Intelligent strategies and techniques for effective cyber security, infrastructure protection and privacy | IEEE Conference Publication | IEEE Xplore