Soft Computing-Based Information Security
The result's identifiers
Result code in IS VaVaI
<a href="https://www.isvavai.cz/riv?ss=detail&h=RIV%2F70883521%3A28140%2F14%3A43871650" target="_blank" >RIV/70883521:28140/14:43871650 - isvavai.cz</a>
Alternative codes found
RIV/61988987:17310/14:A1501BBH
Result on the web
<a href="http://dx.doi.org/10.4018/978-1-4666-5808-0.ch002" target="_blank" >http://dx.doi.org/10.4018/978-1-4666-5808-0.ch002</a>
DOI - Digital Object Identifier
<a href="http://dx.doi.org/10.4018/978-1-4666-5808-0.ch002" target="_blank" >10.4018/978-1-4666-5808-0.ch002</a>
Alternative languages
Result language
angličtina
Original language name
Soft Computing-Based Information Security
Original language description
This chapter deals with using soft computing methods in information security. It is engaged in two big areas: (1) information security and spam detection and (2) cryptography. The latter field is covered by a proposal of an artificial neural network application, which represents a way of further development in this area. Such a neural network can be practically used in the area of cryptography. It is a new approach, which presents a development of automatic neural networks design. The approach is basedon evolutionary algorithms, which allow evolution of architecture and weights simultaneously. A spam filter is an automated tool to recognize spam so as to prevent its delivery. The chapter contains a survey of current and proposed spam filtering techniques with particular emphasis on how well they work. The primary focus is spam filtering in email, but the role of the spam filter is only one component of a large and complex information universe. The chapter also includes experimental de
Czech name
—
Czech description
—
Classification
Type
C - Chapter in a specialist book
CEP classification
IN - Informatics
OECD FORD branch
—
Result continuities
Project
<a href="/en/project/ED2.1.00%2F03.0089" target="_blank" >ED2.1.00/03.0089: The Centre of Security, Information and Advanced Technologies (CEBIA-Tech)</a><br>
Continuities
P - Projekt vyzkumu a vyvoje financovany z verejnych zdroju (s odkazem do CEP)
Others
Publication year
2014
Confidentiality
S - Úplné a pravdivé údaje o projektu nepodléhají ochraně podle zvláštních právních předpisů
Data specific for result type
Book/collection name
Multidisciplinary Perspectives in Cryptology and Information Security
ISBN
978-1-4666-5808-0
Number of pages of the result
32
Pages from-to
29-60
Number of pages of the book
443
Publisher name
IGI Global
Place of publication
Hershey
UT code for WoS chapter
—