KES-AMSTA '09 Proceedings of the Third KES International Symposium on Agent and Multi-Agent Systems: Technologies and Applications
Analysis of vulnerability assessment results based on CAOS
Applied Soft Computing
Cryptanalysis of simplified-DES using computational intelligence
WSEAS Transactions on Computers
Reconciliation engine and metric for network vulnerability assessment
Proceedings of the First International Conference on Security of Internet of Things
Hi-index | 0.00 |
The global economic infrastructure is becoming increasingly dependent upon information technology, with computer and communication technology being essential and vital components of Government facilities, power plant systems, medical infrastructures, financial centers and military installations to name a few. Finding effective ways to protect information systems, networks and sensitive data within the critical information infrastructure is challenging even with the most advanced technology and trained professionals. This volume provides the academic and industrial community with a medium for presenting original research and applications related to information assurance and security using computational intelligence techniques. The included chapters communicate current research on information assurance and security regarding both the theoretical and methodological aspects, as well as various applications in solving real world information security problems using computational intelligence.