Improving information security practices through computational intelligence
This book presents an overview of the latest and greatest research in the field, touching on such topics as cryptology, stream ciphers, and intrusion detection, and providing new insights to those working in computational intelligence, information security, and security engineering
Saved in:
| Other Authors: | , , |
|---|---|
| Format: | Book |
| Language: | English |
| Published: |
Hershey, PA
Information Science Reference, an imprint of IGI Global
[2016]
|
| Series: | A volume on Advances in information security, privacy, and ethics (AISPE) book series
|
| Subjects: | |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
MARC
| LEADER | 00000nam a2200000 c 4500 | ||
|---|---|---|---|
| 001 | 105577 | ||
| 003 | MY-KLNDU | ||
| 005 | 20241220042629.0 | ||
| 008 | 221104 20162016paua bi 001 0 eng d | ||
| 020 | |a 9781466694262 (hardcover) | ||
| 039 | 9 | |a 202211041147 |b VLOAD |c 201803051629 |d faezah |y 201709211603 |z hasniza | |
| 040 | |a UPNM |b eng |c UPNM |e rda | ||
| 090 | |a Q 342 |b .I477 2016 | ||
| 245 | 0 | 0 | |a Improving information security practices through computational intelligence |c Wasan Shaker Awad, Ahlia El Sayed M. El-Alfy, Yousif Al-Bastaki |
| 264 | 1 | |a Hershey, PA |b Information Science Reference, an imprint of IGI Global |c [2016] | |
| 264 | 4 | |c © 2016 | |
| 300 | |a xviii, 327 pages |b illustrations |c 29 cm | ||
| 336 | |a text |2 rdacontent | ||
| 337 | |a unmediated |2 rdamedia | ||
| 338 | |a volume |2 rdacarrier | ||
| 490 | 1 | |a A volume on Advances in information security, privacy, and ethics (AISPE) book series |x 1948-9730 | |
| 500 | |a "Premier reference source" -- Book cover | ||
| 505 | 0 | |a Introduction -- Computational intelligence paradigms : an overview / El-Sayed M. El-Alfy, King Fahd University of Petroleum and Minerals, KSA, Wasan Shaker Awad, Ahlia University, Bahrain -- Computational intelligence in cryptology / Wasan Shaker Awad, Ahlia University, Bahrain, El-Sayed M. El-Alfy, King Fahd University of Petroleum and Minerals, KSA -- Applications of evolutionary computation in cryptology -- Automated design of stream ciphers using gads / Wasan Shaker Awad, Ahlia University, Bahrain, Amal M. Al Hidd, University of Bahrain, Bahrain -- Chaotic-based and biologically-inspired cryptosystems for secure image communication and storage / El-Sayed M. El-Alfy, King Fahd University of Petroleum and Minerals, KSA -- Intelligent intrusion detection -- The conceptual and architectural design of an intelligent intrusion detection system / Mradul Dhakar, ITM University Gwalior, India, Akhilesh Tiwari, Madhav Institute of Technology and Science, India -- Agents for intrusion detection in manet : a survey and analysis / Leila Mechtri, Badji Mokhtar University, Annaba, Fatiha Djemili Tolba, Badji Mokhtar University, Annaba, Salim Ghanemi, Badji Mokhtar University, Annaba -- Authentication -- Applications of digital signature certificates for online information security / Mohammad Tariq Banday, University Of Kashmir, India -- Cryptomodules in wireless networks using biometric authentication : securing nodes in wireless networks / Martin Drahanský, Brno University Of Technology, Czech Republic, Petr Hanáek, Brno University Of Technology, Czech Republic, Franticek Zbolil, Brno University Of Technology, Czech Republic, Martin Henzl, Brno University Of Technology, Czech Republic, Franticek V. Zbolil, Brno University Of Technology, Czech Republic, Jaegeol Yim, Dongguk University at Gyeongju Gyeongbuk, South Korea, Kyubark Shim, Dongguk University at Gyeongju Gyeongbuk, South Korea -- Multimedia security -- Improving the security of digital images in hadamard transform domain using digital watermarking / V. Santhi, VIT University, India -- D.p. acharjya, vit university, india -- Computational aspects of lattice-based cryptography on graphical processing unit / Sedat Akleylek, Ondokuz Mayis University, Turkey, Zaliha Yuce Tok, Institute Of Applied Mathematics, Middle East Technical University, Ankara, Turky -- Compilation of references | |
| 520 | |a This book presents an overview of the latest and greatest research in the field, touching on such topics as cryptology, stream ciphers, and intrusion detection, and providing new insights to those working in computational intelligence, information security, and security engineering | ||
| 592 | |a IV-99735 |b 5/12/2017 |c RM 868.22 |h Yuha | ||
| 650 | 0 | |a Computational intelligence | |
| 650 | 0 | |a Computer security | |
| 650 | 0 | |a Data protection | |
| 700 | 1 | |a Awad, Wasan Shaker |d 1969- |e editor | |
| 700 | 1 | |a El-Alfy, El Sayed M. |d 1968- |e editor | |
| 700 | 1 | |a Al-Bastaki, Yousif A. Latif |e editor | |
| 999 | |a vtls000059280 |c 105577 |d 105577 | ||


