Ajith Abraham9783540710776, 3540710779
The global economic infrastructure is becoming increasingly dependent upon information technology, with computer and communication technology being essential and vital components of Government facilities, power plant systems, medical infrastructures, financial centers and military installations to name a few. Finding effective ways to protect information systems, networks and sensitive data within the critical information infrastructure is challenging even with the most advanced technology and trained professionals. This volume provides the academic and industrial community with a medium for presenting original research and applications related to information assurance and security using computational intelligence techniques. The included chapters communicate current research on information assurance and security regarding both the theoretical and methodological aspects, as well as various applications in solving real world information security problems using computational intelligence. |
Table of contents : 0076front-matter……Page 1 0002fulltext_001……Page 13 0010fulltext_002……Page 20 0018fulltext……Page 28 0026fulltext_003……Page 35 0036fulltext_004……Page 44 0044fulltext_005……Page 52 0054fulltext_006……Page 61 0062fulltext_012……Page 69 0072fulltext_007……Page 78 0084fulltext_008……Page 89 0092fulltext_009……Page 97 0102fulltext_010……Page 106 0110fulltext_011……Page 113 0120fulltext_013……Page 122 0128fulltext_014……Page 130 0136fulltext_015……Page 137 0146fulltext_018……Page 147 0154fulltext_016……Page 155 0164fulltext_019……Page 165 0172fulltext_017……Page 173 0182fulltext_020……Page 182 0190fulltext_021……Page 190 0200fulltext_029……Page 200 0210fulltext_022……Page 209 0210fulltext_023……Page 0 0226fulltext_024……Page 223 0234fulltext_025……Page 230 0242fulltext_026……Page 237 0252fulltext_027……Page 246 0260fulltext_028……Page 254 back-matter……Page 261 |
Reviews
There are no reviews yet.