IRMA-International.org: Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

Computational Intelligence Paradigms: An Overview

Computational Intelligence Paradigms: An Overview
View Sample PDF
Author(s): El-Sayed M. El-Alfy (King Fahd University of Petroleum and Minerals, Saudi Arabia) and Wasan Awad (Ahlia University, Bahrain)
Copyright: 2016
Pages: 27
Source title: Improving Information Security Practices through Computational Intelligence
Source Author(s)/Editor(s): Wasan Awad (Ahlia University, Bahrain), El Sayed M. El-Alfy (King Fahd University of Petroleum and Minerals, Saudi Arabia) and Yousif Al-Bastaki (University of Bahrain, Bahrain)
DOI: 10.4018/978-1-4666-9426-2.ch001

Purchase

View Computational Intelligence Paradigms: An Overview on the publisher's website for pricing and purchasing information.

Abstract

The evolution of communication networks and information systems, to support wireless access, cloud and grid computing, and big data, provides great business opportunities. However, it also generates a new trend of sophisticated network threats and offers several challenges in securing information and systems confidentiality, integrity and availability. The traditional techniques used by security experts are mostly static and lack the much needed characteristics of adaptation and self-organization, computational efficiency and error resilience to deal with evolving attacks. The inherent characteristics of computational intelligence (CI) paradigms provide a promising alternative that has gained popularity resulting in significant applications in information security. There is a plethora of CI paradigms commonly used in this domain including artificial neural networks, evolutionary computing, fuzzy systems, and swarm intelligence. This chapter provides an overview of the widely-recognized CI paradigms and shades the light on some of their potential applications in information security.

Related Content

Review on Intelligent Algorithms for Cyber Security
P. Subashini, M. Krishnaveni, T. T. Dhivyaprabha, R. Shanmugavalli. © 2020. 22 pages.
View Details View Details PDF Full Text View Sample PDF
A Review on Cyber Security Mechanisms Using Machine and Deep Learning Algorithms
Thiyagarajan P.. © 2020. 19 pages.
View Details View Details PDF Full Text View Sample PDF
Review on Machine and Deep Learning Applications for Cyber Security
Thangavel M., Abiramie Shree T. G. R., Priyadharshini P., Saranya T.. © 2020. 22 pages.
View Details View Details PDF Full Text View Sample PDF
Applications of Machine Learning in Cyber Security Domain
Sailesh Suryanarayan Iyer, Sridaran Rajagopal. © 2020. 19 pages.
View Details View Details PDF Full Text View Sample PDF
Applications of Machine Learning in Cyber Security
Charu Virmani, Tanu Choudhary, Anuradha Pillai, Manisha Rani. © 2020. 21 pages.
View Details View Details PDF Full Text View Sample PDF
Malware and Anomaly Detection Using Machine Learning and Deep Learning Methods
Valliammal Narayan, Barani Shaju. © 2020. 28 pages.
View Details View Details PDF Full Text View Sample PDF
Cyber Threats Detection and Mitigation Using Machine Learning
Vaishnavi Ambalavanan, Shanthi Bala P.. © 2020. 18 pages.
View Details View Details PDF Full Text View Sample PDF
Body Bottom