Soft Computing for Security Applications