0 |a Q342   |b .C66 2012 
245 0 0 |a Computational intelligence for privacy and security   |c David A. Elizondo, Agusti Solanas, and Antoni Martinez-Balleste (eds.) 
260 |a Berlin, Germany :   |b Springer ,   |c c2012 
300 |a viii, 258 p. :   |b ill. (some col.) ;   |c 24 cm. 
490 1 |a Studies in computational intelligence   |v v. 394 
504 |a Includes bibliographical references and index 
505 0 |a 1. Computational intelligence for privacy and security: introduction -- 2. An introduction to the use of neural networks for network intrusion detection -- 3. Evolutionary computation in computer security and forensics: an overview -- 4. Application of fuzzy logic in computer security and forensics -- 5. A topological study of chaotic iterations application to hash functions -- 6. SOM-based techniques towards hierarchical visualisation of network forensics traffic data -- 7. The application of evolutionary heuristics for solving soft security issues in MANETs -- 8. Mixing genetic algorithms and V-MDAV to protect microdata -- 9. Breaching privacy using data mining: removing noise from perturbed data -- 10. Feature selection of hand biometrical traits based on computation intelligence techniques -- 11. Building visual surveillance systems with neural networks -- 12. Advances in spam filtering techniques -- 13. Computational intelligent techniques and similarity measures for malware classification -- Intelligence techniques in computer security and forensics: at the boundaries of ethics and law 
520 |a This book collects papers on computational intelligence for privacy and security. The majority are extended versions of works presented at the special session on Computational Intelligence for Privacy and Security of IJCNN-2010 
650 0 |a Computational intelligence 
650 0 |a Computer security 
700 1 |a Elizondo, David A. ,   |e author 
700 1 |a Marti´nez-Balleste´, Antoni ,   |e author 
700 1 |a Solanas, Agusti ,   |e author 
999 |a 1000152395   |b Book   |c OPEN SHELF (30 DAYS)   |e Tembila Campus