Read more
This volume presents recent research in cyber security and reports how organizations can gain competitive advantages by applying the different security techniques in real-world scenarios. The volume provides reviews of cutting-edge technologies, algorithms, applications and insights for bio-inspiring cyber security-based systems. The book will be a valuable companion and comprehensive reference for both postgraduate and senior undergraduate students who are taking a course in cyber security. The volume is organized in self-contained chapters to provide greatest reading flexibility.
List of contents
Bio-Inspiring in Complex Network Security.- Mobile Ad Hoc networks and Key managements.- Biometrics technology and applications.
About the author
Dr. Aboul-Ella Hassanien is a Professor in the Faculty of Computers and Information at Cairo University, Egypt, and Visiting Professor at the College of Business Administration, Kuwait University.§Dr. Aboul-Ella Hassanien is a Professor in the Faculty of Computers and Information at Cairo University, Egypt, and Visiting Professor at the College of Business Administration, Kuwait University.
Summary
This volume presents recent research in cyber security and reports how organizations can gain competitive advantages by applying the different security techniques in real-world scenarios. The volume provides reviews of cutting–edge technologies, algorithms, applications and insights for bio-inspiring cyber security-based systems. The book will be a valuable companion and comprehensive reference for both postgraduate and senior undergraduate students who are taking a course in cyber security. The volume is organized in self-contained chapters to provide greatest reading flexibility.
Additional text
From the book reviews:
“This book on bio-inspiring cyber security and cloud services is part of Springer’s ‘Intelligent Systems Reference Library’ series, which discusses advances in intelligent systems. … The volume tries to highlight the advantages of bio-inspiring cyber security. … This reference book will be an eye-opener to the applications of bio-inspired techniques for cyber security. I recommend it for students and researchers in that area.” (S. V. Nagaraj, Computing Reviews, February, 2015)
Report
From the book reviews:
"This book on bio-inspiring cyber security and cloud services is part of Springer's 'Intelligent Systems Reference Library' series, which discusses advances in intelligent systems. ... The volume tries to highlight the advantages of bio-inspiring cyber security. ... This reference book will be an eye-opener to the applications of bio-inspired techniques for cyber security. I recommend it for students and researchers in that area." (S. V. Nagaraj, Computing Reviews, February, 2015)