
Computational Intelligence Applications in Cyber Security
- 334 pages
- English
- ePUB (mobile friendly)
- Available on iOS & Android
Computational Intelligence Applications in Cyber Security
About this book
The book provides a comprehensive overview of cyber security in Industry 5.0, data security in emerging technologies, block chain technology, cloud computing security, evolving IoT and OT threats, and considerable data integrity in healthcare. The impact of security risks on various sectors is explored including artificial intelligence in national security, quantum com-puting for security, and AI-driven cyber security techniques. It explores how cyber security is applied across different areas of human life through computational modeling. The book concludes by presenting a roadmap for securing computing environments, addressing the complex interplay between advanced technologies and emerging security challenges, and offering insights into future trends and innovations for sustainable development.
This book:
• Analyzes the use of AI, support vector machines, and deep learning for dataclassification, vulnerability prediction, and defense.
• Provides insights into data protection for Industry 4.0/5.0, cloud computing, and IoT/OT, focusing on risk mitigation.
• Explores block chain's role in smart nations, financial risk management, and the potential of quantum computing for security.
• Examines AI's applications in national security, including India's AI strategy and securing smart cities.
• Evaluate strategies for data integrity in healthcare, secure IoT platforms, and supply chain cyber security.
The text is primarily written for senior undergraduate, graduate students, and academic researchers in the fields of electrical engineering, electronics and communication engineering, computer engineering, and information technology.
Frequently asked questions
- Essential is ideal for learners and professionals who enjoy exploring a wide range of subjects. Access the Essential Library with 800,000+ trusted titles and best-sellers across business, personal growth, and the humanities. Includes unlimited reading time and Standard Read Aloud voice.
- Complete: Perfect for advanced learners and researchers needing full, unrestricted access. Unlock 1.4M+ books across hundreds of subjects, including academic and specialized titles. The Complete Plan also includes advanced features like Premium Read Aloud and Research Assistant.
Please note we cannot support devices running on iOS 13 and Android 7 or earlier. Learn more about using the app.
Information
Table of contents
- Cover
- Half-Title Page
- Title Page
- Copyright Page
- Table of Contents
- Preface
- About the editors
- List of Contributors
- About the book
- Chapter 1 A transition from Industry 4.0 to Industry 5.0: Securing Industry 5.0 for sustainability
- Chapter 2 Security estimation of software by support vector machines: Defence perspective
- Chapter 3 Securing Industry 5.0 data through unified emerging technologies
- Chapter 4 Blockchain technologies: Shaping futuristic smart countries
- Chapter 5 Blockchain role in enhancing financial risk management in banking sector using correlation analysis
- Chapter 6 Identification of security factors in cloud computing: Defence security perspective
- Chapter 7 A review on evolving technology of IoT and OT: Security threats, attacks, and defenses
- Chapter 8 Managing big data integrity for IoT healthcare information systems
- Chapter 9 Secure, low-latency IoT cloud platform enhanced by fog computing for collaboration and safety
- Chapter 10 Analyzing the impact of security risk for securing healthcare information systems
- Chapter 11 Revisiting supply chain management: Security perspective
- Chapter 12 Software vulnerability prediction using deep learning on the unbalanced datasets
- Chapter 13 Implementation challenges faced by artificial intelligence for national security
- Chapter 14 Quantum computing and new dimensions in network security
- Chapter 15 Cyber-security technique for profound analytics of big data using AI
- Chapter 16 A comprehensive examination of cloud forensics, including challenges and available solutions
- Chapter 17 Pivotal role of cyber security in Internet of Things-based smart cities: An analytical framework for safe smart cities
- Chapter 18 Securing information systems through quantum computing: Grover’s algorithm approach
- Index