Computational Intelligence in Information Assurance and Security 2007
Nadia Nedjah, Ajith Abraham, Luiza de Macedo Mourelle (Eds.):
Computational Intelligence in Information Assurance and Security.
Studies in Computational Intelligence Vol. 57 Springer 2007, ISBN 978-3-540-71077-6
- E. C. Laskari, Gerasimos C. Meletiou, Yannis C. Stamatiou, Michael N. Vrahatis:
Cryptography and Cryptanalysis Through Computational Intelligence.
1-49
- Shiguo Lian:
Multimedia Content Protection Based on Chaotic Neural Networks.
51-78
- Nadia Nedjah, Luiza de Macedo Mourelle:
Evolutionary Regular Substitution Boxes.
79-88
- Paolo Mercorelli, Alexander Frick:
Industrial Applications Using Wavelet Packets for Gross Error Detection.
89-127
- Ki-Won Yeom:
Immune-inspired Algorithm for Anomaly Detection.
129-154
- Luc Longpré, Vladik Kreinovich:
How to Efficiently Process Uncertainty within a Cyberinfrastructure without Sacrificing Privacy and Confidentiality.
155-173
- Chengfeng Wang, Yuan Luo, Marina L. Gavrilova, Jon G. Rokne:
Fingerprint Recognition Using a Hierarchical Approach.
175-199
- Constantinos Markantonakis, Keith Mayes, Michael Tunstall, Damien Sauveron, Fred Piper:
Smart Card Security.
201-233
- Sangkyun Kim:
Governance of Information Security: New Paradigm of Security Management.
235-254
Copyright © Tue Mar 16 01:51:58 2010
by Michael Ley (ley@uni-trier.de)