Computational intelligence for privacy and security
This book collects papers on computational intelligence for privacy and security. The majority are extended versions of works presented at the special session on Computational Intelligence for Privacy and Security of IJCNN-2010
| Main Authors: | Elizondo, David A. (Author), Marti´nez-Balleste´, Antoni (Author), Solanas, Agusti (Author) |
|---|---|
| Format: | Book |
| Language: | English |
| Published: |
Berlin, Germany :
Springer ,
c2012
|
| Series: | Studies in computational intelligence
v. 394 |
| Subjects: |
Similar Items
Computational intelligence paradigms theory and applications using MATLAB
by: Sumathi, S. 1968-, et al.
Published: (2010)
by: Sumathi, S. 1968-, et al.
Published: (2010)
Computational intelligence : an introduction
by: Engelbrecht, Andries P.
Published: (2007)
by: Engelbrecht, Andries P.
Published: (2007)
Computational intelligence techniques for new product design
by: Chan, Kit Yan, et al.
Published: (2012)
by: Chan, Kit Yan, et al.
Published: (2012)
Mobile technologies and applications for the internet of things proceedings of the 12th IMCL conference
Published: (2019)
Published: (2019)
Computer forensics and privacy
by: Caloyannnides, Michael A.
Published: (2001)
by: Caloyannnides, Michael A.
Published: (2001)
Information security and privacy 12th Australasian conference, ACISP 2007, Townsville, Australia, July 2-4, 2007 proceedings
by: Dawson, Ed (Edward), et al.
Published: (2007)
by: Dawson, Ed (Edward), et al.
Published: (2007)
Advanced intelligent paradigms in computer games
by: Baba, N. (Norio) 1946-, et al.
Published: (2007)
by: Baba, N. (Norio) 1946-, et al.
Published: (2007)
Handbook of swarm intelligence concepts, principles and applications
by: Lim Meng-Hiot Lim, et al.
Published: (2011)
by: Lim Meng-Hiot Lim, et al.
Published: (2011)
Computer security
by: Gollmann, Dieter
by: Gollmann, Dieter
Digital privacy theory, technologies, and practices
by: Acquisti, Alessandro
Published: (2008)
by: Acquisti, Alessandro
Published: (2008)
Intelligence theory key questions and debates
by: Gill, Peter 1947-, et al.
Published: (2009)
by: Gill, Peter 1947-, et al.
Published: (2009)
Cyber crime, security and digital intelligence
by: Johnson, Mark 1959-
Published: (2013)
by: Johnson, Mark 1959-
Published: (2013)
Computational intelligence in archaeology
by: Barcelâo, Juan A.
Published: (2009)
by: Barcelâo, Juan A.
Published: (2009)
Computer security fundamentals
by: Easttom, Chuck
Published: (2012)
by: Easttom, Chuck
Published: (2012)
Computer security fundamentals
by: Easttom, Chuck
Published: (2006)
by: Easttom, Chuck
Published: (2006)
Computer security fundamentals
by: Easttom, Chuck
Published: (2016)
by: Easttom, Chuck
Published: (2016)
Mobile and wireless network security and privacy
by: Makki, S. Kami
Published: (2007)
by: Makki, S. Kami
Published: (2007)
Introduction to computer security
by: Bishop, Matt
Published: (2005)
by: Bishop, Matt
Published: (2005)
Computational intelligence in design and manufacturing
by: Kusiak, Andrew
Published: (2000)
by: Kusiak, Andrew
Published: (2000)
Principles of computer security security+TM and beyond
by: Conklin, Wm. Arthur (William Arthur)
Published: (2004)
by: Conklin, Wm. Arthur (William Arthur)
Published: (2004)
Intelligent systems : principles, paradigms, and pragmatics
by: Schalkoff, Robert J.
Published: (2011)
by: Schalkoff, Robert J.
Published: (2011)
Security and resilience in intelligent data-centric systems and communication networks
Computer and cyber security principles, algorithm, applications, and perspectives
Computer security
by: Carroll, John M. (John Millar) 1950-
Published: (1987)
by: Carroll, John M. (John Millar) 1950-
Published: (1987)
CSA guide to cloud computing implementing cloud privacy and security
by: Samani, Raj, et al.
Published: (2015)
by: Samani, Raj, et al.
Published: (2015)
Information security intelligence cryptographic principles and applications
by: Calabrese, Thomas
Published: (2004)
by: Calabrese, Thomas
Published: (2004)
What computers can'tdo : the limits of artificial intelligence
by: Dreyfus, Hubert L.
Published: (1979)
by: Dreyfus, Hubert L.
Published: (1979)
Trust and security in collaborative computing
by: Zou, Xukai 1963-, et al.
Published: (2008)
by: Zou, Xukai 1963-, et al.
Published: (2008)
Managing an information security and privacy awareness and training program
by: Herold, Rebecca
Published: (2011)
by: Herold, Rebecca
Published: (2011)
Information privacy concepts & applications
by: Courtney, Kylan
Published: (2014)
by: Courtney, Kylan
Published: (2014)
Complete guide to security and privacy metrics measuring regulatory compliance, operational resilience, and ROI
by: Herrmann, Debra S.
Published: (2007)
by: Herrmann, Debra S.
Published: (2007)
Privacy-preserving data mining models and algorithms
by: Aggarwal, Charu C., et al.
Published: (2008)
by: Aggarwal, Charu C., et al.
Published: (2008)
Artificial Intelligence a guide to intelligent systems
by: Negnevitsky, Michael
Published: (2011)
by: Negnevitsky, Michael
Published: (2011)
Security 2020 reduce security risks this decade
by: Howard, Doug, et al.
Published: (2011)
by: Howard, Doug, et al.
Published: (2011)
Artificial intelligence an engineering approach
by: Schalkoff, Robert J.
Published: (1990)
by: Schalkoff, Robert J.
Published: (1990)
Intelligent video event analysis and understanding
by: Zhang, Jianguo
Published: (2011)
by: Zhang, Jianguo
Published: (2011)
Privacy, intrusion detection, and response : technologies for protecting networks
by: Kabiri, Peyman , 1968-
Published: (2012)
by: Kabiri, Peyman , 1968-
Published: (2012)
Cloud security : a general guide to secured computing
by: Masnida Hussin, et al.
Published: (2021)
by: Masnida Hussin, et al.
Published: (2021)
Information privacy engineering and privacy by design understanding privacy threats, technology, and regulations based on standards and best practices
by: Stallings, William
Published: (2020)
by: Stallings, William
Published: (2020)
Collaborative computer security and trust management
by: Seigneur, Jean-Marc, et al.
Published: (2010)
by: Seigneur, Jean-Marc, et al.
Published: (2010)
Similar Items
-
Computational intelligence paradigms theory and applications using MATLAB
by: Sumathi, S. 1968-, et al.
Published: (2010) -
Computational intelligence : an introduction
by: Engelbrecht, Andries P.
Published: (2007) -
Computational intelligence techniques for new product design
by: Chan, Kit Yan, et al.
Published: (2012) -
Mobile technologies and applications for the internet of things proceedings of the 12th IMCL conference
Published: (2019) -
Computer forensics and privacy
by: Caloyannnides, Michael A.
Published: (2001)