Bentham is offering subject-based scholarly content collections which are tailored to meet specific research needs. Researchers can access related articles from current and back volumes by purchasing access to these collections. Subscribers will also have access to new articles as soon as they are published and added to these collections. With new articles being added to these collections on a daily basis, the collections serve as an ideal tool to keep researchers updated with new developments in the respective fields.
DOI: 10.2174/97898151963201240101 eISBN: 978-981-5196-32-0, 2024 ISBN: 978-981-5196-33-7 ISSN: 2810-9457 (Print) ISSN: 2810-9465 (Online)
Back Recommend this Book to your Library Cite as
Cite this Book as:
For Books Vinod Kumar, Mandeep Mittal, Adesh Kumari , " Optimization Techniques for Decision-making and Information Security ", Bentham Science Publishers (2024). https://doi.org/10.2174/97898151963201240101
Print ISBN978-981-5196-33-7
Online ISBN978-981-5196-32-0
Page: i-i (1) Author: Mansaf Alam DOI: 10.2174/9789815196320124030001
Page: ii-vi (5) Author: Vinod Kumar, Mandeep Mittal and Adesh Kumari DOI: 10.2174/9789815196320124030002
Page: vii-viii (2) Author: DOI: 10.2174/9789815196320124030003
Page: 1-17 (17) Author: Amit Kumar, Amina Angelika Bouchentouf and Mohamed Boualem* DOI: 10.2174/9789815196320124030004 PDF Price: $15
Page: 18-35 (18) Author: Koushik Das* and Chandal Nahak DOI: 10.2174/9789815196320124030005 PDF Price: $15
Page: 36-47 (12) Author: Mohd Parvez*, Taufique Ahamad and Osama Khan DOI: 10.2174/9789815196320124030006 PDF Price: $15
Page: 48-61 (14) Author: Anil Kumar Nishad*, Gunjan Agarwal, S. R. Singh and Gajraj Singh DOI: 10.2174/9789815196320124030007 PDF Price: $15
Page: 62-74 (13) Author: Sanjay Kumar and Ram Pravesh Prasad* DOI: 10.2174/9789815196320124030008 PDF Price: $15
Page: 75-91 (17) Author: A. K. Bhurjee and P. Kumar* DOI: 10.2174/9789815196320124030009 PDF Price: $15
Page: 92-113 (22) Author: Amol Avinash Joshi* and Rabia Musheer Aziz DOI: 10.2174/9789815196320124030010 PDF Price: $15
Page: 114-131 (18) Author: Deepika* and Pankaj Kumar DOI: 10.2174/9789815196320124030011 PDF Price: $15
Page: 132-145 (14) Author: Iftikhar Husain* DOI: 10.2174/9789815196320124030012 PDF Price: $15
Page: 146-150 (5) Author: Vinod Kumar, Mandeep Mittal and Adesh Kumari DOI: 10.2174/9789815196320124030013
Optimization Techniques for Decision-making and Information Security is a scholarly compilation that has been edited by experts with specialized knowledge in the fields of decision theory and cybersecurity. Through the synthesis of an extensive array of information, this edited volume presents novel methodologies and approaches that forge a link between the critical domain of information security and the realm of decision-making processes. The publication commences with a fundamental investigation that establishes the theoretical foundations of information security-relevant decision-making models. The subsequent chapters present comprehensive evaluations of real-world applications, showcasing an assortment of optimization techniques. The book offers a wide range of perspectives on the practical implementation of data analysis in various domains, including but not limited to power generation and optimization, solid transportation problems, soft computing techniques, wireless sensor networks, parametric set-valued optimization problems, data aggregation optimization techniques, fuzzy linear programming problems, and nonlinear chaotic systems. The anthology concludes with a comprehensive summary of the most noteworthy observations and ramifications extracted from the projects of all contributors. Key features - Presents a wide variety of sophisticated optimization methodologies - Explores the intricate intersection of decision theory and the safeguarding of confidential information. - Emphasizes effectiveness in improving decision-making processes designed to strengthen information security measures. - Showcases practical examples in different industrial domains through case studies and real-world problems. - Provides guidance and contemplations on strengthening information security environments. - Includes scientific references for advanced reading This book serves as an essential reference for policymakers, researchers, and professionals who are learning about or working in information security roles.
Recent Patents on Computer Science
The Chinese Journal of Artificial Intelligence
Current Chinese Computer Science
Journal of Fuzzy Logic and Modeling in Engineering
Current E-Learning (Discontinued)
International Journal of Sensors, Wireless Communications and Control
Recent Advances in Computer Science and Communications
Wireless and Communication Letters
Journal of Intelligent Systems in Current Computer Engineering
Current Computer Science
Computational Intelligence For Data Analysis
Applied Machine Learning and Multi-Criteria Decision-Making in Healthcare
A First Course in Artificial Intelligence
Artificial Intelligence: Models, Algorithms and Applications
Advanced Computing Techniques: Implementation, Informatics and Emerging Technologies
Handbook of Mobile Application Development: A Guide to Selecting the Right Engineering and Quality Features
Applications of Modern High Performance Networks
Arduino Meets Matlab: Interfacing, Programs and Simulink
Arduino and SCILAB based Projects
Application of Chaos and Fractals to Computer Vision