Intelligence and security informatics isi has become an important research field after the tragic event of september 11 2001 researchers in computer and information science have a unique opportunity and obligation to contribute to international security via advanced it research. P j hu c lin and h chen user acceptance of intelligence and security informatics technology a study of coplink journal of the american society for information science and technology special issue on intelligence and security informatics volume 56 number 3 pages 235 244 2005. Studies in computational intelligence studies in computational intelligence springerlink applications to music information retrieval and psychophysiology studies in computational intelligence vol intelligent data mining techniques and applications studies in computational intelligence vol 5 springer 2005 isbn 978 3 540 26256 5 . Computational intelligence techniques such as artificial neural network fuzzy logic systems or unsupervised clustering are well established and widely used and are capable of machine learning pattern recognition or non linear intelligent control. The series studies in computational intelligence sci publishes new develop and arun lakhotia provides an overview of machine learning techniques and their application to detect different forms of malware the similarities between chapter an acp based approach to intelligence and security informatics
How it works:
1. Register a Free 1 month Trial Account.
2. Download as many books as you like ( Personal use )
3. No Commitment. Cancel anytime.
4. Join Over 100.000 Happy Readers.
5. That's it. What you waiting for? Sign Up and Get Your Books.