Computational Intelligence Applications in Cyber Security
eBook - ePub

Computational Intelligence Applications in Cyber Security

  1. 334 pages
  2. English
  3. ePUB (mobile friendly)
  4. Available on iOS & Android
eBook - ePub

Computational Intelligence Applications in Cyber Security

About this book

The book provides a comprehensive overview of cyber security in Industry 5.0, data security in emerging technologies, block chain technology, cloud computing security, evolving IoT and OT threats, and considerable data integrity in healthcare. The impact of security risks on various sectors is explored including artificial intelligence in national security, quantum com-puting for security, and AI-driven cyber security techniques. It explores how cyber security is applied across different areas of human life through computational modeling. The book concludes by presenting a roadmap for securing computing environments, addressing the complex interplay between advanced technologies and emerging security challenges, and offering insights into future trends and innovations for sustainable development.

This book:

• Analyzes the use of AI, support vector machines, and deep learning for dataclassification, vulnerability prediction, and defense.
• Provides insights into data protection for Industry 4.0/5.0, cloud computing, and IoT/OT, focusing on risk mitigation.
• Explores block chain's role in smart nations, financial risk management, and the potential of quantum computing for security.
• Examines AI's applications in national security, including India's AI strategy and securing smart cities.
• Evaluate strategies for data integrity in healthcare, secure IoT platforms, and supply chain cyber security.

The text is primarily written for senior undergraduate, graduate students, and academic researchers in the fields of electrical engineering, electronics and communication engineering, computer engineering, and information technology.

Frequently asked questions

Yes, you can cancel anytime from the Subscription tab in your account settings on the Perlego website. Your subscription will stay active until the end of your current billing period. Learn how to cancel your subscription.
No, books cannot be downloaded as external files, such as PDFs, for use outside of Perlego. However, you can download books within the Perlego app for offline reading on mobile or tablet. Learn more here.
Perlego offers two plans: Essential and Complete
  • Essential is ideal for learners and professionals who enjoy exploring a wide range of subjects. Access the Essential Library with 800,000+ trusted titles and best-sellers across business, personal growth, and the humanities. Includes unlimited reading time and Standard Read Aloud voice.
  • Complete: Perfect for advanced learners and researchers needing full, unrestricted access. Unlock 1.4M+ books across hundreds of subjects, including academic and specialized titles. The Complete Plan also includes advanced features like Premium Read Aloud and Research Assistant.
Both plans are available with monthly, semester, or annual billing cycles.
We are an online textbook subscription service, where you can get access to an entire online library for less than the price of a single book per month. With over 1 million books across 1000+ topics, we’ve got you covered! Learn more here.
Look out for the read-aloud symbol on your next book to see if you can listen to it. The read-aloud tool reads text aloud for you, highlighting the text as it is being read. You can pause it, speed it up and slow it down. Learn more here.
Yes! You can use the Perlego app on both iOS or Android devices to read anytime, anywhere — even offline. Perfect for commutes or when you’re on the go.
Please note we cannot support devices running on iOS 13 and Android 7 or earlier. Learn more about using the app.
Yes, you can access Computational Intelligence Applications in Cyber Security by Suhel Ahmad Khan,Mohammad Faisal,Nawaf Alharbe,Rajeev Kumar,Raees Ahmad Khan in PDF and/or ePUB format, as well as other popular books in Computer Science & Electrical Engineering & Telecommunications. We have over one million books available in our catalogue for you to explore.

Table of contents

  1. Cover
  2. Half-Title Page
  3. Title Page
  4. Copyright Page
  5. Table of Contents
  6. Preface
  7. About the editors
  8. List of Contributors
  9. About the book
  10. Chapter 1 A transition from Industry 4.0 to Industry 5.0: Securing Industry 5.0 for sustainability
  11. Chapter 2 Security estimation of software by support vector machines: Defence perspective
  12. Chapter 3 Securing Industry 5.0 data through unified emerging technologies
  13. Chapter 4 Blockchain technologies: Shaping futuristic smart countries
  14. Chapter 5 Blockchain role in enhancing financial risk management in banking sector using correlation analysis
  15. Chapter 6 Identification of security factors in cloud computing: Defence security perspective
  16. Chapter 7 A review on evolving technology of IoT and OT: Security threats, attacks, and defenses
  17. Chapter 8 Managing big data integrity for IoT healthcare information systems
  18. Chapter 9 Secure, low-latency IoT cloud platform enhanced by fog computing for collaboration and safety
  19. Chapter 10 Analyzing the impact of security risk for securing healthcare information systems
  20. Chapter 11 Revisiting supply chain management: Security perspective
  21. Chapter 12 Software vulnerability prediction using deep learning on the unbalanced datasets
  22. Chapter 13 Implementation challenges faced by artificial intelligence for national security
  23. Chapter 14 Quantum computing and new dimensions in network security
  24. Chapter 15 Cyber-security technique for profound analytics of big data using AI
  25. Chapter 16 A comprehensive examination of cloud forensics, including challenges and available solutions
  26. Chapter 17 Pivotal role of cyber security in Internet of Things-based smart cities: An analytical framework for safe smart cities
  27. Chapter 18 Securing information systems through quantum computing: Grover’s algorithm approach
  28. Index