Related Books
Language: en
Pages: 364
Pages: 364
Type: BOOK - Published: 2013-06-18 - Publisher: CRC Press
With the rapid rise in the ubiquity and sophistication of Internet technology and the accompanying growth in the number of network attacks, network intrusion de
Language: en
Pages: 278
Pages: 278
Type: BOOK - Published: 2017-09-03 - Publisher: Springer
This indispensable text/reference presents a comprehensive overview on the detection and prevention of anomalies in computer network traffic, from coverage of t
Language: en
Pages: 492
Pages: 492
Type: BOOK - Published: 2011-04-28 - Publisher: Springer Science & Business Media
The two-volume set LNCS 6640 and 6641 constitutes the refereed proceedings of the 10th International IFIP TC 6 Networking Conference held in Valencia, Spain, in
Language: en
Pages: 254
Pages: 254
Type: BOOK - Published: 1997 - Publisher: World Scientific
Ever since fuzzy logic was introduced by Lotfi Zadeh in the mid-sixties and genetic algorithms by John Holland in the early seventies, these two fields widely b
Language: en
Pages: 70
Pages: 70
Type: BOOK - Published: 2018-10-31 - Publisher: BoD – Books on Demand
In the field of computers and with the advent of the internet, the topic of secure communication has gained significant importance. The theory of cryptography a