
Advancing Computational Intelligence Techniques for Security Systems Design
- 182 pages
- English
- ePUB (mobile friendly)
- Available on iOS & Android
Advancing Computational Intelligence Techniques for Security Systems Design
About this book
Security systems have become an integral part of the building and large complex setups, and intervention of the computational intelligence (CI) paradigm plays an important role in security system architecture. This book covers both theoretical contributions and practical applications in security system design by applying the Internet of Things (IoT) and CI. It further explains the application of IoT in the design of modern security systems and how IoT blended with computational intel- ligence can make any security system improved and realizable.
Key features:
- Focuses on the computational intelligence techniques of security system design
- Covers applications and algorithms of discussed computational intelligence techniques
- Includes convergence-based and enterprise integrated security systems with their applications
- Explains emerging laws, policies, and tools affecting the landscape of cyber security
- Discusses application of sensors toward the design of security systems
This book will be useful for graduate students and researchers in electrical, computer
engineering, security system design and engineering.
Tools to learn more effectively

Saving Books

Keyword Search

Annotating Text

Listen to it instead
Information
Table of contents
- Cover
- Half-Title
- Series
- Title
- Copyright
- Contents
- Preface
- Editors
- Contributors
- Chapter 1 Analysis of Various Security Defense Frameworks in Different Application Areas of Cyber-Physical Systems
- Chapter 2 Role and Development of Security Architecture and Models in Software Systems
- Chapter 3 The Role of IoT in the Design of a Security System
- Chapter 4 IoT-Tangle Enhanced Security Systems
- Chapter 5 Recent Trends in 5G and Machine Learning, Challenges, and Opportunities
- Chapter 6 Hardware Trojans in Microfluidic Biochips: Principles and Practice
- Chapter 7 Benefits and Risks of Cloud Computing
- Chapter 8 Intrusion Detection Systems for Trending Cyberattacks
- Chapter 9 War of Control Hijacking: Attacks and Defenses
- Chapter 10 IoT Based Lightweight Cryptographic Schemes in Smart Healthcare
- Index
Frequently asked questions
- Essential is ideal for learners and professionals who enjoy exploring a wide range of subjects. Access the Essential Library with 800,000+ trusted titles and best-sellers across business, personal growth, and the humanities. Includes unlimited reading time and Standard Read Aloud voice.
- Complete: Perfect for advanced learners and researchers needing full, unrestricted access. Unlock 1.4M+ books across hundreds of subjects, including academic and specialized titles. The Complete Plan also includes advanced features like Premium Read Aloud and Research Assistant.
Please note we cannot support devices running on iOS 13 and Android 7 or earlier. Learn more about using the app