Special issue on Bio-inspired Learning and Intelligent Systems for Security (BLISS-07)
نویسندگان
چکیده
This special issue is based on the 2007 ECSIS Symposium on Bio-inspired Learning and Intelligent Systems for Security (BLISS-07) that was held in Edinburgh, Scotland, UK. That successful symposium emphasized reliable, versatile, and intelligent systems employed by a broad range of security applications. The goal was to integrate developers of intelligent systems with those who use them in security applications, including project managers, system integrators, and end users. As here used intelligent systems denote those artificial computational systems that operate in part or fully autonomously and that display behavior that if it were to be observed in animals, would normally become associated with intelligence of one sort or another. Systems with different degrees of autonomy of operation benefit greatly from incorporating aspects and mechanisms that are found in a broad range of biological systems, from survivability and adaptation of the simple living structures to learning, creativity, cognition and various forms of intelligence that are normally associated with humans. These features are often incorporated into algorithms by mimicking the biological processes that provide the inspiration. Such intelligent systems have been applied to a wealth of practical problems, including those in security. Examples of such applications discussed at the symposium include the detection and prevention of cybercrimes and identity theft, internet security, security of financial systems, security of public transportation systems, emergency response systems, combining space-based systems with geographical information systems, etc. A subset of selected papers presented at BLISS-07 have been chosen for this special issue of Journal of Soft Computing. These papers deal with a broad range of applications relevant to security including Voice over Internet Protocol (VOIP), identifying faces, image analysis, determining the source of an unknown airborne contaminant release, encryption for communication, among others. Two additional papers were contributed from a similar special issue being edited by Dr. Daniel Howard. All papers contained herein have relevance for security in either the civilian or defense arenas. We thank the authors who have all taken considerable effort to expound on their work for permanent archival in this journal. We similarly thank the reviewers who have facilitated this process, enhancing the quality of this special issue. We especially thank the editors of Journal of Soft Computing, particularly Brunella Gerla, for patience as we worked to make this special issue a reality. We hope the reader will capture a piece of the excitement and collegiality present in Edinburgh for the BLISS-07 conference as preserved in these papers. S. E. Haupt (&) Applied Research Laboratory, The Pennysylvania State University, State College, PA, USA e-mail: [email protected]
منابع مشابه
Preface to the Special Issue on Intelligent Distributed Computing
We are honored and pleased to open this special issue of the Concurrency and Computation: Practice and Experience journal focused on intelligent distributed computing. Intelligent distributed computing (IDC) faces the challenges of adapting and combining research results in the fields of intelligent computing and distributed computing. Intelligent computing develops methods and technology rangi...
متن کاملGuest Editorial: Impact of Integrated Intelligent Information and Analytical Systems on Society
The Special Issue of the Journal of Information Technology Management (JITM) is publishing very selective papers on information management, technology in higher education, integrated systems, enterprise management, cultural thoughts, strategic contributions, management information systems, and cloud computing. We received numerous papers for this special issue but after an extensive pe...
متن کاملSpecial Issue on Artificial Brain with Emotion and Learning
Biologically motivated systems have been proposed to overcome the limitations of conventional approaches in many engineering areas. Recent research has been directed towards developing a more human-like machine based on understanding of human brain. In order to develop a truly human-like machine, we need to reduce a large gab between biological principles and the artificial neural networks. The...
متن کاملAn Intelligent Approach Based on Meta-Heuristic Algorithm for Non-Convex Economic Dispatch
One of the significant strategies of the power systems is Economic Dispatch (ED) problem, which is defined as the optimal generation of power units to produce energy at the lowest cost by fulfilling the demand within several limits. The undeniable impacts of ramp rate limits, valve loading, prohibited operating zone, spinning reserve and multi-fuel option on the economic dispatch of practical p...
متن کاملA Sudy on Information Privacy Issue on Social Networks
In the recent years, social networks (SN) are now employed for communication and networking, socializing, marketing, as well as one’s daily life. Billions of people in the world are connected though various SN platforms and applications, which results in generating massive amount of data online. This includes personal data or Personally Identifiable Information (PII). While more and more data a...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- Soft Comput.
دوره 15 شماره
صفحات -
تاریخ انتشار 2011