Sign In | Not yet a member? | Submit your article
 
Home   Technical   Study   Novel   Nonfiction   Health   Tutorial   Entertainment   Business   Magazine   Arts & Design   Audiobooks & Video Training   Cultures & Languages   Family & Home   Law & Politics   Lyrics & Music   Software Related   eBook Torrents   Uncategorized  
Letters: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z

Computational Intelligence in Security for Information Systems
Computational Intelligence in Security for Information Systems
Date: 26 April 2011, 01:49

Free Download Now     Free register and download UseNet downloader, then you can FREE Download from UseNet.

    Download without Limit " Computational Intelligence in Security for Information Systems " from UseNet for FREE!
The Second International Workshop on Computational Intelligence for Security in Information Systems (CISIS’09) presented the most recent developments in the dynamically expanding realm of several fields such as Data Mining and Intelligence, Infrastructure Protection, Network Security, Biometry and Industrial Perspectives.
The International Workshop on Computational Intelligence for Security in Information Systems (CISIS) proposes a forum to the different communities related to the field of intelligent systems for security. The global purpose of CISIS conferences has been to form a broad and interdisciplinary meeting ground offering the opportunity to interact with the leading industries actively involved in the critical area of security, and have a picture of the current solutions adopted in practical domains.
This volume of Advances in Intelligent and Soft Computing contains accepted papers presented at CISIS’09, which was held in Burgos, Spain, on September 23rd-26th, 2009.

DISCLAIMER:

This site does not store Computational Intelligence in Security for Information Systems on its server. We only index and link to Computational Intelligence in Security for Information Systems provided by other sites. Please contact the content providers to delete Computational Intelligence in Security for Information Systems if any and email us, we'll remove relevant links or contents immediately.



Comments

Comments (0) All

Verify: Verify

    Sign In   Not yet a member?


Popular searches