This volume presents recent research in cyber security and reports how organizations can gain competitive advantages by applying the different security techniques in real-world scenarios. The volume provides reviews of cuttingedge technologies, algorithms, applications and insights for bio-inspiring cyber security-based systems. The book will be a valuable companion and comprehensive reference for both postgraduate and senior undergraduate students who are taking a course in cyber security. The volume is organized in self-contained chapters to provide greatest reading flexibility.
Bio-Inspiring in Complex Network Security.- Mobile Ad Hoc networks and Key managements.- Biometrics technology and applications.
From the book reviews:
This book on bio-inspiring cyber security and cloud services is part of Springers Intelligent Systems Reference Library series, which discusses advances in intelligent systems. & The volume tries to highlight the advantages of bio-inspiring cyber security. & This reference book will be an eye-opener to the applications of bio-inspired techniques for cyber security. I recommend it for students and researchers in that area. (S. V. Nagaraj, Computing Reviews, February, 2015)
This volume presents recent research in cyber security, and reports how organizations can gain competitive advantages by applying the different security techniques in real-world scenarios. The volume provides reviews of cuttingedge technologies, algorithms, applications and insights for bio-inspiring cyber security-based systems. The book will be a valuable companion and comprehensive reference for both postgraduate and senior undergraduate students who are taking a course in cyber security. The volume is organized in self-contained chapters to provide greatest reading flexibility.
?
Latest research on Bio-inspired Systems in Cyber Security
Valuable col“‰