Abstract :
The following topics are dealt with: access control; wireless networks; hybrid-network intrusion detection system; cloud computing; database audit; forensic analysis algorithm; complex networks; resilient hybrid overlay model; smart grid; malware classification; author identification; image visualization based malware detection; steganography; audio encryption; computational intelligence; static software checking; and memory corruption vulnerabilities.
Keywords :
artificial intelligence; cloud computing; data visualisation; database management systems; program verification; radio networks; security of data; smart power grids; steganography; access control; audio encryption; author identification; cloud computing; complex networks; computational intelligence; database audit; forensic analysis algorithm; hybrid-network intrusion detection system; image visualization; malware classification; malware detection; memory corruption vulnerabilities; resilient hybrid overlay model; smart grid; static software checking; steganography; wireless networks;
Conference_Titel :
Computational Intelligence in Cyber Security (CICS), 2013 IEEE Symposium on
Conference_Location :
Singapore
DOI :
10.1109/CICYBS.2013.6597197