Computational intelligence, cyber security and computational models [electronic resource] : proceedings of ICC3, 2013 / G. Sai Sundara Krishnan...[and 5 more], editors.
2014
Q342
Formats
| Format | |
|---|---|
| BibTeX | |
| MARCXML | |
| TextMARC | |
| MARC | |
| DublinCore | |
| EndNote | |
| NLM | |
| RefWorks | |
| RIS |
Cite
Citation
Linked e-resources
Linked Resource
Details
Title
Computational intelligence, cyber security and computational models [electronic resource] : proceedings of ICC3, 2013 / G. Sai Sundara Krishnan...[and 5 more], editors.
ISBN
9788132216803 electronic book
8132216806 electronic book
9788132216797
8132216792
8132216806 electronic book
9788132216797
8132216792
Published
New Delhi : Springer, 2014.
Language
English
Description
1 online resource (xv, 416 pages) : illustrations.
Item Number
10.1007/978-81-322-1680-3 doi
Call Number
Q342
Dewey Decimal Classification
006.3
Summary
This book contains cutting-edge research material presented by researchers, engineers, developers, and practitioners from academia and industry at the International Conference on Computational Intelligence, Cyber Security and Computational Models (ICC3) organized by PSG College of Technology, Coimbatore, India during December 19-21, 2013. The materials in the book include theory and applications for design, analysis, and modeling of computational intelligence and security. The book will be useful material for students, researchers, professionals, and academicians. It will help in understanding current research trends and findings and future scope of research in computational intelligence, cyber security, and computational models.
Note
Includes index.
Bibliography, etc. Note
Includes bibliographical references and index.
Access Note
Access limited to authorized users.
Source of Description
Description based on online resource; title from PDF title page (SpringerLink, viewed December 3, 2013).
Added Author
Series
Advances in intelligent systems and computing ; 246. 2194-5357
Available in Other Form
Linked Resources
Record Appears in
Table of Contents
Part I. Keynote address
part II. Computational intelligence
part III. Cyber security
part IV. Computational models
part V. Short papers.
part II. Computational intelligence
part III. Cyber security
part IV. Computational models
part V. Short papers.