Skip to main content
Top
Published in: Soft Computing 9/2014

01-09-2014 | Editorial

Soft computing for security services in smart and ubiquitous environments

Authors: Marek R. Ogiela, Aniello Castiglione, Ilsun You

Published in: Soft Computing | Issue 9/2014

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Excerpt

The recent advances in new generation information systems and global communication are due to the development of many complex technical solutions and sophisticated methods for secure communication between remote systems and also of the numerous technology implementations, which mean that the world of modern technologies surrounding us becomes friendlier in how it communicates with humans. The progress in modern and smart technologies is made possible, among other reasons, by the use of state-of-the-art achievements in soft computing approaches, cognitive computational models, as well as a number of other algorithmic techniques inspired by biology like neural computation, artificial intelligence or genetic programming. Recently, such methods have made it possible to intelligently manage secure data transmissions as well as to analyze various patterns coming from almost all facets of our life, thus contributing to the development of computer technology and security services in ubiquitous computing. …

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Literature
go back to reference Chiang HP, Chou YH, Chiu CH, Kuo SY, Huang YM (2014) A quantum-inspired Tabu search algorithm for solving combinatorial optimization problems. Soft Comput 18(9):1771–1782. doi:10.1007/s00500-013-1203-7 Chiang HP, Chou YH, Chiu CH, Kuo SY, Huang YM (2014) A quantum-inspired Tabu search algorithm for solving combinatorial optimization problems. Soft Comput 18(9):1771–1782. doi:10.​1007/​s00500-013-1203-7
go back to reference Choi J, Choi C, Ko B, Kim P (2014) A method of DDoS attack detection using HTTP packet pattern and rule engine in cloud computing environment. Soft Comput 18(9):1695–1704. doi:10.1007/s00500-014-1250-8 Choi J, Choi C, Ko B, Kim P (2014) A method of DDoS attack detection using HTTP packet pattern and rule engine in cloud computing environment. Soft Comput 18(9):1695–1704. doi:10.​1007/​s00500-014-1250-8
go back to reference Hernández JL, Moreno MV, Jara AJ, Skarmeta AF (2014) A soft computing based location-aware access control for smart buildings. Soft Comput 18(9):1659–1675. doi:10.1007/s00500-014-1278-9 Hernández JL, Moreno MV, Jara AJ, Skarmeta AF (2014) A soft computing based location-aware access control for smart buildings. Soft Comput 18(9):1659–1675. doi:10.​1007/​s00500-014-1278-9
go back to reference Maniscalco V, Greco Polito S, Intagliata A (2014) Binary and m-ary encoding in applications of tree-based genetic algorithms for QoS routing. Soft Comput 18(9):1705–1715. doi:10.1007/s00500-014-1271-3 Maniscalco V, Greco Polito S, Intagliata A (2014) Binary and m-ary encoding in applications of tree-based genetic algorithms for QoS routing. Soft Comput 18(9):1705–1715. doi:10.​1007/​s00500-014-1271-3
go back to reference Reina DG, León-Coca JM, Toral SL, Asimakopoulou E, Barrero F, Norrington P, Bessis N (2014) Multi-objective performance optimization of a probabilistic similarity/dissimilarity-based broadcasting scheme for mobile ad hoc networks in disaster response scenarios. Soft Comput 18(9):1745–1757. doi:10.1007/s00500-013-1207-3 Reina DG, León-Coca JM, Toral SL, Asimakopoulou E, Barrero F, Norrington P, Bessis N (2014) Multi-objective performance optimization of a probabilistic similarity/dissimilarity-based broadcasting scheme for mobile ad hoc networks in disaster response scenarios. Soft Comput 18(9):1745–1757. doi:10.​1007/​s00500-013-1207-3
go back to reference Sohn M, Jeong S, Lee H (2014) Case-based context ontology construction using fuzzy set theory for personalized service in a smart home environment. Soft Comput 18(9):1715–1729. doi:10.1007/s00500-014-1288-7 Sohn M, Jeong S, Lee H (2014) Case-based context ontology construction using fuzzy set theory for personalized service in a smart home environment. Soft Comput 18(9):1715–1729. doi:10.​1007/​s00500-014-1288-7
go back to reference Spaho E, Sakamoto S, Barolli L, Xhafa F, Ikeda M (2014) Trustworthiness in P2P: performance behaviour of two fuzzy-based systems for JXTA-overlay platform. Soft Comput 18(9):1783–1794. doi:10.1007/s00500-013-1206-4 Spaho E, Sakamoto S, Barolli L, Xhafa F, Ikeda M (2014) Trustworthiness in P2P: performance behaviour of two fuzzy-based systems for JXTA-overlay platform. Soft Comput 18(9):1783–1794. doi:10.​1007/​s00500-013-1206-4
go back to reference Wang K, Zhou H, Qin Y, Zhang H (2014) Cooperative-filter: countering Interest flooding attacks in named data networking. Soft Comput 18(9):1803–1814. doi:10.1007/s00500-014-1275-z Wang K, Zhou H, Qin Y, Zhang H (2014) Cooperative-filter: countering Interest flooding attacks in named data networking. Soft Comput 18(9):1803–1814. doi:10.​1007/​s00500-014-1275-z
go back to reference Xhafa F, Wang J, Chen X, Liu J, Li J, Krause P (2014) An efficient PHR service system supporting fuzzy keyword search and fine-grained access control. Soft Comput 18(9):1795–1803. doi:10.1007/s00500-013-1202-8 Xhafa F, Wang J, Chen X, Liu J, Li J, Krause P (2014) An efficient PHR service system supporting fuzzy keyword search and fine-grained access control. Soft Comput 18(9):1795–1803. doi:10.​1007/​s00500-013-1202-8
go back to reference Yang M, Li Y, Jin D, Yuan J, You I, Zeng L (2014) Opportunistic sharing scheme for spectrum allocation in wireless virtualization. Soft Comput 18(9):1685–1697. doi:10.1007/s00500-014-1267-z Yang M, Li Y, Jin D, Yuan J, You I, Zeng L (2014) Opportunistic sharing scheme for spectrum allocation in wireless virtualization. Soft Comput 18(9):1685–1697. doi:10.​1007/​s00500-014-1267-z
Metadata
Title
Soft computing for security services in smart and ubiquitous environments
Authors
Marek R. Ogiela
Aniello Castiglione
Ilsun You
Publication date
01-09-2014
Publisher
Springer Berlin Heidelberg
Published in
Soft Computing / Issue 9/2014
Print ISSN: 1432-7643
Electronic ISSN: 1433-7479
DOI
https://doi.org/10.1007/s00500-014-1380-z

Other articles of this Issue 9/2014

Soft Computing 9/2014 Go to the issue

Premium Partner