From the content: Computational Intelligence for Privacy and Security: Introduction.- An Introduction to the Use of Neural Networks for Network Intrusion Detection.- Evolutionary Computation in Computer Security and Forensics: an Overview.- Application of Fuzzy Logic in Computer Security and Forensics.- A Topological Study of Chaotic Iterations Application to Hash Functions.- SOM-based Techniques towards Hierarchical Visualisation of Network Forensics Traffic Data.
"synopsis" may belong to another edition of this title.
(No Available Copies)
Search Books: Create a WantCan't find the book you're looking for? We'll keep searching for you. If one of our booksellers adds it to AbeBooks, we'll let you know!
Create a Want