Bio-inspiring Cyber Security and Cloud Services: Trends and Innovations

This volume presents recent research in cyber security, and reports how organizations can gain competitive advantages by applying the different security techniques in real-world scenarios. The volume provides reviews of cuttingâ_"edge technologies, algorithms, applications and insights for bio-...

Descripción completa

Guardado en:
Detalles Bibliográficos
Otros Autores: Hassanien, Aboul Ella (ed.), Kim, Tai-Hoon (ed.), Kacprzyk, Janusz (ed.), Awad, Ali Ismail (ed.)
Formato: Electrónico Libro electrónico
Lenguaje:Inglés
Publicado: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2014.
Colección:Intelligent Systems Reference Library, 70
Materias:
Acceso en línea:http://dx.doi.org/10.1007/978-3-662-43616-5
Aporte de:Registro referencial: Solicitar el recurso aquí
LEADER 02328Cam#a22004575i#4500
001 INGC-EBK-000791
003 AR-LpUFI
005 20220927110119.0
007 cr nn 008mamaa
008 140626s2014 gw | s |||| 0|eng d
020 |a 9783662436165 
024 7 |a 10.1007/978-3-662-43616-5  |2 doi 
050 4 |a Q342 
072 7 |a UYQ  |2 bicssc 
072 7 |a COM004000  |2 bisacsh 
245 1 0 |a Bio-inspiring Cyber Security and Cloud Services: Trends and Innovations  |h [electronic resource] /   |c edited by Aboul Ella Hassanien...[et al.]. 
260 1 |a Berlin, Heidelberg :  |b Springer Berlin Heidelberg :  |b Imprint: Springer,  |c 2014. 
300 |a xxii, 585 p. :   |b il. 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a text file  |b PDF  |2 rda 
490 1 |a Intelligent Systems Reference Library,  |x 1868-4394 ;  |v 70 
505 0 |a Bio-Inspiring in Complex Network Security -- Mobile Ad Hoc networks and Key managements -- Biometrics technology and applications. 
520 |a This volume presents recent research in cyber security, and reports how organizations can gain competitive advantages by applying the different security techniques in real-world scenarios. The volume provides reviews of cuttingâ_"edge technologies, algorithms, applications and insights for bio-inspiring cyber security-based systems. The book will be a valuable companion and comprehensive reference for both postgraduate and senior undergraduate students who are taking a course in cyber security. The volume is organized in self-contained chapters to provide greatest reading flexibility.  . 
650 0 |a Computer security.  |9 260684 
650 1 4 |a Engineering.  |9 259622 
650 2 4 |a Computational Intelligence.  |9 259845 
650 2 4 |a Artificial Intelligence (incl. Robotics).  |9 259846 
650 2 4 |a Systems and Data Security.  |9 260687 
700 1 |a Hassanien, Aboul Ella,   |e ed.  |9 261979 
700 1 |a Kim, Tai-Hoon,   |e ed.  |9 261980 
700 1 |a Kacprzyk, Janusz,   |e ed.  |9 260829 
700 1 |a Awad, Ali Ismail,   |e ed.  |9 261981 
776 0 8 |i Printed edition:  |z 9783662436158 
856 4 0 |u http://dx.doi.org/10.1007/978-3-662-43616-5 
912 |a ZDB-2-ENG 
929 |a COM 
942 |c EBK  |6 _ 
950 |a Engineering (Springer-11647) 
999 |a SKV  |c 28219  |d 28219