Implementing computational intelligence techniques for security systems design:

"This book explores the applications of computational intelligence and other advanced techniques in information security"--

Gespeichert in:
Bibliographische Detailangaben
Weitere beteiligte Personen: Albastaki, Yousif 1962- (HerausgeberIn), Awad, Wasan 1969- (HerausgeberIn)
Format: Elektronisch E-Book
Sprache:Englisch
Veröffentlicht: Hershey, Pennsylvania IGI Global [2020]
Schriftenreihe:Advances in computational intelligence and robotics (ACIR) book series
Schlagwörter:
Links:https://doi.org/10.4018/978-1-7998-2418-3
http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-7998-2418-3
http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-7998-2418-3
http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-7998-2418-3
http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-7998-2418-3
http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-7998-2418-3
https://doi.org/10.4018/978-1-7998-2418-3
https://doi.org/10.4018/978-1-7998-2418-3
Zusammenfassung:"This book explores the applications of computational intelligence and other advanced techniques in information security"--
Beschreibung:Description based on title screen (IGI Global, viewed 03/19/2020)
Umfang:1 Online-Ressource (23 PDFs (332 pages))
ISBN:9781799824206
1799824209