default search action
Computational Intelligence for Privacy and Security 2012
- David A. Elizondo, Agusti Solanas, Antoni Martínez-Ballesté:
Computational Intelligence for Privacy and Security. Studies in Computational Intelligence 394, Springer 2012, ISBN 978-3-642-25236-5 - David A. Elizondo, Agusti Solanas, Antoni Martínez-Ballesté:
Computational Intelligence for Privacy and Security: Introduction. 1-4 - Christian Bitter, John North, David A. Elizondo, Tim Watson:
An Introduction to the Use of Neural Networks for Network Intrusion Detection. 5-24 - Sulaiman Al Amro, David A. Elizondo, Agusti Solanas, Antoni Martínez-Ballesté:
Evolutionary Computation in Computer Security and Forensics: An Overview. 25-34 - Sulaiman Al Amro, Francisco Chiclana, David A. Elizondo:
Application of Fuzzy Logic in Computer Security and Forensics. 35-49 - Christophe Guyeux, Jacques M. Bahi:
A Topological Study of Chaotic Iterations Application to Hash Functions. 51-73 - Esteban J. Palomo, David A. Elizondo, Enrique Domínguez, Rafael Marcos Luque, Tim Watson:
SOM-Based Techniques towards Hierarchical Visualisation of Network Forensics Traffic Data. 75-95 - Marcin Seredynski, Pascal Bouvry:
The Application of Evolutionary Heuristics for Solving Soft Security Issues in MANETs. 97-114 - Agusti Solanas, Úrsula González-Nicolás, Antoni Martínez-Ballesté:
Mixing Genetic Algorithms and V-MDAV to Protect Microdata. 115-133 - Michal Sramka:
Breaching Privacy Using Data Mining: Removing Noise from Perturbed Data. 135-157 - Rafael Marcos Luque, David A. Elizondo, Ezequiel López-Rubio, Esteban J. Palomo:
Feature Selection of Hand Biometrical Traits Based on Computational Intelligence Techniques. 159-180 - José García Rodríguez, Anastassia Angelopoulou, Francisco José Mora-Gimeno, Alexandra Psarrou:
Building Visual Surveillance Systems with Neural Networks. 181-198 - Tiago A. Almeida, Akebo Yamakami:
Advances in Spam Filtering Techniques. 199-214 - Madhu K. Shankarpani, Kesav Kancherla, Ram S. Movva, Srinivas Mukkamala:
Computational Intelligent Techniques and Similarity Measures for Malware Classification. 215-236 - Bernd Carsten Stahl, Moira Carroll-Mayer, David A. Elizondo, Kutoma Wakunuma, Yingqin Zheng:
Intelligence Techniques in Computer Security and Forensics: At the Boundaries of Ethics and Law. 237-258
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.