| |
|
|
|
|
|
|
|
|
1. |
Record Nr. |
UNISA996465627603316 |
|
|
Titolo |
Computational Intelligence in Security for Information Systems [[electronic resource] ] : 4th International Conference, CISIS 2011, Held at IWANN 2011, Torremolinos-Málaga, Spain, June 8-10, 2011, Proceedings / / edited by Álvaro Herrero, Emilio Corchado |
|
|
|
|
|
|
|
Pubbl/distr/stampa |
|
|
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2011 |
|
|
|
|
|
|
|
|
|
ISBN |
|
|
|
|
|
|
Edizione |
[1st ed. 2011.] |
|
|
|
|
|
Descrizione fisica |
|
1 online resource (XIV, 310 p. 72 illus., 39 illus. in color.) |
|
|
|
|
|
|
Collana |
|
Security and Cryptology ; ; 6694 |
|
|
|
|
|
|
Disciplina |
|
|
|
|
|
|
Soggetti |
|
Computer security |
Application software |
Computer communication systems |
Algorithms |
Information storage and retrieval |
Management information systems |
Computer science |
Systems and Data Security |
Information Systems Applications (incl. Internet) |
Computer Communication Networks |
Algorithm Analysis and Problem Complexity |
Information Storage and Retrieval |
Management of Computing and Information Systems |
|
|
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
Note generali |
|
Bibliographic Level Mode of Issuance: Monograph |
|
|
|
|
|
|
Nota di bibliografia |
|
Includes bibliographical references and index. |
|
|
|
|
|
|
Sommario/riassunto |
|
This book constitutes the refereed proceedings of the 4th International Conference on Computational Intelligence in Security for Information Systems, CISIS 2011, held in Torremolinos-Málaga, in June 2011 as a satellite event of IWANN 2011, the International Work-Conference on Artificial and Natural Neural Networks. The 38 revised full papers presented were carefully reviewed and selected from a total of 70 |
|
|
|
|
|
|
|
|
|
|
submissions. The papers are organized in topical sections on machine learning and intelligence, network security, cryptography, securing software, and applications of intelligent methods for security. |
|
|
|
|
|
| |