Soft computing for security applications : proceedings of ICSCS 2021 / G. Ranganathan, Xavier Fernando, Fuqian Shi, Youssouf El Allioui, editors.
2022
QA76.9.S63 I58 2021
Linked e-resources
Linked Resource
Concurrent users
Unlimited
Authorized users
Authorized users
Document Delivery Supplied
Can lend chapters, not whole ebooks
Details
Title
Soft computing for security applications : proceedings of ICSCS 2021 / G. Ranganathan, Xavier Fernando, Fuqian Shi, Youssouf El Allioui, editors.
Meeting Name
ISBN
9789811653018 (electronic bk.)
9811653011 (electronic bk.)
9789811653001
9811653003
9811653011 (electronic bk.)
9789811653001
9811653003
Published
Singapore : Springer, [2022]
Copyright
©2022
Language
English
Description
1 online resource : illustrations (some color)
Item Number
10.1007/978-981-16-5301-8 doi
Call Number
QA76.9.S63 I58 2021
Dewey Decimal Classification
006.3
Summary
This book features selected papers from the International Conference on Soft Computing for Security Applications (ICSCS 2021), held at Dhirajlal Gandhi College of Technology, Tamil Nadu, India, during June 2021. It covers recent advances in the field of soft computing techniques such as fuzzy logic, neural network, support vector machines, evolutionary computation, machine learning and probabilistic reasoning to solve various real-time challenges. The book presents innovative work by leading academics, researchers, and experts from industry.
Note
International conference proceedings.
Includes author index.
Includes author index.
Access Note
Access limited to authorized users.
Digital File Characteristics
text file
PDF
Source of Description
Online resource; title from PDF title page (SpringerLink, viewed November 4, 2021).
Added Author
Series
Advances in intelligent systems and computing ; 1397. 2194-5365
Available in Other Form
Linked Resources
Record Appears in
Table of Contents
Facial Image Denoising and Reconstruction
One Method for RC5 Algorithms Cryptographic Strength Improving
Multiclass Classication of Firewall Log Files Using Shallow Neural Network for Network Security Applications
On the Possibility of Evasion Attacks with Macro Malware
IoT-Based Smart Crop Field Monitoring and Protection System from Heavy Rainfall Utilizing Raspberry Pi.
One Method for RC5 Algorithms Cryptographic Strength Improving
Multiclass Classication of Firewall Log Files Using Shallow Neural Network for Network Security Applications
On the Possibility of Evasion Attacks with Macro Malware
IoT-Based Smart Crop Field Monitoring and Protection System from Heavy Rainfall Utilizing Raspberry Pi.