IRMA-International.org: Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

Applications of Computational Intelligence in Computing Security: A Review

Applications of Computational Intelligence in Computing Security: A Review
View Sample PDF
Author(s): Yousif Abdullatif Albastaki (Ahlia University, Bahrain)
Copyright: 2020
Pages: 22
Source title: Implementing Computational Intelligence Techniques for Security Systems Design
Source Author(s)/Editor(s): Yousif Abdullatif Albastaki (Ahlia University, Bahrain) and Wasan Awad (Ahlia University, Bahrain)
DOI: 10.4018/978-1-7998-2418-3.ch001

Purchase

View Applications of Computational Intelligence in Computing Security: A Review on the publisher's website for pricing and purchasing information.

Abstract

This chapter is an introductory chapter that attempts to highlight the concept of computational intelligence and its application in the field of computing security; it starts with a brief description of the underlying principles of artificial intelligence and discusses the role of computational intelligence in overcoming conventional artificial intelligence limitations. The chapter then briefly introduces various tools or components of computational intelligence such as neural networks, evolutionary computing, swarm intelligence, artificial immune systems, and fuzzy systems. The application of each component in the field of computing security is highlighted.

Related Content

Kapil Sethi, Shweta Chauhan, Varun Jaiswal. © 2021. 29 pages.
Mani Arora. © 2021. 19 pages.
Poonam jatwani, Pradeep Tomar, Vandana Dhingra. © 2021. 13 pages.
Chander Diwaker, Atul Sharma, Pradeep Tomar. © 2021. 11 pages.
Libi Shen, Irene Chen, Anne Grey, Anchi Su. © 2021. 26 pages.
Latika Kharb, Prateek Singh. © 2021. 25 pages.
Amit Mishra. © 2021. 10 pages.
Body Bottom