Advances in Intelligent and Soft Computing > Computational Intelligence in Security for Information Systems > Biometry > 171-178
Advances in Intelligent and Soft Computing > Computational Intelligence in Security for Information Systems 2010 > Chapter 2: Agents and Multi-Agent Systems > 61-69
Advances in Intelligent and Soft Computing > Computational Intelligence in Security for Information Systems 2010 > Chapter 4: Network Security > 151-160
Advances in Intelligent and Soft Computing > Computational Intelligence in Security for Information Systems > Data Mining and Intelligence > 19-27
Advances in Intelligent and Soft Computing > Computational Intelligence in Security for Information Systems > Network Security > 135-142
Advances in Intelligent and Soft Computing > Computational Intelligence in Security for Information Systems > Network Security > 143-154
Advances in Intelligent and Soft Computing > Proceedings of the International Workshop on Computational Intelligence in Security for Information Systems CISIS’8 > Network Security > 139-146
Advances in Intelligent and Soft Computing > Proceedings of the International Workshop on Computational Intelligence in Security for Information Systems CISIS’8 > Network Security > 147-154
Advances in Intelligent and Soft Computing > Proceedings of the International Workshop on Computational Intelligence in Security for Information Systems CISIS’8 > Network Security > 155-162
Advances in Intelligent and Soft Computing > Soft Computing Models in Industrial and Environmental Applications, 5th International Workshop (SOCO 2010) > Agents and Multiagent Systems > 9-18
Advances in Intelligent and Soft Computing > Soft Computing Models in Industrial and Environmental Applications, 6th International Conference SOCO 2011 > System, Man, and Cybernetics > 561-570