Improving Information Security Practices through Computational Intelligence

Improving Information Security Practices through Computational Intelligence

Noted as an IGI Global Core Reference Title in Security & Forensics for 2019.

Wasan Awad (Ahlia University, Bahrain), El Sayed M. El-Alfy (King Fahd University of Petroleum and Minerals, Saudi Arabia) and Yousif Al-Bastaki (University of Bahrain, Bahrain)
Indexed In: SCOPUS
Release Date: August, 2015|Copyright: © 2016 |Pages: 327
ISBN13: 9781466694262|ISBN10: 1466694262|EISBN13: 9781466694279|DOI: 10.4018/978-1-4666-9426-2


The recent explosion in complex global networking architectures has spurred a concomitant rise in the need for robust information security. Further, as computing power increases exponentially with every passing year, so do the number of proposed cryptographic schemata for improving and ensuring the encryption integrity of cutting-edge infosec protocols.

Improving Information Security Practices through Computational Intelligence presents an overview of the latest and greatest research in the field, touching on such topics as cryptology, stream ciphers, and intrusion detection, and providing new insights to an audience of students, teachers, and entry-level researchers working in computational intelligence, information security, and security engineering.

Topics Covered

The many academic areas covered in this publication include, but are not limited to:

  • Biologically-Based Cryptosystems
  • Biometric Authentication
  • Chaos-Based Cryptosystems
  • Computational Intelligence
  • Cryptography
  • Digital Signatures
  • Digital Watermarking
  • Image Communication and Storage

Reviews and Testimonials

Editors Awad, El-Alfy, and Al-Bastaki present students, academics, researchers, and professionals working in a variety of contexts with a collection of academic papers and scholarly articles focused on the enhancement of information security through computational intelligence. The editors have organized the ten contributions that make up the main body of the text in five parts devoted to applications of evolutionary computation in cryptology, intelligent intrusion detection, authentication, multimedia security, and a wide variety of other related subjects.

– ProtoView Book Abstracts (formerly Book News, Inc.)

It's a good reminder to look on the security side of information management as it represents current and future challenges for developers and end-users. The proposed algorithm in chapter 3 (GADS) was very clear and none of the articles I have read on similar subjects were as relevant as those presented in this title.

– Ahmed Asad, Network Engineer, Bahrain

Table of Contents and List of Contributors

Search this Book:

Author(s)/Editor(s) Biography

Wasan Shaker Awad is an associate professor of Computer Science, College of Information Technology, Ahlia University, Bahrain. Her research areas include information security, computational intelligence, and coding theory. She published a number of papers in computational intelligence, information security, and block codes in a number of international journals and conferences.
El-Sayed M. El-Alfy is currently working at King Fahd University of Petroleum and Minerals, Saudi Arabia as Associate Professor & Intelligent Systems Research Group Coordinator. He is on leave from the College of Engineering, Tanta University. His research interests are pattern recognition and machine learning, computational intelligence and soft computing, data mining with applications in the areas of computer networks, document analysis, information retrieval, multimedia content security and forensics. Dr. El-Alfy has published numerously in these areas, attended several international conferences and contributed in the organization of many world-class international conferences as program chair, track chair, tutorial committee member, program committee member, session chair, and reviewer. He is a senior member of IEEE, member of ACM, IEEE CIS, IEEE CS, IEEE SMC, APNNA, INSTICC, MRLAB, ACS; member of technical committees of ADPRL, CISTC, and Multimedia Computing. He is also an associate editor of the IEEE Transactions on Neural Networks and Learning Systems, associate editor, International Journal on Trust Management in Computing and Communications, associate editor of the International Journal of Network Protocols and Algorithms, editor of the Journal of Emerging Technologies in Web Intelligence (JETWI), and editor of the International Journal of Advanced Science and Technology.
Dr. Yousif AL-Bastaki received a BSc. degree from University of Bahrain, Msc from University of Leeds, UK and a PhD degree from University of Nottingham, UK. Recently he has been appointed as an IT advisor at the Deputy Prime Minster at the Kingdom of Bahrain and previously worked as the Dean of College of IT at the University of Bahrain. Currently he is an associate professor and the Dean of Admission and Registration at the University of Bahrain. His research interests are Neural Networks, genetic algorithms E-Learning, Distance Education and e-government strategies and implementation.