page
Submitted by Daniel Wolf on Tue, 11/25/2014 - 10:28pm
Expert systems based on fuzzy logic hold promise for solving many problems. The research presented here address black hole attacks in wireless sensor networks, a fuzzy tool for conducting information security risk assessments, and expert code generator, and other topics. These works were presented between January and August of 2014.
page
Submitted by Daniel Wolf on Tue, 11/25/2014 - 10:23pm
Edge detection is an important issue in image and signal processing. The work cited here includes an overview of the topic, several approaches, and applications for radar and sonar. These works were presented or published between January and August of 2014.
page
Submitted by Daniel Wolf on Tue, 11/25/2014 - 4:24pm
Computational Intelligence
page
Submitted by Daniel Wolf on Tue, 11/25/2014 - 4:19pm
Data protection has distinguished between data in motion and data at rest for more than a decade. Research into these areas continues with the proliferation of cloud and mobile technologies. The articles cited here, separated by motion and rest, were offered in the first half of 2014. Data in Motion:
page
Submitted by Daniel Wolf on Tue, 11/25/2014 - 4:14pm
According to Wikipedia, "Control theory is an interdisciplinary branch of engineering and mathematics that deals with the behavior of dynamical systems with inputs, and how their behavior is modified by feedback." In cyber security, control theory offers methods and approaches to potentially solve hard problems. The articles cited here look at both theory and applications and were presented in the first half of 2014.
page
Submitted by Daniel Wolf on Sun, 11/23/2014 - 8:45pm
In photonics, confinement is important to loss avoidance. In quantum theory, it relates to energy levels. The articles cited here cover both concepts and were presented or published in the first half of 2014.
page
Submitted by Daniel Wolf on Sun, 11/23/2014 - 8:40pm
Compressive sampling (or compressive sensing) is an important theory in signal processing. It allows efficient acquisition and reconstruction of a signal and may also be the basis for user identification. The works cited here were published or presented between January and August of 2014.
page
Submitted by Daniel Wolf on Sun, 11/23/2014 - 8:29pm
Much of software security focuses on applications, but compiler security should also be an area of concern. Compilers can "correct" secure coding in the name of efficient processing. The works cited here look at various approaches and issues in compiler security. These articles appeared in the first half of 2014.
page
Submitted by Daniel Wolf on Sun, 11/23/2014 - 8:14pm
Coding theory is one of the essential pieces of information theory. More important, coding theory is a core element in cryptography. The research work cited here looks at signal processing, crowdsourcing, matroid theory, WOM codes, and the N-P hard problem. These works were presented or published between January and August of 2014.
page
Submitted by Daniel Wolf on Sun, 11/23/2014 - 8:06pm
Cloud security is one of the prime topics for theoretical and applied research today. The works cited here cover a wide range of topics and methods for addressing cloud security issues. They were presented or published between January and August of 2014.