All

What are you looking for?

All
Projects
Results
Organizations

Quick search

  • Projects supported by TA ČR
  • Excellent projects
  • Projects with the highest public support
  • Current projects

Smart search

  • That is how I find a specific +word
  • That is how I leave the -word out of the results
  • “That is how I can find the whole phrase”

Soft Computing-Based Information Security

The result's identifiers

  • Result code in IS VaVaI

    <a href="https://www.isvavai.cz/riv?ss=detail&h=RIV%2F70883521%3A28140%2F14%3A43871650" target="_blank" >RIV/70883521:28140/14:43871650 - isvavai.cz</a>

  • Alternative codes found

    RIV/61988987:17310/14:A1501BBH

  • Result on the web

    <a href="http://dx.doi.org/10.4018/978-1-4666-5808-0.ch002" target="_blank" >http://dx.doi.org/10.4018/978-1-4666-5808-0.ch002</a>

  • DOI - Digital Object Identifier

    <a href="http://dx.doi.org/10.4018/978-1-4666-5808-0.ch002" target="_blank" >10.4018/978-1-4666-5808-0.ch002</a>

Alternative languages

  • Result language

    angličtina

  • Original language name

    Soft Computing-Based Information Security

  • Original language description

    This chapter deals with using soft computing methods in information security. It is engaged in two big areas: (1) information security and spam detection and (2) cryptography. The latter field is covered by a proposal of an artificial neural network application, which represents a way of further development in this area. Such a neural network can be practically used in the area of cryptography. It is a new approach, which presents a development of automatic neural networks design. The approach is basedon evolutionary algorithms, which allow evolution of architecture and weights simultaneously. A spam filter is an automated tool to recognize spam so as to prevent its delivery. The chapter contains a survey of current and proposed spam filtering techniques with particular emphasis on how well they work. The primary focus is spam filtering in email, but the role of the spam filter is only one component of a large and complex information universe. The chapter also includes experimental de

  • Czech name

  • Czech description

Classification

  • Type

    C - Chapter in a specialist book

  • CEP classification

    IN - Informatics

  • OECD FORD branch

Result continuities

  • Project

    <a href="/en/project/ED2.1.00%2F03.0089" target="_blank" >ED2.1.00/03.0089: The Centre of Security, Information and Advanced Technologies (CEBIA-Tech)</a><br>

  • Continuities

    P - Projekt vyzkumu a vyvoje financovany z verejnych zdroju (s odkazem do CEP)

Others

  • Publication year

    2014

  • Confidentiality

    S - Úplné a pravdivé údaje o projektu nepodléhají ochraně podle zvláštních právních předpisů

Data specific for result type

  • Book/collection name

    Multidisciplinary Perspectives in Cryptology and Information Security

  • ISBN

    978-1-4666-5808-0

  • Number of pages of the result

    32

  • Pages from-to

    29-60

  • Number of pages of the book

    443

  • Publisher name

    IGI Global

  • Place of publication

    Hershey

  • UT code for WoS chapter