Log In
Or create an account ->
Imperial Library
Home
About
News
Upload
Forum
Help
Login/SignUp
Index
Cover
Title Page
Copyright Page
Book Series
Mission
Coverage
Editorial Advisory Board
Preface
Acknowledgment
Chapter 1: Applications of Computational Intelligence in Computing Security
ABSTRACT
INTRODUCTION
COMPUTATIONAL INTELLIGENCE DEFINED
NEURAL NETWORKS
EVOLUTIONARY COMPUTING
SAWRM INTELLIGENCE
ARTIFICIAL IMMUNE SYSTEMS
FUZZY SYSTEMS
THE FUTURE OF CI
CONCLUSION
REFERENCES
Chapter 2: A Hybrid Connectionist/ Substitution Approach for Data Encryption
ABSTRACT
INTRODUCTION
ENCRYPTION/DECRYPTION MODEL DETAILS
BINARY WEIGHTS & INPUT/OUTPUT
The Encryption/Decryption Process
Distortion Layer
THE INVERSE DISTORTION LAYER
DISCUSSIONS
CONCLUSION AND FUTURE WORK
REFERENCES
ENDNOTE
APPENDIX
Chapter 3: Improving Spam Email Filtering Systems Using Data Mining Techniques
ABSTRACT
INTRODUCTION
BACKGROUND AND LITERATURE REVIEW
PROPOSED ALGORITHM
RESULTS
CONCLUSION
REFERENCES
Chapter 4: Odor Sensing Techniques
ABSTRACT
INTRODUCTION
RELATED WORK
EXISTING BIOMETRICS TECHNOLOGIES
OBJECTIVES OF THE RESEARCH WORK
ARTIFICIAL INTELLIGENCE TECHNIQUES
SCOPE OF THE WORK AND LIMITATIONS
DATA COLLECTION, ANALYSIS AND RESULTS
BASIC DESIGN AND ARCHITECTURE
DATA PROCESSING AND RESULTS
CONCLUSION AND FINDINGS
REFERENCES
Chapter 5: Agent-Based Intrusion Detection in Wireless Networks
ABSTRACT
INTRODUCTION
BACKGROUND
AGENT-BASED IDSs
DISCUSSION
OPEN ISSUES, CHALLENGES, AND SCOPE FOR FUTURE WORK
CONCLUSION
REFERENCES
ADDITIONAL READING
KEY TERMS AND DEFINITIONS
Chapter 6: Using an Artificial Neural Network to Improve Email Security
ABSTRACT
INTRODUCTION
BACKGROUND
SYSTEM DESIGN
RESULTS AND DISCUSSION
FUTURE WORK
CONCLUSION
REFERENCES
Chapter 7: A Review of Machine Learning Techniques for Anomaly Detection in Static Graphs
ABSTRACT
INTRODUCTION
BACKGROUND
ANOMALY DETECTION IN STATIC GRAPHS
CONCLUSION
REFERENCES
Chapter 8: Composite Discrete Logarithm Problem and a Reconstituted ElGamal Cryptosystem Based on the Problem
ABSTRACT
INTRODUCTION
BACKGROUND
MAIN FOCUS OF THE CHAPTER
SOLUTIONS AND RECOMMENDATIONS
FUTURE RESEARCH DIRECTIONS
CONCLUSION
ACKNOWLEDGMENT
REFERENCES
ADDITIONAL READING
KEY TERMS AND DEFINITIONS
Chapter 9: Characteristic Analysis of Side Channel Attacks and Various Power Analysis Attack Techniques
ABSTRACT
INTRODUCTION
SOURCES OF INFORMATION LEAKAGE THROUGH POWER AND LEAKAGE CURRENT
FUTURE CHALLENGES
REFERENCES
Chapter 10: Bahrain Government Information Security Framework
ABSTRACT
INTRODUCTION
RELATED WORK
BEFORE IMPLEMENTING CYBER TRUST PROGRAM
PROPOSED SOLUTION
PROGRAM MISSION AND GOALS
MATURITY MODEL LEVELS
PROGRAM ORGANIZATION
PARTICIPATION IN THE PROGRAM
PROGRAM DETAILS
CONCLUSION
REFERENCES
Chapter 11: Critical Cybersecurity Threats
ABSTRACT
INTRODUCTION
LITERATURE REVIEW
DATA ANALYSIS AND INTERPRETATION
RESULTS AND DISCUSSION
CONCLUSION AND RECOMMENDATION
CONCLUSION
RECOMMENDATIONS
REFERENCES
Chapter 12: Building New Relationships
ABSTRACT
INTRODUCTION
BACKGROUND – WEB 2.0 TECHNOLOGY AND SOCIAL MEDIA EVOLUTION
CONCEPTUAL FRAMEWORKS FOR TECHNOLOGY ACCEPTANCE
DATA ANALYSIS
SOLUTIONS AND RECOMMENDATIONS
FUTURE RESEARCH DIRECTIONS
CONCLUSION
REFERENCES
Chapter 13: Cybersecurity
ABSTRACT
INTRODUCTION
LITERATURE REVIEW
METHODOLOGY
RESULTS AND DISCUSSION
CONCLUSION AND RECOMMENDATIONS
REFERENCES
Chapter 14: Cyber Security, IT Governance, and Performance
ABSTRACT
INTRODUCTION
IT GOVERNANCE MECHANISMS
RECOMMENDATIONS AND FUTURE RESEARCH DIRECTIONS
REFERENCES
Compilation of References
About the Contributors
← Prev
Back
Next →
← Prev
Back
Next →