Improving information security practices through computational intelligence

This book presents an overview of the latest and greatest research in the field, touching on such topics as cryptology, stream ciphers, and intrusion detection, and providing new insights to those working in computational intelligence, information security, and security engineering

Saved in:
Bibliographic Details
Other Authors: Awad, Wasan Shaker 1969- (Editor), El-Alfy, El Sayed M. 1968- (Editor), Al-Bastaki, Yousif A. Latif (Editor)
Format: Book
Language:English
Published: Hershey, PA Information Science Reference, an imprint of IGI Global [2016]
Series:A volume on Advances in information security, privacy, and ethics (AISPE) book series
Subjects:
Tags: Add Tag
No Tags, Be the first to tag this record!

MARC

LEADER 00000nam a2200000 c 4500
001 105577
003 MY-KLNDU
005 20241220042629.0
008 221104 20162016paua bi 001 0 eng d
020 |a 9781466694262 (hardcover) 
039 9 |a 202211041147  |b VLOAD  |c 201803051629  |d faezah  |y 201709211603  |z hasniza 
040 |a UPNM  |b eng  |c UPNM  |e rda 
090 |a Q 342  |b .I477 2016 
245 0 0 |a Improving information security practices through computational intelligence  |c Wasan Shaker Awad, Ahlia El Sayed M. El-Alfy, Yousif Al-Bastaki 
264 1 |a Hershey, PA  |b Information Science Reference, an imprint of IGI Global  |c [2016] 
264 4 |c © 2016 
300 |a xviii, 327 pages  |b illustrations  |c 29 cm 
336 |a text  |2 rdacontent 
337 |a unmediated  |2 rdamedia 
338 |a volume  |2 rdacarrier 
490 1 |a A volume on Advances in information security, privacy, and ethics (AISPE) book series  |x 1948-9730 
500 |a "Premier reference source" -- Book cover 
505 0 |a Introduction -- Computational intelligence paradigms : an overview / El-Sayed M. El-Alfy, King Fahd University of Petroleum and Minerals, KSA, Wasan Shaker Awad, Ahlia University, Bahrain -- Computational intelligence in cryptology / Wasan Shaker Awad, Ahlia University, Bahrain, El-Sayed M. El-Alfy, King Fahd University of Petroleum and Minerals, KSA -- Applications of evolutionary computation in cryptology -- Automated design of stream ciphers using gads / Wasan Shaker Awad, Ahlia University, Bahrain, Amal M. Al Hidd, University of Bahrain, Bahrain -- Chaotic-based and biologically-inspired cryptosystems for secure image communication and storage / El-Sayed M. El-Alfy, King Fahd University of Petroleum and Minerals, KSA -- Intelligent intrusion detection -- The conceptual and architectural design of an intelligent intrusion detection system / Mradul Dhakar, ITM University Gwalior, India, Akhilesh Tiwari, Madhav Institute of Technology and Science, India -- Agents for intrusion detection in manet : a survey and analysis / Leila Mechtri, Badji Mokhtar University, Annaba, Fatiha Djemili Tolba, Badji Mokhtar University, Annaba, Salim Ghanemi, Badji Mokhtar University, Annaba -- Authentication -- Applications of digital signature certificates for online information security / Mohammad Tariq Banday, University Of Kashmir, India -- Cryptomodules in wireless networks using biometric authentication : securing nodes in wireless networks / Martin Drahanský, Brno University Of Technology, Czech Republic, Petr Hanáek, Brno University Of Technology, Czech Republic, Franticek Zbolil, Brno University Of Technology, Czech Republic, Martin Henzl, Brno University Of Technology, Czech Republic, Franticek V. Zbolil, Brno University Of Technology, Czech Republic, Jaegeol Yim, Dongguk University at Gyeongju Gyeongbuk, South Korea, Kyubark Shim, Dongguk University at Gyeongju Gyeongbuk, South Korea -- Multimedia security -- Improving the security of digital images in hadamard transform domain using digital watermarking / V. Santhi, VIT University, India -- D.p. acharjya, vit university, india -- Computational aspects of lattice-based cryptography on graphical processing unit / Sedat Akleylek, Ondokuz Mayis University, Turkey, Zaliha Yuce Tok, Institute Of Applied Mathematics, Middle East Technical University, Ankara, Turky -- Compilation of references 
520 |a This book presents an overview of the latest and greatest research in the field, touching on such topics as cryptology, stream ciphers, and intrusion detection, and providing new insights to those working in computational intelligence, information security, and security engineering 
592 |a IV-99735  |b 5/12/2017  |c RM 868.22  |h Yuha 
650 0 |a Computational intelligence 
650 0 |a Computer security 
650 0 |a Data protection 
700 1 |a Awad, Wasan Shaker  |d 1969-  |e editor 
700 1 |a El-Alfy, El Sayed M.  |d 1968-  |e editor 
700 1 |a Al-Bastaki, Yousif A. Latif  |e editor 
999 |a vtls000059280  |c 105577  |d 105577