DocumentCode
633103
Title
[Front matter]
fYear
2013
fDate
16-19 April 2013
Abstract
The following topics are dealt with: access control; wireless networks; hybrid-network intrusion detection system; cloud computing; database audit; forensic analysis algorithm; complex networks; resilient hybrid overlay model; smart grid; malware classification; author identification; image visualization based malware detection; steganography; audio encryption; computational intelligence; static software checking; and memory corruption vulnerabilities.
Keywords
artificial intelligence; cloud computing; data visualisation; database management systems; program verification; radio networks; security of data; smart power grids; steganography; access control; audio encryption; author identification; cloud computing; complex networks; computational intelligence; database audit; forensic analysis algorithm; hybrid-network intrusion detection system; image visualization; malware classification; malware detection; memory corruption vulnerabilities; resilient hybrid overlay model; smart grid; static software checking; steganography; wireless networks;
fLanguage
English
Publisher
ieee
Conference_Titel
Computational Intelligence in Cyber Security (CICS), 2013 IEEE Symposium on
Conference_Location
Singapore
Type
conf
DOI
10.1109/CICYBS.2013.6597197
Filename
6597197
Link To Document