Soft Computing-Based Information Security
Identifikátory výsledku
Kód výsledku v IS VaVaI
<a href="https://www.isvavai.cz/riv?ss=detail&h=RIV%2F70883521%3A28140%2F14%3A43871650" target="_blank" >RIV/70883521:28140/14:43871650 - isvavai.cz</a>
Nalezeny alternativní kódy
RIV/61988987:17310/14:A1501BBH
Výsledek na webu
<a href="http://dx.doi.org/10.4018/978-1-4666-5808-0.ch002" target="_blank" >http://dx.doi.org/10.4018/978-1-4666-5808-0.ch002</a>
DOI - Digital Object Identifier
<a href="http://dx.doi.org/10.4018/978-1-4666-5808-0.ch002" target="_blank" >10.4018/978-1-4666-5808-0.ch002</a>
Alternativní jazyky
Jazyk výsledku
angličtina
Název v původním jazyce
Soft Computing-Based Information Security
Popis výsledku v původním jazyce
This chapter deals with using soft computing methods in information security. It is engaged in two big areas: (1) information security and spam detection and (2) cryptography. The latter field is covered by a proposal of an artificial neural network application, which represents a way of further development in this area. Such a neural network can be practically used in the area of cryptography. It is a new approach, which presents a development of automatic neural networks design. The approach is basedon evolutionary algorithms, which allow evolution of architecture and weights simultaneously. A spam filter is an automated tool to recognize spam so as to prevent its delivery. The chapter contains a survey of current and proposed spam filtering techniques with particular emphasis on how well they work. The primary focus is spam filtering in email, but the role of the spam filter is only one component of a large and complex information universe. The chapter also includes experimental de
Název v anglickém jazyce
Soft Computing-Based Information Security
Popis výsledku anglicky
This chapter deals with using soft computing methods in information security. It is engaged in two big areas: (1) information security and spam detection and (2) cryptography. The latter field is covered by a proposal of an artificial neural network application, which represents a way of further development in this area. Such a neural network can be practically used in the area of cryptography. It is a new approach, which presents a development of automatic neural networks design. The approach is basedon evolutionary algorithms, which allow evolution of architecture and weights simultaneously. A spam filter is an automated tool to recognize spam so as to prevent its delivery. The chapter contains a survey of current and proposed spam filtering techniques with particular emphasis on how well they work. The primary focus is spam filtering in email, but the role of the spam filter is only one component of a large and complex information universe. The chapter also includes experimental de
Klasifikace
Druh
C - Kapitola v odborné knize
CEP obor
IN - Informatika
OECD FORD obor
—
Návaznosti výsledku
Projekt
<a href="/cs/project/ED2.1.00%2F03.0089" target="_blank" >ED2.1.00/03.0089: Centrum bezpečnostních, informačních a pokročilých technologií (CEBIA-Tech)</a><br>
Návaznosti
P - Projekt vyzkumu a vyvoje financovany z verejnych zdroju (s odkazem do CEP)
Ostatní
Rok uplatnění
2014
Kód důvěrnosti údajů
S - Úplné a pravdivé údaje o projektu nepodléhají ochraně podle zvláštních právních předpisů
Údaje specifické pro druh výsledku
Název knihy nebo sborníku
Multidisciplinary Perspectives in Cryptology and Information Security
ISBN
978-1-4666-5808-0
Počet stran výsledku
32
Strana od-do
29-60
Počet stran knihy
443
Název nakladatele
IGI Global
Místo vydání
Hershey
Kód UT WoS kapitoly
—