Cyber security using modern technologies : artificial intelligence, blockchain and quantum cryptography /

"The main objective of this book is to introduces cyber security using modern technologies like Artificial Intelligence, Quantum Cryptography and Blockchain. The book provides in-depth coverage of important concepts related to cyber security. Beginning with an introduction to Quantum Computing,...

Full description

Saved in:
Bibliographic Details
Corporate Author: CRC Press
Other Authors: Pal, Om (Editor), Kumar, Vinod (Professor of electronics and communication) (Editor), Khan, Rijwan, 1981- (Editor), Alam, Bashir (Editor), Alam, Mansaf (Editor)
Format: Electronic eBook
Language:English
Published: Boca Raton, FL : CRC Press, 2024.
Edition:First edition.
Subjects:
Online Access: Full text (WIT users only)
Table of Contents:
  • Quantum computing : a global scenario / Om Pal, Vinod Kumar, Vinay Thakur and Bashir Alam
  • Post-quantum digital signatures / N. Sarat Chandra Babu and M. Prem Laxman Das
  • Analysis of quantum computing with food processing use case / Dhaval S Jha, Het Shah and Jai Prakash Verma
  • Security of modern networks and its challenges / Apurv Garg, Bhartendu Sharma, Anmol Gupta and Rijwan Khan
  • Security and performance analysis of advanced metering infrastructure in smart grid and use of blockchain in security perspective / Khushboo Gupta and Vinod Kumar
  • Computation and storage efficient key distribution protocol for secure multicast communication in centralized environments / Vinod Kumar, Khushboo Gupta, Om Pal, Rajendra Kumar, Pradeep Kumar Tiwari, Narendra Kumar Updhyay and Mukesh Kumar Bhardwaj
  • Effective key agreement protocol for large and dynamic groups using elliptic curve cryptography / Vinod Kumar, Khushboo Gupta, Om Pal, Shiv Prakash, Pravin Kumar, Shiv Veer Singh, Pradeep Kumar Tiwari and Animesh Tripathi
  • Cyber security using artificial intelligence / Sapna Katiyar
  • Cloud computing : an overview of security risk assessment models & frameworks / Subarna Ghosh, Nafees Mansoor and Mohammad Shahriar Rahman
  • Generating cyber threat intelligence to discover potential security threats using classification and topic modeling / Md Imran Hossen, Ashraful Islam, Farzana Anowar, Eshtiak Ahmed and Mohammed Masudur Rahman
  • Cyber-physical energy systems security : attacks, vulnerabilities and risk management / Sayada Sonia Akter, Rezwan Ahmed, Ferdous Hasan Khan and Mohammad Shahriar Rahman
  • Intrusion detection using machine learning / Rijwan Khan, Aditi Tiwari, Aashna Kapoor and Abhyudaya Mittal
  • Network forensic / Sandeep Kaur, Manjit Sandhu, Sandeep Sharma and Ravinder Singh Sawhney
  • A deep neural network based biometric random key generator for security
  • enhancement / Sannidhan M S, Jason Elroy Martis and Sudeepa K B
  • Quantum computing and its real-world applications / Pawan Mishra, Ravi Kamal Pandey and Pooja
  • Encrypted network traffic classification and application identification employing deep learning / Jyoti Mishra and Mahendra Tiwari