default search action
Computational Intelligence in Information Assurance and Security 2007
- Nadia Nedjah, Ajith Abraham, Luiza de Macedo Mourelle:
Computational Intelligence in Information Assurance and Security. Studies in Computational Intelligence 57, Springer 2007, ISBN 978-3-540-71077-6 - Elena C. Laskari, Gerasimos C. Meletiou, Yannis C. Stamatiou, Michael N. Vrahatis:
Cryptography and Cryptanalysis Through Computational Intelligence. 1-49 - Shiguo Lian:
Multimedia Content Protection Based on Chaotic Neural Networks. 51-78 - Nadia Nedjah, Luiza de Macedo Mourelle:
Evolutionary Regular Substitution Boxes. 79-88 - Paolo Mercorelli, Alexander Frick:
Industrial Applications Using Wavelet Packets for Gross Error Detection. 89-127 - Ki-Won Yeom:
Immune-inspired Algorithm for Anomaly Detection. 129-154 - Luc Longpré, Vladik Kreinovich:
How to Efficiently Process Uncertainty within a Cyberinfrastructure without Sacrificing Privacy and Confidentiality. 155-173 - Chengfeng Wang, Yuan Luo, Marina L. Gavrilova, Jon G. Rokne:
Fingerprint Recognition Using a Hierarchical Approach. 175-199 - Constantinos Markantonakis, Keith Mayes, Michael Tunstall, Damien Sauveron, Fred Piper:
Smart Card Security. 201-233 - Sangkyun Kim:
Governance of Information Security: New Paradigm of Security Management. 235-254
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.