


default search action
Computational Intelligence in Information Assurance and Security 2007
- Nadia Nedjah, Ajith Abraham, Luiza de Macedo Mourelle:

Computational Intelligence in Information Assurance and Security. Studies in Computational Intelligence 57, Springer 2007, ISBN 978-3-540-71077-6 - Elena C. Laskari, Gerasimos C. Meletiou, Yannis C. Stamatiou

, Michael N. Vrahatis:
Cryptography and Cryptanalysis Through Computational Intelligence. 1-49 - Shiguo Lian:

Multimedia Content Protection Based on Chaotic Neural Networks. 51-78 - Nadia Nedjah

, Luiza de Macedo Mourelle
:
Evolutionary Regular Substitution Boxes. 79-88 - Paolo Mercorelli

, Alexander Frick:
Industrial Applications Using Wavelet Packets for Gross Error Detection. 89-127 - Ki-Won Yeom:

Immune-inspired Algorithm for Anomaly Detection. 129-154 - Luc Longpré, Vladik Kreinovich:

How to Efficiently Process Uncertainty within a Cyberinfrastructure without Sacrificing Privacy and Confidentiality. 155-173 - Chengfeng Wang, Yuan Luo, Marina L. Gavrilova, Jon G. Rokne:

Fingerprint Recognition Using a Hierarchical Approach. 175-199 - Constantinos Markantonakis

, Keith Mayes, Michael Tunstall
, Damien Sauveron, Fred Piper:
Smart Card Security. 201-233 - Sangkyun Kim:

Governance of Information Security: New Paradigm of Security Management. 235-254

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














