Implementing computational intelligence techniques for security systems design:
"This book explores the applications of computational intelligence and other advanced techniques in information security"--
Gespeichert in:
Weitere Verfasser: | , |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Hershey, Pennsylvania (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA) :
IGI Global,
[2020]
|
Schriftenreihe: | Advances in computational intelligence and robotics (ACIR) book series.
|
Schlagworte: | |
Online-Zugang: | Volltext |
Zusammenfassung: | "This book explores the applications of computational intelligence and other advanced techniques in information security"-- |
Beschreibung: | 23 PDFs (332 pages) Also available in print. |
Format: | Mode of access: World Wide Web. |
Bibliographie: | Includes bibliographical references and index. |
ISBN: | 1799824209 9781799824206 |
Zugangseinschränkungen: | Restricted to subscribers or individual electronic text purchasers. |
Internformat
MARC
LEADER | 00000nam a2200000 i 4500 | ||
---|---|---|---|
001 | ZDB-98-IGB-00236581 | ||
003 | IGIG | ||
005 | 20200318125744.0 | ||
006 | m eo d | ||
007 | cr bn |||m|||a | ||
008 | 200319s2020 pau fob 001 0 eng d | ||
010 | |z 2019039270 | ||
020 | |a 1799824209 |q electronic book | ||
020 | |a 9781799824206 |q electronic book | ||
020 | |z 9781799824183 |q h/c | ||
020 | |z 9781799824190 |q s/c | ||
024 | 7 | |a 10.4018/978-1-7998-2418-3 |2 doi | |
035 | |a (CaBNVSL)slc00000361 | ||
035 | |a (OCoLC)1145391670 | ||
040 | |a CaBNVSL |b eng |e rda |c CaBNVSL |d CaBNVSL | ||
050 | 4 | |a TK5105.59 |b .I437 2020e | |
082 | 7 | |a 006.3 |2 23 | |
245 | 0 | 0 | |a Implementing computational intelligence techniques for security systems design |c [edited by] Yousif Abdullatif Albastaki, Wasan Awad. |
264 | 1 | |a Hershey, Pennsylvania (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA) : |b IGI Global, |c [2020] | |
300 | |a 23 PDFs (332 pages) | ||
336 | |a text |2 rdacontent | ||
337 | |a electronic |2 isbdmedia | ||
338 | |a online resource |2 rdacarrier | ||
490 | 1 | |a Advances in computational intelligence and robotics (ACIR) book series | |
504 | |a Includes bibliographical references and index. | ||
505 | 0 | |a Chapter 1. Applications of computational intelligence in computing security: a review -- Chapter 2. A hybrid connectionist/ substitution approach for data encryption -- Chapter 3. Improving spam email filtering systems using data mining techniques -- Chapter 4. Odor sensing techniques: a biometric person authentication approach -- Chapter 5. Agent-based intrusion detection in wireless networks -- Chapter 6. Using an artificial neural network to improve email security -- Chapter 7. A review of machine learning techniques for anomaly detection in static graphs -- Chapter 8. Composite discrete logarithm problem and a reconstituted elgamal cryptosystem based on the problem: new elgamal cryptosystems with some special sequences and composite elgamal cryptosystem -- Chapter 9. Characteristic analysis of side channel attacks and various power analysis attack techniques -- Chapter 10. Bahrain government information security framework: cybertrust program -- Chapter 11. Critical cybersecurity threats: frontline issues faced by Bahraini organizations -- Chapter 12. Building new relationships: social media trustworthiness in gulf cooperation countries -- Chapter 13. Cybersecurity: cybercrime prevention in higher learning institutions -- Chapter 14. Cyber security, IT governance, and performance: a review of the current literature. | |
506 | |a Restricted to subscribers or individual electronic text purchasers. | ||
520 | 3 | |a "This book explores the applications of computational intelligence and other advanced techniques in information security"-- |c Provided by publisher. | |
530 | |a Also available in print. | ||
538 | |a Mode of access: World Wide Web. | ||
588 | |a Description based on title screen (IGI Global, viewed 03/19/2020). | ||
650 | 0 | |a Computational intelligence. | |
650 | 0 | |a Computer networks |x Security measures. | |
650 | 0 | |a Data protection. | |
650 | 0 | |a Security systems |x Design and construction. | |
650 | 7 | |a Computational intelligence. |2 fast | |
650 | 7 | |a Computer networks |x Security measures. |2 fast | |
650 | 7 | |a Data protection. |2 fast | |
700 | 1 | |a Albastaki, Yousif |d 1962- |e editor. | |
700 | 1 | |a Awad, Wasan |d 1969- |e editor. | |
710 | 2 | |a IGI Global, |e publisher. | |
776 | 0 | |c (Original) |w (DLC)2019039270 | |
776 | 0 | 8 | |i Print version: |z 1799824187 |z 9781799824183 |w (DLC) 2019039270 |
830 | 0 | |a Advances in computational intelligence and robotics (ACIR) book series. | |
856 | 4 | 0 | |l FWS01 |p ZDB-98-IGB |q FWS_PDA_IGB |u http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-7998-2418-3 |3 Volltext |
912 | |a ZDB-98-IGB | ||
049 | |a DE-863 |
Datensatz im Suchindex
DE-BY-FWS_katkey | ZDB-98-IGB-00236581 |
---|---|
_version_ | 1816797083152154624 |
adam_text | |
any_adam_object | |
author2 | Albastaki, Yousif 1962- Awad, Wasan 1969- |
author2_role | edt edt |
author2_variant | y a ya w a wa |
author_facet | Albastaki, Yousif 1962- Awad, Wasan 1969- |
building | Verbundindex |
bvnumber | localFWS |
callnumber-first | T - Technology |
callnumber-label | TK5105 |
callnumber-raw | TK5105.59 .I437 2020e |
callnumber-search | TK5105.59 .I437 2020e |
callnumber-sort | TK 45105.59 I437 42020E |
callnumber-subject | TK - Electrical and Nuclear Engineering |
collection | ZDB-98-IGB |
contents | Chapter 1. Applications of computational intelligence in computing security: a review -- Chapter 2. A hybrid connectionist/ substitution approach for data encryption -- Chapter 3. Improving spam email filtering systems using data mining techniques -- Chapter 4. Odor sensing techniques: a biometric person authentication approach -- Chapter 5. Agent-based intrusion detection in wireless networks -- Chapter 6. Using an artificial neural network to improve email security -- Chapter 7. A review of machine learning techniques for anomaly detection in static graphs -- Chapter 8. Composite discrete logarithm problem and a reconstituted elgamal cryptosystem based on the problem: new elgamal cryptosystems with some special sequences and composite elgamal cryptosystem -- Chapter 9. Characteristic analysis of side channel attacks and various power analysis attack techniques -- Chapter 10. Bahrain government information security framework: cybertrust program -- Chapter 11. Critical cybersecurity threats: frontline issues faced by Bahraini organizations -- Chapter 12. Building new relationships: social media trustworthiness in gulf cooperation countries -- Chapter 13. Cybersecurity: cybercrime prevention in higher learning institutions -- Chapter 14. Cyber security, IT governance, and performance: a review of the current literature. |
ctrlnum | (CaBNVSL)slc00000361 (OCoLC)1145391670 |
dewey-full | 006.3 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 006 - Special computer methods |
dewey-raw | 006.3 |
dewey-search | 006.3 |
dewey-sort | 16.3 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03762nam a2200565 i 4500</leader><controlfield tag="001">ZDB-98-IGB-00236581</controlfield><controlfield tag="003">IGIG</controlfield><controlfield tag="005">20200318125744.0</controlfield><controlfield tag="006">m eo d </controlfield><controlfield tag="007">cr bn |||m|||a</controlfield><controlfield tag="008">200319s2020 pau fob 001 0 eng d</controlfield><datafield tag="010" ind1=" " ind2=" "><subfield code="z"> 2019039270</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1799824209</subfield><subfield code="q">electronic book</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781799824206</subfield><subfield code="q">electronic book</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">9781799824183</subfield><subfield code="q">h/c</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">9781799824190</subfield><subfield code="q">s/c</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.4018/978-1-7998-2418-3</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(CaBNVSL)slc00000361</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1145391670</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">CaBNVSL</subfield><subfield code="b">eng</subfield><subfield code="e">rda</subfield><subfield code="c">CaBNVSL</subfield><subfield code="d">CaBNVSL</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">TK5105.59</subfield><subfield code="b">.I437 2020e</subfield></datafield><datafield tag="082" ind1="7" ind2=" "><subfield code="a">006.3</subfield><subfield code="2">23</subfield></datafield><datafield tag="245" ind1="0" ind2="0"><subfield code="a">Implementing computational intelligence techniques for security systems design </subfield><subfield code="c">[edited by] Yousif Abdullatif Albastaki, Wasan Awad.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Hershey, Pennsylvania (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA) :</subfield><subfield code="b">IGI Global,</subfield><subfield code="c">[2020]</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">23 PDFs (332 pages)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">electronic</subfield><subfield code="2">isbdmedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">Advances in computational intelligence and robotics (ACIR) book series</subfield></datafield><datafield tag="504" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index.</subfield></datafield><datafield tag="505" ind1="0" ind2=" "><subfield code="a">Chapter 1. Applications of computational intelligence in computing security: a review -- Chapter 2. A hybrid connectionist/ substitution approach for data encryption -- Chapter 3. Improving spam email filtering systems using data mining techniques -- Chapter 4. Odor sensing techniques: a biometric person authentication approach -- Chapter 5. Agent-based intrusion detection in wireless networks -- Chapter 6. Using an artificial neural network to improve email security -- Chapter 7. A review of machine learning techniques for anomaly detection in static graphs -- Chapter 8. Composite discrete logarithm problem and a reconstituted elgamal cryptosystem based on the problem: new elgamal cryptosystems with some special sequences and composite elgamal cryptosystem -- Chapter 9. Characteristic analysis of side channel attacks and various power analysis attack techniques -- Chapter 10. Bahrain government information security framework: cybertrust program -- Chapter 11. Critical cybersecurity threats: frontline issues faced by Bahraini organizations -- Chapter 12. Building new relationships: social media trustworthiness in gulf cooperation countries -- Chapter 13. Cybersecurity: cybercrime prevention in higher learning institutions -- Chapter 14. Cyber security, IT governance, and performance: a review of the current literature.</subfield></datafield><datafield tag="506" ind1=" " ind2=" "><subfield code="a">Restricted to subscribers or individual electronic text purchasers.</subfield></datafield><datafield tag="520" ind1="3" ind2=" "><subfield code="a">"This book explores the applications of computational intelligence and other advanced techniques in information security"--</subfield><subfield code="c">Provided by publisher.</subfield></datafield><datafield tag="530" ind1=" " ind2=" "><subfield code="a">Also available in print.</subfield></datafield><datafield tag="538" ind1=" " ind2=" "><subfield code="a">Mode of access: World Wide Web.</subfield></datafield><datafield tag="588" ind1=" " ind2=" "><subfield code="a">Description based on title screen (IGI Global, viewed 03/19/2020).</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computational intelligence.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Data protection.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Security systems</subfield><subfield code="x">Design and construction.</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computational intelligence.</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures.</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Data protection.</subfield><subfield code="2">fast</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Albastaki, Yousif</subfield><subfield code="d">1962-</subfield><subfield code="e">editor.</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Awad, Wasan</subfield><subfield code="d">1969-</subfield><subfield code="e">editor.</subfield></datafield><datafield tag="710" ind1="2" ind2=" "><subfield code="a">IGI Global,</subfield><subfield code="e">publisher.</subfield></datafield><datafield tag="776" ind1="0" ind2=" "><subfield code="c">(Original)</subfield><subfield code="w">(DLC)2019039270</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Print version:</subfield><subfield code="z">1799824187</subfield><subfield code="z">9781799824183</subfield><subfield code="w">(DLC) 2019039270</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">Advances in computational intelligence and robotics (ACIR) book series.</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="l">FWS01</subfield><subfield code="p">ZDB-98-IGB</subfield><subfield code="q">FWS_PDA_IGB</subfield><subfield code="u">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-7998-2418-3</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-98-IGB</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-863</subfield></datafield></record></collection> |
id | ZDB-98-IGB-00236581 |
illustrated | Not Illustrated |
indexdate | 2024-11-26T14:51:56Z |
institution | BVB |
isbn | 1799824209 9781799824206 |
language | English |
oclc_num | 1145391670 |
open_access_boolean | |
owner | DE-863 DE-BY-FWS |
owner_facet | DE-863 DE-BY-FWS |
physical | 23 PDFs (332 pages) Also available in print. |
psigel | ZDB-98-IGB |
publishDate | 2020 |
publishDateSearch | 2020 |
publishDateSort | 2020 |
publisher | IGI Global, |
record_format | marc |
series | Advances in computational intelligence and robotics (ACIR) book series. |
series2 | Advances in computational intelligence and robotics (ACIR) book series |
spelling | Implementing computational intelligence techniques for security systems design [edited by] Yousif Abdullatif Albastaki, Wasan Awad. Hershey, Pennsylvania (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA) : IGI Global, [2020] 23 PDFs (332 pages) text rdacontent electronic isbdmedia online resource rdacarrier Advances in computational intelligence and robotics (ACIR) book series Includes bibliographical references and index. Chapter 1. Applications of computational intelligence in computing security: a review -- Chapter 2. A hybrid connectionist/ substitution approach for data encryption -- Chapter 3. Improving spam email filtering systems using data mining techniques -- Chapter 4. Odor sensing techniques: a biometric person authentication approach -- Chapter 5. Agent-based intrusion detection in wireless networks -- Chapter 6. Using an artificial neural network to improve email security -- Chapter 7. A review of machine learning techniques for anomaly detection in static graphs -- Chapter 8. Composite discrete logarithm problem and a reconstituted elgamal cryptosystem based on the problem: new elgamal cryptosystems with some special sequences and composite elgamal cryptosystem -- Chapter 9. Characteristic analysis of side channel attacks and various power analysis attack techniques -- Chapter 10. Bahrain government information security framework: cybertrust program -- Chapter 11. Critical cybersecurity threats: frontline issues faced by Bahraini organizations -- Chapter 12. Building new relationships: social media trustworthiness in gulf cooperation countries -- Chapter 13. Cybersecurity: cybercrime prevention in higher learning institutions -- Chapter 14. Cyber security, IT governance, and performance: a review of the current literature. Restricted to subscribers or individual electronic text purchasers. "This book explores the applications of computational intelligence and other advanced techniques in information security"-- Provided by publisher. Also available in print. Mode of access: World Wide Web. Description based on title screen (IGI Global, viewed 03/19/2020). Computational intelligence. Computer networks Security measures. Data protection. Security systems Design and construction. Computational intelligence. fast Computer networks Security measures. fast Data protection. fast Albastaki, Yousif 1962- editor. Awad, Wasan 1969- editor. IGI Global, publisher. (Original) (DLC)2019039270 Print version: 1799824187 9781799824183 (DLC) 2019039270 Advances in computational intelligence and robotics (ACIR) book series. FWS01 ZDB-98-IGB FWS_PDA_IGB http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-7998-2418-3 Volltext |
spellingShingle | Implementing computational intelligence techniques for security systems design Advances in computational intelligence and robotics (ACIR) book series. Chapter 1. Applications of computational intelligence in computing security: a review -- Chapter 2. A hybrid connectionist/ substitution approach for data encryption -- Chapter 3. Improving spam email filtering systems using data mining techniques -- Chapter 4. Odor sensing techniques: a biometric person authentication approach -- Chapter 5. Agent-based intrusion detection in wireless networks -- Chapter 6. Using an artificial neural network to improve email security -- Chapter 7. A review of machine learning techniques for anomaly detection in static graphs -- Chapter 8. Composite discrete logarithm problem and a reconstituted elgamal cryptosystem based on the problem: new elgamal cryptosystems with some special sequences and composite elgamal cryptosystem -- Chapter 9. Characteristic analysis of side channel attacks and various power analysis attack techniques -- Chapter 10. Bahrain government information security framework: cybertrust program -- Chapter 11. Critical cybersecurity threats: frontline issues faced by Bahraini organizations -- Chapter 12. Building new relationships: social media trustworthiness in gulf cooperation countries -- Chapter 13. Cybersecurity: cybercrime prevention in higher learning institutions -- Chapter 14. Cyber security, IT governance, and performance: a review of the current literature. Computational intelligence. Computer networks Security measures. Data protection. Security systems Design and construction. Computational intelligence. fast Computer networks Security measures. fast Data protection. fast |
title | Implementing computational intelligence techniques for security systems design |
title_auth | Implementing computational intelligence techniques for security systems design |
title_exact_search | Implementing computational intelligence techniques for security systems design |
title_full | Implementing computational intelligence techniques for security systems design [edited by] Yousif Abdullatif Albastaki, Wasan Awad. |
title_fullStr | Implementing computational intelligence techniques for security systems design [edited by] Yousif Abdullatif Albastaki, Wasan Awad. |
title_full_unstemmed | Implementing computational intelligence techniques for security systems design [edited by] Yousif Abdullatif Albastaki, Wasan Awad. |
title_short | Implementing computational intelligence techniques for security systems design |
title_sort | implementing computational intelligence techniques for security systems design |
topic | Computational intelligence. Computer networks Security measures. Data protection. Security systems Design and construction. Computational intelligence. fast Computer networks Security measures. fast Data protection. fast |
topic_facet | Computational intelligence. Computer networks Security measures. Data protection. Security systems Design and construction. |
url | http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-7998-2418-3 |
work_keys_str_mv | AT albastakiyousif implementingcomputationalintelligencetechniquesforsecuritysystemsdesign AT awadwasan implementingcomputationalintelligencetechniquesforsecuritysystemsdesign AT igiglobal implementingcomputationalintelligencetechniquesforsecuritysystemsdesign |