Computational Intelligence for Privacy and Security: Introduction

  • David A. Elizondo
  • Agusti Solanas
  • Antoni Martínez-Ballesté
Chapter
Part of the Studies in Computational Intelligence book series (SCI, volume 394)

Abstract

The field of Computational Intelligence relates to the development of biologically inspired computational algorithms. The field includes three main areas: neural networks, genetic algorithms and fuzzy systems. This book presents recent research on the application of Computational Intelligence models, algorithms and technologies to the areas of Privacy and Security. These areas are of vital importance to the safety, prosperity and future development of the world’s economy, underpin trust in all areas of commerce, defence, security and good governance, and are central to the daily lives of many people.

Keywords

Genetic Algorithm Computational Intelligence Computational Intelligence Technique Minimum Description Length Principle Statistical Disclosure Control 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Goldberg, D.: Genetic Algorithms in Search, Optimization, and Machine Learning. Addison-Wesley (1989)Google Scholar
  2. 2.
    Gurney, K.: An Introduction to Neural Networks. Routledge (1997)Google Scholar
  3. 3.
    Haykin, S.: Neural Networks: A Comprehensive Foundation. Prentice-Hall (1999)Google Scholar
  4. 4.
    Masters, T.: Practical Neural Network Recipies in C++. Academic Press (1993)Google Scholar
  5. 5.
    Zadeh, L.A.: Fuzzy sets. Information and Control 8(3), 338–353 (1965)CrossRefMATHMathSciNetGoogle Scholar
  6. 6.
    Zadeh, L.A.: Fuzzy algorithms. Information and Control 12(2), 94–102 (1968)CrossRefMATHMathSciNetGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2012

Authors and Affiliations

  • David A. Elizondo
    • 1
  • Agusti Solanas
    • 2
  • Antoni Martínez-Ballesté
    • 2
  1. 1.Computer Forensics and Security Group, Department of Computer TechnologyDe Montfort UniversityLeicesterUnited Kingdom
  2. 2.Dept. Computer Engineering and MathsUniversitat Rovira i VirgiliTarragonaSpain

Personalised recommendations