Justin Zhan, Marco Carvalho, Gerry V. Dozier, Murat Kantarcioglu, G. B. Lamont, Usa C Veni Madhavan, Andrzej Rucinski, Frederick Sheldon, Mario Strasser, Eth Zürich, Shamik Switzerland, Sural, Alexander Tarakanov, St Petersburg, Qishi Wu, Nan Zhang
{"title":"Symposium on Computational Intelligence in Cyber Security (IEEE CICS 2011)","authors":"Justin Zhan, Marco Carvalho, Gerry V. Dozier, Murat Kantarcioglu, G. B. Lamont, Usa C Veni Madhavan, Andrzej Rucinski, Frederick Sheldon, Mario Strasser, Eth Zürich, Shamik Switzerland, Sural, Alexander Tarakanov, St Petersburg, Qishi Wu, Nan Zhang","doi":"10.1109/cicybs.2011.5949418","DOIUrl":null,"url":null,"abstract":"Computational Intelligence constitutes an umbrella of techniques, has proven to be flexible in decision making in dynamic environment. These techniques typically include Fuzzy Logic, Evolutionary Computation, Intelligent Agent Systems, Neural Networks, Cellular Automata, Artificial Immune Systems and other similar computational models. The use of these techniques allowed building efficient online monitoring tools and robust decision support modules, providing cross-linking solutions to different cyber security applications.","PeriodicalId":436263,"journal":{"name":"2011 IEEE Symposium on Computational Intelligence in Cyber Security (CICS)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2011 IEEE Symposium on Computational Intelligence in Cyber Security (CICS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/cicybs.2011.5949418","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
Computational Intelligence constitutes an umbrella of techniques, has proven to be flexible in decision making in dynamic environment. These techniques typically include Fuzzy Logic, Evolutionary Computation, Intelligent Agent Systems, Neural Networks, Cellular Automata, Artificial Immune Systems and other similar computational models. The use of these techniques allowed building efficient online monitoring tools and robust decision support modules, providing cross-linking solutions to different cyber security applications.