Computational intelligence for privacy and security:
Gespeichert in:
Weitere Verfasser: | |
---|---|
Format: | Buch |
Sprache: | English |
Veröffentlicht: |
Berlin [u.a.]
Springer
2012
|
Schriftenreihe: | Studies in computational intelligence
394 |
Schlagworte: | |
Online-Zugang: | Inhaltstext Inhaltsverzeichnis |
Beschreibung: | Literaturangaben |
Beschreibung: | VIII, 258 S. Ill., graph. Darst. |
ISBN: | 9783642252365 3642252362 |
Internformat
MARC
LEADER | 00000nam a2200000 cb4500 | ||
---|---|---|---|
001 | BV039973679 | ||
003 | DE-604 | ||
007 | t | ||
008 | 120321s2012 ad|| |||| 00||| eng d | ||
016 | 7 | |a 1016104391 |2 DE-101 | |
020 | |a 9783642252365 |9 978-3-642-25236-5 | ||
020 | |a 3642252362 |9 3-642-25236-2 | ||
035 | |a (OCoLC)778453083 | ||
035 | |a (DE-599)DNB1016104391 | ||
040 | |a DE-604 |b ger |e rakddb | ||
041 | 0 | |a eng | |
049 | |a DE-11 | ||
082 | 0 | |a 005.8 |2 22/ger | |
082 | 0 | |a 006.3 |2 22/ger | |
084 | |a ST 300 |0 (DE-625)143650: |2 rvk | ||
084 | |a 004 |2 sdnb | ||
245 | 1 | 0 | |a Computational intelligence for privacy and security |c David A. Elizondo ... (ed.) |
264 | 1 | |a Berlin [u.a.] |b Springer |c 2012 | |
300 | |a VIII, 258 S. |b Ill., graph. Darst. | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
490 | 1 | |a Studies in computational intelligence |v 394 | |
500 | |a Literaturangaben | ||
650 | 0 | 7 | |a Soft Computing |0 (DE-588)4455833-8 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Datensicherung |0 (DE-588)4011144-1 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Privatsphäre |0 (DE-588)4123980-5 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
655 | 7 | |0 (DE-588)1071861417 |a Konferenzschrift |y 2010 |z Barcelona |2 gnd-content | |
689 | 0 | 0 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 0 | 1 | |a Datensicherung |0 (DE-588)4011144-1 |D s |
689 | 0 | 2 | |a Privatsphäre |0 (DE-588)4123980-5 |D s |
689 | 0 | 3 | |a Soft Computing |0 (DE-588)4455833-8 |D s |
689 | 0 | |5 DE-604 | |
700 | 1 | |a Elizondo, David A. |4 edt | |
776 | 0 | 8 | |i Erscheint auch als |n Online-Ausgabe |t Computational Intelligence for Privacy and Security |
830 | 0 | |a Studies in computational intelligence |v 394 |w (DE-604)BV020822171 |9 394 | |
856 | 4 | 2 | |m X:MVB |q text/html |u http://deposit.dnb.de/cgi-bin/dokserv?id=3896859&prov=M&dok_var=1&dok_ext=htm |3 Inhaltstext |
856 | 4 | 2 | |m DNB Datenaustausch |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=024831167&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
943 | 1 | |a oai:aleph.bib-bvb.de:BVB01-024831167 |
Datensatz im Suchindex
_version_ | 1805146345093201920 |
---|---|
adam_text |
IMAGE 1
CONTENTS
COMPUTATIONAL INTELLIGENCE FOR PRIVACY AND SECURITY: INTRODUCTION 1
DAVID A. ELIZONDO, AGUSTI SOLANAS, ANTONI MARTINEZ-BALLESTE
AN INTRODUCTION TO THE USE OF NEURAL NETWORKS FOR NETWORK INTRUSION
DETECTION 5
CHRISTIAN BITTER, JOHN NORTH, DAVID A. ELIZONDO, TIM WATSON
EVOLUTIONARY COMPUTATION IN COMPUTER SECURITY AND FORENSICS: AN OVERVIEW
25
SULAIMAN AL AMRO, DAVID A. ELIZONDO, AGUSTI SOLANAS, ANTONI
MARTINEZ-BALLESTE
APPLICATION OF FUZZY LOGIC IN COMPUTER SECURITY AND FORENSICS 35 S.
ALAMRO, E CHICLANA, D.A. ELIZONDO
A TOPOLOGICAL STUDY OF CHAOTIC ITERATIONS APPLICATION TO HASH FUNCTIONS
51
CHRISTOPHE GUYEUX, JACQUES M. BAHI
SOM-BASED TECHNIQUES TOWARDS HIERARCHICAL VISUALISATION OF NETWORK
FORENSICS TRAFFIC DATA 75
E.J. PALOMO, D. ELIZONDO, E. DOMINGUEZ, R.M. LUQUE, TIM WATSON
THE APPLICATION OF EVOLUTIONARY HEURISTICS FOR SOLVING SOFT SECURITY
ISSUES IN MANETS 97
MARVIN SEREDYNSKI, PASCAL BOUVRY
MIXING GENETIC ALGORITHMS AND V-MDAV TO PROTECT MICRODATA 115 AGUSTI
SOLANAS, URSULA GONZALEZ-NICOLAS, ANTONI MARTINEZ-BALLESTE
BREACHING PRIVACY USING DATA MINING: REMOVING NOISE FROM PERTURBED DATA
135
MICHAL SRAMKA
BIBLIOGRAFISCHE INFORMATIONEN HTTP://D-NB.INFO/1016104391
DIGITALISIERT DURCH
IMAGE 2
VIII CONTENTS
FEATURE SELECTION OF HAND BIOMETRICAL TRAITS BASED ON COMPUTATIONAL
INTELLIGENCE TECHNIQUES 159
R.M. LUQUE, D. ELIZONDO, E. LOPEZ-RUBIO, E.J. PALOMO
BUILDING VISUAL SURVEILLANCE SYSTEMS WITH NEURAL NETWORKS 181
J. GARCIA-RODRIGUEZ, A. ANGELOPOULOU, EJ. MORA-GIMENO, A. PSARROU
ADVANCES IN SPAM FILTERING TECHNIQUES 199
TIAGO A. ALMEIDA, AKEBO YAMAKAMI
COMPUTATIONAL INTELLIGENT TECHNIQUES AND SIMILARITY MEASURES FOR MALWARE
CLASSIFICATION 215
M.K. SHANKARPANI, K. KANCHERLA, R. MOVVA, S. MUKKAMALA
INTELLIGENCE TECHNIQUES IN COMPUTER SECURITY AND FORENSICS: AT THE
BOUNDARIES OF ETHICS AND LAW 237
BERND STAHL, MOIRA CARROLL-MAYER, DAVID ELIZONDO, KUTOMA WAKUNUMA,
YMGQIN ZHENG
AUTHOR INDEX 259 |
any_adam_object | 1 |
author2 | Elizondo, David A. |
author2_role | edt |
author2_variant | d a e da dae |
author_facet | Elizondo, David A. |
building | Verbundindex |
bvnumber | BV039973679 |
classification_rvk | ST 300 |
ctrlnum | (OCoLC)778453083 (DE-599)DNB1016104391 |
dewey-full | 005.8 006.3 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security 006 - Special computer methods |
dewey-raw | 005.8 006.3 |
dewey-search | 005.8 006.3 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>00000nam a2200000 cb4500</leader><controlfield tag="001">BV039973679</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">120321s2012 ad|| |||| 00||| eng d</controlfield><datafield tag="016" ind1="7" ind2=" "><subfield code="a">1016104391</subfield><subfield code="2">DE-101</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783642252365</subfield><subfield code="9">978-3-642-25236-5</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">3642252362</subfield><subfield code="9">3-642-25236-2</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)778453083</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)DNB1016104391</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rakddb</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-11</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">22/ger</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">006.3</subfield><subfield code="2">22/ger</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 300</subfield><subfield code="0">(DE-625)143650:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">004</subfield><subfield code="2">sdnb</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Computational intelligence for privacy and security</subfield><subfield code="c">David A. Elizondo ... (ed.)</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Berlin [u.a.]</subfield><subfield code="b">Springer</subfield><subfield code="c">2012</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">VIII, 258 S.</subfield><subfield code="b">Ill., graph. Darst.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">Studies in computational intelligence</subfield><subfield code="v">394</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Literaturangaben</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Soft Computing</subfield><subfield code="0">(DE-588)4455833-8</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Privatsphäre</subfield><subfield code="0">(DE-588)4123980-5</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)1071861417</subfield><subfield code="a">Konferenzschrift</subfield><subfield code="y">2010</subfield><subfield code="z">Barcelona</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Privatsphäre</subfield><subfield code="0">(DE-588)4123980-5</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="3"><subfield code="a">Soft Computing</subfield><subfield code="0">(DE-588)4455833-8</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Elizondo, David A.</subfield><subfield code="4">edt</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Online-Ausgabe</subfield><subfield code="t">Computational Intelligence for Privacy and Security</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">Studies in computational intelligence</subfield><subfield code="v">394</subfield><subfield code="w">(DE-604)BV020822171</subfield><subfield code="9">394</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">X:MVB</subfield><subfield code="q">text/html</subfield><subfield code="u">http://deposit.dnb.de/cgi-bin/dokserv?id=3896859&prov=M&dok_var=1&dok_ext=htm</subfield><subfield code="3">Inhaltstext</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">DNB Datenaustausch</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=024831167&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-024831167</subfield></datafield></record></collection> |
genre | (DE-588)1071861417 Konferenzschrift 2010 Barcelona gnd-content |
genre_facet | Konferenzschrift 2010 Barcelona |
id | DE-604.BV039973679 |
illustrated | Illustrated |
indexdate | 2024-07-21T00:28:26Z |
institution | BVB |
isbn | 9783642252365 3642252362 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-024831167 |
oclc_num | 778453083 |
open_access_boolean | |
owner | DE-11 |
owner_facet | DE-11 |
physical | VIII, 258 S. Ill., graph. Darst. |
publishDate | 2012 |
publishDateSearch | 2012 |
publishDateSort | 2012 |
publisher | Springer |
record_format | marc |
series | Studies in computational intelligence |
series2 | Studies in computational intelligence |
spelling | Computational intelligence for privacy and security David A. Elizondo ... (ed.) Berlin [u.a.] Springer 2012 VIII, 258 S. Ill., graph. Darst. txt rdacontent n rdamedia nc rdacarrier Studies in computational intelligence 394 Literaturangaben Soft Computing (DE-588)4455833-8 gnd rswk-swf Datensicherung (DE-588)4011144-1 gnd rswk-swf Privatsphäre (DE-588)4123980-5 gnd rswk-swf Computersicherheit (DE-588)4274324-2 gnd rswk-swf (DE-588)1071861417 Konferenzschrift 2010 Barcelona gnd-content Computersicherheit (DE-588)4274324-2 s Datensicherung (DE-588)4011144-1 s Privatsphäre (DE-588)4123980-5 s Soft Computing (DE-588)4455833-8 s DE-604 Elizondo, David A. edt Erscheint auch als Online-Ausgabe Computational Intelligence for Privacy and Security Studies in computational intelligence 394 (DE-604)BV020822171 394 X:MVB text/html http://deposit.dnb.de/cgi-bin/dokserv?id=3896859&prov=M&dok_var=1&dok_ext=htm Inhaltstext DNB Datenaustausch application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=024831167&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis |
spellingShingle | Computational intelligence for privacy and security Studies in computational intelligence Soft Computing (DE-588)4455833-8 gnd Datensicherung (DE-588)4011144-1 gnd Privatsphäre (DE-588)4123980-5 gnd Computersicherheit (DE-588)4274324-2 gnd |
subject_GND | (DE-588)4455833-8 (DE-588)4011144-1 (DE-588)4123980-5 (DE-588)4274324-2 (DE-588)1071861417 |
title | Computational intelligence for privacy and security |
title_auth | Computational intelligence for privacy and security |
title_exact_search | Computational intelligence for privacy and security |
title_full | Computational intelligence for privacy and security David A. Elizondo ... (ed.) |
title_fullStr | Computational intelligence for privacy and security David A. Elizondo ... (ed.) |
title_full_unstemmed | Computational intelligence for privacy and security David A. Elizondo ... (ed.) |
title_short | Computational intelligence for privacy and security |
title_sort | computational intelligence for privacy and security |
topic | Soft Computing (DE-588)4455833-8 gnd Datensicherung (DE-588)4011144-1 gnd Privatsphäre (DE-588)4123980-5 gnd Computersicherheit (DE-588)4274324-2 gnd |
topic_facet | Soft Computing Datensicherung Privatsphäre Computersicherheit Konferenzschrift 2010 Barcelona |
url | http://deposit.dnb.de/cgi-bin/dokserv?id=3896859&prov=M&dok_var=1&dok_ext=htm http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=024831167&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
volume_link | (DE-604)BV020822171 |
work_keys_str_mv | AT elizondodavida computationalintelligenceforprivacyandsecurity |