Quantum Computing in Cybersecurity
  1. English
  2. ePUB (mobile friendly)
  3. Available on iOS & Android
eBook - ePub

About this book

Machine learning, deep learning, probabilistic neural networks, blockchain, and other new technologies all demand extremely high processing speeds. A quantum computer is an example of such a system. Quantum computers may be accessed over the internet. This technology poses a significant risk, since quantum terrorists, or cyber criminals, coul be able to cause many problems, including bringing down the internet. The principles of quantum mechanics might be used by evil doers to destroy quantum information on a global scale, and an entire class of suspicious codes could destroy data or eavesdrop on communication.

Quantum physics, however, safeguards against data eavesdropping. A significant amount of money is being invested in developing and testing a quantum version of the internet that will eliminate eavesdropping and make communication nearly impenetrable to cyber-attacks. The simultaneous activation of quantum terrorists (organized crime) can lead to significant danger by attackers introducing quantum information into the network, breaking the global quantum state, and preventing the system from returning to its starting state. Without signs of identifying information and real-time communication data, such vulnerabilities are very hard to discover. Terrorists' synchronized and coordinated acts have an impact on security by sparking a cyber assault in a fraction of a second.

The encryption is used by cyber-criminal groups with the genuine, nefarious, and terrible motives of killing innocent people or stealing money. In the hands of criminals and codes, cryptography is a dangerous and formidable weapon. Small amounts of digital information are hidden in a code string that translates into an image on the screen, making it impossible for the human eye to identify a coded picture from its uncoded equivalents. To steal the cryptographic key necessary to read people's credit card data or banking information, cyber thieves employ installed encryption techniques, human mistakes, keyboard loggers, and computer malware.

This new volume delves into the latest cutting-edge trends and the most up-to-date processes and applications for quantum computing to bolster cybersecurity. Whether for the veteran computer engineer working in the field, other computer scientists and professionals, or for the student, this is a one-stop-shop for quantum computing in cyber security and a must have for any library.

Frequently asked questions

Yes, you can cancel anytime from the Subscription tab in your account settings on the Perlego website. Your subscription will stay active until the end of your current billing period. Learn how to cancel your subscription.
At the moment all of our mobile-responsive ePub books are available to download via the app. Most of our PDFs are also available to download and we're working on making the final remaining ones downloadable now. Learn more here.
Perlego offers two plans: Essential and Complete
  • Essential is ideal for learners and professionals who enjoy exploring a wide range of subjects. Access the Essential Library with 800,000+ trusted titles and best-sellers across business, personal growth, and the humanities. Includes unlimited reading time and Standard Read Aloud voice.
  • Complete: Perfect for advanced learners and researchers needing full, unrestricted access. Unlock 1.4M+ books across hundreds of subjects, including academic and specialized titles. The Complete Plan also includes advanced features like Premium Read Aloud and Research Assistant.
Both plans are available with monthly, semester, or annual billing cycles.
We are an online textbook subscription service, where you can get access to an entire online library for less than the price of a single book per month. With over 1 million books across 1000+ topics, we’ve got you covered! Learn more here.
Look out for the read-aloud symbol on your next book to see if you can listen to it. The read-aloud tool reads text aloud for you, highlighting the text as it is being read. You can pause it, speed it up and slow it down. Learn more here.
Yes! You can use the Perlego app on both iOS or Android devices to read anytime, anywhere — even offline. Perfect for commutes or when you’re on the go.
Please note we cannot support devices running on iOS 13 and Android 7 or earlier. Learn more about using the app.
Yes, you can access Quantum Computing in Cybersecurity by Romil Rawat,Rajesh Kumar Chakrawarti,Sanjaya Kumar Sarangi,Jaideep Patel,Vivek Bhardwaj,Anjali Rawat,Hitesh Rawat in PDF and/or ePUB format, as well as other popular books in Computer Science & Optical Data Processing. We have over one million books available in our catalogue for you to explore.

Information

Table of contents

  1. Cover
  2. Table of Contents
  3. Series Page
  4. Title Page
  5. Copyright Page
  6. Preface
  7. 1 Cyber Quantum Computing (Security) Using Rectified Probabilistic Packet Mark for Big Data
  8. 2 Secure Distinctive Data Transmission in Fog System Using Quantum Cryptography
  9. 3 DDoS Attack and Defense Mechanism in a Server
  10. 4 Dark Web Content Classification Using Quantum Encoding
  11. 5 Secure E-Voting Scheme Using Blockchain
  12. 6 An Overview of Quantum Computing–Based Hidden Markov Models
  13. 7 Artificial Intelligence and Qubit-Based Operating Systems: Current Progress and Future Perspectives
  14. 8 Techno-Nationalism and Techno-Globalization: A Perspective from the National Security Act
  15. 9 Quantum Computing Based on Cybersecurity
  16. 10 Quantum Cryptography for the Future Internet and the Security Analysis
  17. 11 Security Aspects of Quantum Cryptography
  18. 12 Security Aspects of Quantum Machine Learning: Opportunities, Threats and Defenses
  19. 13 Cyber Forensics and Cybersecurity: Threat Analysis, Research Statement and Opportunities for the Future
  20. 14 Quantum Computing: A Software Engineering Approach
  21. 15 Quantum Computing to the Advantage of Neural Network
  22. 16 Image Filtering Based on VQA with Quantum Security
  23. 17 Quantum Computing Techniques Assessment and Representation
  24. 18 Quantum Computing Technological Design Along with Its Dark Side
  25. 19 Quantum Technology for Military Applications
  26. 20 Potential Threats and Ethical Risks of Quantum Computing
  27. 21 Is Quantum Computing a Cybersecurity Threat?
  28. 22 Quantum Computing in Data Security: A Critical Assessment
  29. 23 Quantum Computing and Security Aspects of Attention-Based Visual Question Answering with Long Short-Term Memory
  30. 24 Quantum Cryptography – A Security Architecture
  31. 25 Quantum Computing Anomalies in Communication
  32. 26 Intrusion Detection System via Classical SVM and Quantum SVM: A Comparative Overview
  33. 27 Quantum Computing in Military Applications and Operations
  34. 28 Quantum Cryptography Techniques: Evaluation
  35. 29 Cyber Crime Attack Vulnerability Review for Quantum Computing
  36. About the Editors
  37. Index
  38. Also of Interest
  39. End User License Agreement