Improving Information Security Practices through Computational Intelligence

Improving Information Security Practices through Computational Intelligence
Author: Awad, Wasan Shaker
Publisher: IGI Global
Total Pages: 348
Release: 2015-08-26
Genre: Computers
ISBN: 1466694270

The recent explosion in complex global networking architectures has spurred a concomitant rise in the need for robust information security. Further, as computing power increases exponentially with every passing year, so do the number of proposed cryptographic schemata for improving and ensuring the encryption integrity of cutting-edge infosec protocols. Improving Information Security Practices through Computational Intelligence presents an overview of the latest and greatest research in the field, touching on such topics as cryptology, stream ciphers, and intrusion detection, and providing new insights to an audience of students, teachers, and entry-level researchers working in computational intelligence, information security, and security engineering.

Big Data Analytics and Computational Intelligence for Cybersecurity

Big Data Analytics and Computational Intelligence for Cybersecurity
Author: Mariya Ouaissa
Publisher: Springer Nature
Total Pages: 336
Release: 2022-09-01
Genre: Computers
ISBN: 303105752X

This book presents a collection of state-of-the-art artificial intelligence and big data analytics approaches to cybersecurity intelligence. It illustrates the latest trends in AI/ML-based strategic defense mechanisms against malware, vulnerabilities, cyber threats, as well as proactive countermeasures. It also introduces other trending technologies, such as blockchain, SDN, and IoT, and discusses their possible impact on improving security. The book discusses the convergence of AI/ML and big data in cybersecurity by providing an overview of theoretical, practical, and simulation concepts of computational intelligence and big data analytics used in different approaches of security. It also displays solutions that will help analyze complex patterns in user data and ultimately improve productivity. This book can be a source for researchers, students, and practitioners interested in the fields of artificial intelligence, cybersecurity, data analytics, and recent trends of networks.

Artificial Intelligence for Cyber Security: Methods, Issues and Possible Horizons or Opportunities

Artificial Intelligence for Cyber Security: Methods, Issues and Possible Horizons or Opportunities
Author: Sanjay Misra
Publisher: Springer Nature
Total Pages: 467
Release: 2021-05-31
Genre: Technology & Engineering
ISBN: 3030722368

This book provides stepwise discussion, exhaustive literature review, detailed analysis and discussion, rigorous experimentation results (using several analytics tools), and an application-oriented approach that can be demonstrated with respect to data analytics using artificial intelligence to make systems stronger (i.e., impossible to breach). We can see many serious cyber breaches on Government databases or public profiles at online social networking in the recent decade. Today artificial intelligence or machine learning is redefining every aspect of cyber security. From improving organizations’ ability to anticipate and thwart breaches, protecting the proliferating number of threat surfaces with Zero Trust Security frameworks to making passwords obsolete, AI and machine learning are essential to securing the perimeters of any business. The book is useful for researchers, academics, industry players, data engineers, data scientists, governmental organizations, and non-governmental organizations.

Implementing Computational Intelligence Techniques for Security Systems Design

Implementing Computational Intelligence Techniques for Security Systems Design
Author: Albastaki, Yousif Abdullatif
Publisher: IGI Global
Total Pages: 332
Release: 2020-02-14
Genre: Computers
ISBN: 1799824209

Recently, cryptology problems, such as designing good cryptographic systems and analyzing them, have been challenging researchers. Many algorithms that take advantage of approaches based on computational intelligence techniques, such as genetic algorithms, genetic programming, and so on, have been proposed to solve these issues. Implementing Computational Intelligence Techniques for Security Systems Design is an essential research book that explores the application of computational intelligence and other advanced techniques in information security, which will contribute to a better understanding of the factors that influence successful security systems design. Featuring a range of topics such as encryption, self-healing systems, and cyber fraud, this book is ideal for security analysts, IT specialists, computer engineers, software developers, technologists, academicians, researchers, practitioners, and students.

Proceedings of the International Workshop on Computational Intelligence in Security for Information Systems CISIS 2008

Proceedings of the International Workshop on Computational Intelligence in Security for Information Systems CISIS 2008
Author: Emilio Corchado
Publisher: Springer Science & Business Media
Total Pages: 331
Release: 2008-10-24
Genre: Computers
ISBN: 3540881816

The research scenario in advanced systems for protecting critical infrastructures and for deeply networked information tools highlights a growing link between security issues and the need for intelligent processing abilities in the area of information s- tems. To face the ever-evolving nature of cyber-threats, monitoring systems must have adaptive capabilities for continuous adjustment and timely, effective response to modifications in the environment. Moreover, the risks of improper access pose the need for advanced identification methods, including protocols to enforce comput- security policies and biometry-related technologies for physical authentication. C- putational Intelligence methods offer a wide variety of approaches that can be fruitful in those areas, and can play a crucial role in the adaptive process by their ability to learn empirically and adapt a system’s behaviour accordingly. The International Workshop on Computational Intelligence for Security in Inf- mation Systems (CISIS) proposes a meeting ground to the various communities - volved in building intelligent systems for security, namely: information security, data mining, adaptive learning methods and soft computing among others. The main goal is to allow experts and researchers to assess the benefits of learning methods in the data-mining area for information-security applications. The Workshop offers the opportunity to interact with the leading industries actively involved in the critical area of security, and have a picture of the current solutions adopted in practical domains. This volume of Advances in Soft Computing contains accepted papers presented at CISIS’08, which was held in Genova, Italy, on October 23rd–24th, 2008.

Computational Intelligence in Security for Information Systems 2010

Computational Intelligence in Security for Information Systems 2010
Author: Álvaro Herrero
Publisher: Springer Science & Business Media
Total Pages: 241
Release: 2010-10-07
Genre: Technology & Engineering
ISBN: 3642166261

rd The 3 International Conference on Computational Intelligence in Security for Information Systems (CISIS 2010) provided a broad and interdisciplinary forum to present the most recent developments in several very active scientific areas such as Machine Learning, Infrastructure Protection, Intelligent Methods in Energy and Transportation, Network Security, Biometry, Cryptography, High-performance and Grid Computing, and Industrial Perspective among others. The global purpose of CISIS series of conferences has been to form a broad and interdisciplinary meeting ground offering the opportunity to interact with the leading research team and industries actively involved in the critical area of security, and have a picture of the current solutions adopted in practical domains. This volume of Advances in Intelligence and Soft Computing contains accepted papers presented at CISIS 2010, which was held in León, Spain, on November 11–12, 2010. CISIS 2010 received over 50 technical submissions. After a thorough peer-review process, the International Program Committee - lected 25 papers which are published in this conference proceedings. This allowed the Scientific Committee to verify the vital and crucial nature of the topics - volved in the event, and resulted in an acceptance rate close to 50% of the ori- nally submitted manuscripts.

Research Anthology on Artificial Intelligence Applications in Security

Research Anthology on Artificial Intelligence Applications in Security
Author: Management Association, Information Resources
Publisher: IGI Global
Total Pages: 2253
Release: 2020-11-27
Genre: Computers
ISBN: 1799877485

As industries are rapidly being digitalized and information is being more heavily stored and transmitted online, the security of information has become a top priority in securing the use of online networks as a safe and effective platform. With the vast and diverse potential of artificial intelligence (AI) applications, it has become easier than ever to identify cyber vulnerabilities, potential threats, and the identification of solutions to these unique problems. The latest tools and technologies for AI applications have untapped potential that conventional systems and human security systems cannot meet, leading AI to be a frontrunner in the fight against malware, cyber-attacks, and various security issues. However, even with the tremendous progress AI has made within the sphere of security, it’s important to understand the impacts, implications, and critical issues and challenges of AI applications along with the many benefits and emerging trends in this essential field of security-based research. Research Anthology on Artificial Intelligence Applications in Security seeks to address the fundamental advancements and technologies being used in AI applications for the security of digital data and information. The included chapters cover a wide range of topics related to AI in security stemming from the development and design of these applications, the latest tools and technologies, as well as the utilization of AI and what challenges and impacts have been discovered along the way. This resource work is a critical exploration of the latest research on security and an overview of how AI has impacted the field and will continue to advance as an essential tool for security, safety, and privacy online. This book is ideally intended for cyber security analysts, computer engineers, IT specialists, practitioners, stakeholders, researchers, academicians, and students interested in AI applications in the realm of security research.

Cybernetics and Automation Control Theory Methods in Intelligent Algorithms

Cybernetics and Automation Control Theory Methods in Intelligent Algorithms
Author: Radek Silhavy
Publisher: Springer
Total Pages: 370
Release: 2019-05-09
Genre: Technology & Engineering
ISBN: 3030198138

This book discusses novel intelligent-system algorithms and methods in cybernetics, presenting new approaches in the field of cybernetics and automation control theory. It constitutes the proceedings of the Cybernetics and Automation Control Theory Methods in Intelligent Algorithms Section of the 8th Computer Science On-line Conference 2019 (CSOC 2019), held on-line in April 2019.

Security and Privacy Management, Techniques, and Protocols

Security and Privacy Management, Techniques, and Protocols
Author: Maleh, Yassine
Publisher: IGI Global
Total Pages: 448
Release: 2018-04-06
Genre: Computers
ISBN: 1522555846

The security of information and communication technology is a high priority for any organization. By examining the current problems and challenges this domain is facing, more efficient strategies can be established to safeguard personal information against invasive pressures. Security and Privacy Management, Techniques, and Protocols is a critical scholarly resource that examines emerging protocols and methods for effective management of information security at organizations. Featuring coverage on a broad range of topics such as cryptography, secure routing protocols, and wireless security, this book is geared towards academicians, engineers, IT specialists, researchers, and students seeking current research on security and privacy management.

Security Management in Mobile Cloud Computing

Security Management in Mobile Cloud Computing
Author: Munir, Kashif
Publisher: IGI Global
Total Pages: 266
Release: 2016-08-01
Genre: Computers
ISBN: 1522506039

Mobile Cloud Computing (MCC) has experienced explosive growth and is expected to continue to rise in popularity as new services and applications become available. As with any new technology, security issues continue to be a concern and developing effective methods to protect sensitive information and data on the cloud is imperative. Security Management in Mobile Cloud Computing explores the difficulties and challenges of securing user data and information on mobile cloud platforms. Investigating a variety of protocols and architectures that can be used to design, create, and develop security mechanisms, this publication is an essential resource for IT specialists, researchers, and graduate-level students interested in mobile cloud computing concepts and security.