Recent Advances in Computational Intelligence in Defense and Security

This document was uploaded by one of our users. The uploader already confirmed that they had the permission to publish it. If you are author/publisher or own the copyright of this documents, please report to us by using this DMCA report form.

Simply click on the Download Book button.

Yes, Book downloads on Ebookily are 100% Free.

Sometimes the book is free on Amazon As well, so go ahead and hit "Search on Amazon"

This volume is an initiative undertaken by the IEEE Computational Intelligence Society’s Task Force on Security, Surveillance and Defense to consolidate and disseminate the role of CI techniques in the design, development and deployment of security and defense solutions. Applications range from the detection of buried explosive hazards in a battlefield to the control of unmanned underwater vehicles, the delivery of superior video analytics for protecting critical infrastructures or the development of stronger intrusion detection systems and the design of military surveillance networks. Defense scientists, industry experts, academicians and practitioners alike will all benefit from the wide spectrum of successful applications compiled in this volume. Senior undergraduate or graduate students may also discover uncharted territory for their own research endeavors.

Author(s): Rami Abielmona, Rafael Falcon, Nur Zincir-Heywood, Hussein A. Abbass (eds.)
Series: Studies in Computational Intelligence 621
Publisher: Springer
Year: 2016

Language: English
Pages: 752
Tags: Computational Intelligence; Artificial Intelligence (incl. Robotics); Security Science and Technology

Front Matter....Pages i-xi
Recent Advances in Computational Intelligence in Defense and Security....Pages 1-9
Front Matter....Pages 11-11
Computational Intelligence Methods in Forward-Looking Explosive Hazard Detection....Pages 13-44
Classification-Driven Video Analytics for Critical Infrastructure Protection....Pages 45-69
Fuzzy Decision Fusion and Multiformalism Modelling in Physical Security Monitoring....Pages 71-100
Intelligent Radar Signal Recognition and Classification....Pages 101-135
Front Matter....Pages 137-137
An Improved Decision System for URL Accesses Based on a Rough Feature Selection Technique....Pages 139-167
A Granular Intrusion Detection System Using Rough Cognitive Networks....Pages 169-191
NNCS: Randomization and Informed Search for Novel Naval Cyber Strategies....Pages 193-223
Semi-Supervised Classification System for the Detection of Advanced Persistent Threats....Pages 225-248
A Benchmarking Study on Stream Network Traffic Analysis Using Active Learning....Pages 249-273
Front Matter....Pages 275-275
Visualization of Handwritten Signatures Based on Haptic Information....Pages 277-307
Extended Metacognitive Neuro-Fuzzy Inference System for Biometric Identification....Pages 309-338
Privacy, Security and Convenience: Biometric Encryption for Smartphone-Based Electronic Travel Documents....Pages 339-366
A Dual-Purpose Memory Approach for Dynamic Particle Swarm Optimization of Recurrent Problems....Pages 367-389
Risk Assessment in Authentication Machines....Pages 391-420
Front Matter....Pages 421-421
Game Theoretical Approach for Dynamic Active Patrolling in a Counter-Piracy Framework....Pages 423-444
mspMEA: The Microcones Separation Parallel Multiobjective Evolutionary Algorithm and Its Application to Fuzzy Rule-Based Ship Classification....Pages 445-465
Synthetic Aperture Radar (SAR) Automatic Target Recognition (ATR) Using Fuzzy Co-occurrence Matrix Texture Features....Pages 467-489
Text Mining in Social Media for Security Threats....Pages 491-517
DroidAnalyst: Synergic App Framework for Static and Dynamic App Analysis....Pages 519-552
Front Matter....Pages 553-553
Design and Development of Intelligent Military Training Systems and Wargames....Pages 555-603
Improving Load Signal and Fatigue Life Estimation for Helicopter Components Using Computational Intelligence Techniques....Pages 605-634
Evolving Narrations of Strategic Defence and Security Scenarios for Computational Scenario Planning....Pages 635-661
A Review of the Use of Computational Intelligence in the Design of Military Surveillance Networks....Pages 663-693
Sensor Resource Management: Intelligent Multi-objective Modularized Optimization Methodology and Models....Pages 695-726
Bio-Inspired Topology Control Mechanism for Unmanned Underwater Vehicles....Pages 727-752