Cybersecurity applications of computational intelligence

被引:0
|
作者
Álvaro Herrero
Emilio Corchado
Michal Wozniak
Sung Bae-Cho
Slobodan Petrović
机构
[1] Universidad de Burgos,Grupo de Inteligencia Computacional Aplicada (GICAP), Departamento de Ingeniería Informática, Escuela Politécnica Superior
[2] Universidad de Salamanca Plaza de La Merced,Departamento de Informática Y Automática
[3] Wroclaw University of Science and Technology,Department of Systems and Computer Networks, Faculty of Electronics
[4] Yonsei University,Department of Computer Science
[5] Norwegian University of Science and Technology,Department of Information Security and Communication Technology, Faculty of Information Technology and Electrical Engineering
来源
关键词
D O I
暂无
中图分类号
学科分类号
摘要
引用
收藏
页码:20447 / 20448
页数:1
相关论文
共 50 条
  • [1] Cybersecurity applications of computational intelligence
    Herrero, Alvaro
    Corchado, Emilio
    Wozniak, Michal
    Bae-Cho, Sung
    Petrovic, Slobodan
    [J]. NEURAL COMPUTING & APPLICATIONS, 2022, 34 (23): : 20447 - 20448
  • [2] Computational Intelligence and Neuromorphic Computing Potential for Cybersecurity Applications
    Pino, Robinson E.
    Shevenell, Michael J.
    Cam, Hasan
    Mouallem, Pierre
    Shumaker, Justin L.
    Edwards, Arthur H.
    [J]. MACHINE INTELLIGENCE AND BIO-INSPIRED COMPUTATION: THEORY AND APPLICATIONS VII, 2013, 8751
  • [3] Computational intelligence applied to cybersecurity
    Herrero, Alvaro
    Urda, Daniel
    Sedano, Javier
    Quintian, Hector
    Corchado, Emilio
    [J]. EXPERT SYSTEMS, 2022, 39 (09)
  • [4] Artificial Intelligence Applications in Cybersecurity
    Kabbas, Azzah
    Alharthi, Atheer
    Munshi, Asmaa
    [J]. INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2020, 20 (02): : 120 - 124
  • [5] Computational Intelligence Enabled Cybersecurity for the Internet of Things
    Zhao, Shanshan
    Li, Shancang
    Qi, Lianyong
    Xu, Li Da
    [J]. IEEE TRANSACTIONS ON EMERGING TOPICS IN COMPUTATIONAL INTELLIGENCE, 2020, 4 (05): : 666 - 674
  • [6] An Overview of Artificial Intelligence Applications in Cybersecurity Domains
    Lumpatki, Sairaj S.
    Patwardhan, Swapnaja
    [J]. SMART TRENDS IN COMPUTING AND COMMUNICATIONS, VOL 3, SMARTCOM 2024, 2024, 947 : 11 - 24
  • [7] APPLICATIONS OF COMPUTATIONAL INTELLIGENCE
    Selvaraj, Henry
    Arivazhagan, S.
    [J]. INTERNATIONAL JOURNAL OF COMPUTATIONAL INTELLIGENCE AND APPLICATIONS, 2009, 8 (02) : III - IV
  • [8] Three Ethical Challenges of Applications of Artificial Intelligence in Cybersecurity
    Mariarosaria Taddeo
    [J]. Minds and Machines, 2019, 29 : 187 - 191
  • [9] Three Ethical Challenges of Applications of Artificial Intelligence in Cybersecurity
    Taddeo, Mariarosaria
    [J]. MINDS AND MACHINES, 2019, 29 (02) : 187 - 191
  • [10] Business applications and computational intelligence
    [J]. Information Technology Newsletter, 2006, 17 (01):