You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
Recently, cryptology problems, such as designing good cryptographic systems and analyzing them, have been challenging researchers. Many algorithms that take advantage of approaches based on computational intelligence techniques, such as genetic algorithms, genetic programming, and so on, have been proposed to solve these issues. Implementing Computational Intelligence Techniques for Security Systems Design is an essential research book that explores the application of computational intelligence and other advanced techniques in information security, which will contribute to a better understanding of the factors that influence successful security systems design. Featuring a range of topics such as encryption, self-healing systems, and cyber fraud, this book is ideal for security analysts, IT specialists, computer engineers, software developers, technologists, academicians, researchers, practitioners, and students.
The recent explosion in complex global networking architectures has spurred a concomitant rise in the need for robust information security. Further, as computing power increases exponentially with every passing year, so do the number of proposed cryptographic schemata for improving and ensuring the encryption integrity of cutting-edge infosec protocols. Improving Information Security Practices through Computational Intelligence presents an overview of the latest and greatest research in the field, touching on such topics as cryptology, stream ciphers, and intrusion detection, and providing new insights to an audience of students, teachers, and entry-level researchers working in computational intelligence, information security, and security engineering.
Ongoing advancements in modern technology have led to significant developments in artificial intelligence. With the numerous applications available, it becomes imperative to conduct research and make further progress in this field. Artificial Intelligence: Concepts, Methodologies, Tools, and Applications provides a comprehensive overview of the latest breakthroughs and recent progress in artificial intelligence. Highlighting relevant technologies, uses, and techniques across various industries and settings, this publication is a pivotal reference source for researchers, professionals, academics, upper-level students, and practitioners interested in emerging perspectives in the field of artificial intelligence.
The internet is established in most households worldwide and used for entertainment purposes, shopping, social networking, business activities, banking, telemedicine, and more. As more individuals and businesses use this essential tool to connect with each other and consumers, more private data is exposed to criminals ready to exploit it for their gain. Thus, it is essential to continue discussions involving policies that regulate and monitor these activities, and anticipate new laws that should be implemented in order to protect users. Cyber Law, Privacy, and Security: Concepts, Methodologies, Tools, and Applications examines current internet and data protection laws and their impact on user experience and cybercrime, and explores the need for further policies that protect user identities, data, and privacy. It also offers the latest methodologies and applications in the areas of digital security and threats. Highlighting a range of topics such as online privacy and security, hacking, and online threat protection, this multi-volume book is ideally designed for IT specialists, administrators, policymakers, researchers, academicians, and upper-level students.
This book constitutes the thoroughly refereed post-conference proceedings of the 5th International Conference on Learning and Intelligent Optimization, LION 5, held in Rome, Italy, in January 2011. The 32 revised regular and 3 revised short papers were carefully reviewed and selected from a total of 99 submissions. In addition to the contributions to the general track there are 11 full papers and 3 short papers presented at the following four special sessions; IMON: Intelligent Multiobjective OptimizatioN, LION-PP: Performance Prediction Self* EAs: Self-tuning, self-configuring and self-generating evolutionary algorithms LION-SWAP: Software and Applications.
This book brings together intelligence systems and the Internet of Things, with special attention given to the opportunities, challenges, for education, business growth, and economic progression of nations which will help societies (economists, financial managers, engineers, ICT specialists, digital managers, data managers, policymakers, regulators, researchers, academics, and students) to better understand, use, and control AI and IoT to develop future strategies and to achieve sustainability goals. EAMMIS 2021 was organized by the Bridges Foundation in cooperation with the Istanbul Medeniyet University, Istanbul, Turkey, on March 19–20, 2021. EAMMIS 2021 theme was Artificial Intelligence Systems and the Internet of Things in the digital era. The papers presented at the conference provide a holistic view of AI education, MIS, cybersecurity, blockchain, Internet of Ideas (IoI), and knowledge management.
None
"This book discusses the emerging topics of information technology and the IT based solutions in global and multi-cultural environments"--Provided by publisher.
""This book explores different concepts, factors, strategies, and practices that lead to the most effective and efficient way of utilizing, managing, and sustaining knowledge management in public sector organizations to improve organizational learning and performance excellence"--Provided by publisher"--