Computational intelligence paradigms: An overview

El Sayed M. El-Alfy*, Wasan Shaker Awad

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

3 Scopus citations

Abstract

The evolution of communication networks and information systems, to support wireless access, cloud and grid computing, and big data, provides great business opportunities. However, it also generates a new trend of sophisticated network threats and offers several challenges in securing information and systems confidentiality, integrity and availability. The traditional techniques used by security experts are mostly static and lack the much needed characteristics of adaptation and self-organization, computational efficiency and error resilience to deal with evolving attacks. The inherent characteristics of computational intelligence (CI) paradigms provide a promising alternative that has gained popularity resulting in significant applications in information security. There is a plethora of CI paradigms commonly used in this domain including artificial neural networks, evolutionary computing, fuzzy systems, and swarm intelligence. This chapter provides an overview of the widely-recognized CI paradigms and shades the light on some of their potential applications in information security.

Original languageEnglish
Title of host publicationImproving Information Security Practices through Computational Intelligence
PublisherIGI Global
Pages1-27
Number of pages27
ISBN (Electronic)9781466694279
ISBN (Print)1466694262, 9781466694262
DOIs
StatePublished - 26 Aug 2015

Bibliographical note

Publisher Copyright:
© 2016, IGI Global. All rights reserved.

ASJC Scopus subject areas

  • General Computer Science

Fingerprint

Dive into the research topics of 'Computational intelligence paradigms: An overview'. Together they form a unique fingerprint.

Cite this