Politeknik Siber dan Sandi Negara

Knowledge Center of Cybersecurity and Cryptography

  • Home
  • Information
  • News
  • Help
  • Librarian
  • Member Area
  • Select Language :
    Arabic Bengali Brazilian Portuguese English Espanol German Indonesian Japanese Malay Persian Russian Thai Turkish Urdu

Search by :

ALL Author Subject ISBN/ISSN Advanced Search

Last search:

{{tmpObj[k].text}}
Image of Computational intelligence in information assurance and security
Bookmark Share

Text

Computational intelligence in information assurance and security

Nedjah, Nadia - Personal Name; Abraham, Ajith - Personal Name; Mourelle, Luiza de Macedo - Personal Name;

Contents

1. Cryptography and Cryptanalysis Through Computational Intelligence
1.1. Introduction
1.1.1. Block ciphers
1.1.2. Public key cryptographic schemes
1.1.3. Elliptic Curve based cryptosystems
1.2. Computational Intelligence Background and Methods
1.2.1. Evolutionary Computation
1.2.2. Artificial Neural Networks
1.2.3. Fuzzy systems
1.3. Review of Cryptography and Cryptanalysis Through Computational Intelligence
1.4. Applying Computational lntelligence in Cryptanalysis
1.4.1. Cryptanalysis as Discrete Optimization Task
1.4.2. Cryptanalysis of Feistel Ciphers through Evolutionary Computation Methods
1.4.3. Utilizing Artificial Neural Networks to Address Cryptographic Problems
1.4.4. Artificial Neural Networks Applied on Problems Related to Elliptic Curve Cryptography
1.5. Ridge Polynomial Networks for Cryptography
1.6. Summary
References

2. Multimedia Content Protection Based on Chaotic Neural Networks
2.1. Introduction
2.2. Chaotic neural networks’ generation and properties
2.2.1. Chaotic neural network’s generation
2.2.2. Chaotic neural network’s properties suitable for data encryption
2.3. Multimedia content encryption based on chaotic neural networks
2.3.1. Introduction to multimedia content encryption
2.3.2. The cipher based on chaotic neural network
2.3.3. Selective video encryption based on Advanced Video Coding
2.4. Multimedia content authentication based on chaotic neural networks
2.4.1. Introduction to multimedia content authentication
2.4.2. The hash function based on chaotic neural network
2.4.3. The proposed image authentication scheme
2.4.4. Performance analysis
2.5. Future work and discussions
2.6. Conclusions
2.7. Acknowledgements
References

3. Evolutionary Regular Substitution Boxes
3.1. Introduction
3.2. Preliminaries for Substitution Boxes
3.3. Nash Equilibrium-based Evolutionary Algorithms
3.4. Evolving Resilient S-Boxes
3.4.1. S-Box encoding and genetic operators
3.4.2. S-Box evaluation
3.5. Performance Results
3.6. Conclusion
References

4. Industrial Applications Using Wavelet Packets for Gross Error Detection
4.1. Introduction
4.1.1. Modules
4.1.2. Gross Error Types amid Examples
4.2. Problem Specification
4.2.1. Mathematical Preliminary
4.2.2. Noise Level Detection Problem (NLDP) and Algorithm (NLDA)
4.2.3. Some Remarks Regarding Wavelet Based Algorithms
4.3. Wavelet Based Noise Level Determination
4.3.1. Background and State of the Art
4.3.2. Noise Level Estimation: State of the Art
4.3.3. The Proposed New Procedure for Peak-Noise Level Detection
4.3.4. Validation of Peak Noise Level Estimation
4.4. The Wavelet Algorithm for GEDR
4.4.1. Validation and Simulations
4.4.2. Outlier Detection Algorithm: MAD Algorithm
4.5. Results
4.5.1. Algorithm Parameterization
4.6. Experimental Data Sources
4.6.1. Dryer, Distillation and Mining Data with Outliers
4.6.2. Artificially Contaminated Data and Off-line, On-line Mode
4.6.3. Summary Conclusions and Outlook
References

5. Immune-inspired Algorithm for Anomaly Detection
5.1. Introduction
5.2. Background
5.2.1. The Danger Theory
5.2.2. Dendritic Cells s Initiator of Primary Immune Response
5.3. IDS based on Danger Theory and DCs Properties
5.3.1. Properties of DCs for IDS
5.3.2. Abstraction of Anomaly Detection Algorithm
5.4. DCs based Implementation of Practical Applications
5.4.1. A Detection of DoM Attack
5.4.2. Experiments and Results
5.4.3. A Detection of Port Scan Attack
5.4.4. Experiments and Results
5.5. Conclusion
References
6. How to Efficiently Process Uncertainty within a Cyberinfrastructure without Sacrificing Privacy and Confidentiality
6.1. Cyberinfrastructure and Web Services
6.1.1. Practical Problem
6.1.2. Centralization of Computational Resources
6.1.3. Cyberinfrastructure
6.1.4. What Is Cyberinfrastructure: The Official NSF Definition
6.1.5. Web Services: What They Do - A Brief Summary
6.2. Processing Uncertainty Within a Cyberinfrastructure
6.2.1. Formulation of the problem
6.2.2. Description of uncertainty: general formulas
6.2.3. Error Estimation for the Results of Data Processing
6.2.4. How This Problem Is Solved Now
6.3. Need for Privacy Makes the Problem More Complex
6.4. Solution for Statistical Setting: Monte—Carlo Simulations
6.5. Solution for Interval and Fuzzy Setting
6.6. Summary
References
7. Fingerprint Recognition Using a Hierarchical Approach
7.1. Introduction
7.2. Coarse Fingerprint Matching
7.2.1. Fingerprint Foreground Segmentation
7.2.2. Singular Points Extraction
7.2.3. Singular Points Matching
7.3. Topology-based Fine Matching
7.3.1. Delaunay Triangulation of Minutiae Set
7.3.2. Modeling Fingerprint Deformation
7.3.3. Maximum Bipartite Matching
7.4. Experimental Results
7.5. Conclusions
References
8. Smart Card Security
8.1. Introduction
8.2. Smart Card Specific Attacks
8.2.1. Side Channel Attacks
8.2.2. Fault Attacks
8.3. Smart Card Platform Security
8.3.1. The Evolution of Smart Card Platforms
8.3.2. The Different Multi-application smart card Platforms
8.3.3. iavaCard
8.3.4. Java Card Security
8.4. OSM and 3G Security
8.4.1. 1G-TACS
8.4.2. 2G-GSM
8.4.3. 3G-UMTS
8.5. Summary
References
9. Governance of Information Security: New Paradigm of Security Management
9.1. Introduction
9.2. Rise of the Governance
9.2.1. Definitions of the Governance
9.2.2. Implications of the Governance
9.2.3. Success Factors of the Governance
9.3. Why the Security Management Fails
9.3.1. Vhat the Security Management Can Do
9.3.2. What the Security Management Cannot Do
9.4. Governance of Corporate Security
9.4.1. General Frameworks for the Governance
9.4.2. Integrated Framework for tite Governance of Corporate Security
9.4.3. 9.5 Summary


Availability
#
Perpustakaan Poltek SSN (Rak 000) 005.8 NED c
b0000570
Available - Available
Detail Information
Series Title
Studies in computational intelligence
Call Number
005.8 NED c
Publisher
Heidelberg : Springer., 2007
Collation
xx, 255 hal.; ilus.; 24 cm
Language
English
ISBN/ISSN
9783540710776
Classification
005.8
Content Type
-
Media Type
-
Carrier Type
-
Edition
--
Subject(s)
Computer security
Network Security
Internet -- Security Measures
Specific Detail Info
--
Statement of Responsibility
Nadia Nedjah, Ajith Abraham dan Luiza de Macedo Mourella
Other version/related

No other version available

File Attachment
No Data
Comments

You must be logged in to post a comment

Politeknik Siber dan Sandi Negara
  • Information
  • Services
  • Librarian
  • Member Area

About Us

Perpustakaan Politeknik Siber dan Sandi Negara menyediakan berbagai macam koleksi seperti Buku, Jurnal, Majalah, Koran, Referensi dan Konten Lokal.

Search

start it by typing one or more keywords for title, author or subject

Keep SLiMS Alive Want to Contribute?

© 2025 — Senayan Developer Community

Powered by SLiMS
Select the topic you are interested in
  • Computer Science, Information & General Works
  • Philosophy & Psychology
  • Religion
  • Social Sciences
  • Language
  • Pure Science
  • Applied Sciences
  • Art & Recreation
  • Literature
  • History & Geography
Icons made by Freepik from www.flaticon.com
Advanced Search
Where do you want to share?