Next-Generation Cybersecurity AI, ML, and Blockchain /
This book highlights a comprehensive overview of the recent advancements and challenges in the field of cybersecurity with a focus on the integration of artificial intelligence (AI), machine learning (ML), and blockchain technologies. The book targets both researchers and practitioners working in th...
Saved in:
Corporate Author: | |
---|---|
Other Authors: | , |
Format: | Electronic eBook |
Language: | English |
Published: |
Singapore :
Springer Nature Singapore : Imprint: Springer,
2024.
|
Edition: | 1st ed. 2024. |
Series: | Blockchain Technologies,
|
Subjects: | |
Online Access: |
Full text (Wentworth users only) |
MARC
LEADER | 00000nam a22000005i 4500 | ||
---|---|---|---|
001 | w3099354 | ||
005 | 20240613114256.0 | ||
007 | cr nn 008mamaa | ||
008 | 240518s2024 si | s |||| 0|eng d | ||
020 | |a 9789819712496 |9 978-981-97-1249-6 | ||
024 | 7 | |a 10.1007/978-981-97-1249-6 |2 doi | |
035 | |a (DE-He213)978-981-97-1249-6 | ||
049 | |a WENN | ||
050 | 4 | |a TH9701-9745 | |
072 | 7 | |a TNKS |2 bicssc | |
072 | 7 | |a SCI055000 |2 bisacsh | |
072 | 7 | |a TNKS |2 thema | |
082 | 0 | 4 | |a 621 |2 23 |
245 | 1 | 0 | |a Next-Generation Cybersecurity |h [electronic resource] : |b AI, ML, and Blockchain / |c edited by Keshav Kaushik, Ishu Sharma. |
250 | |a 1st ed. 2024. | ||
264 | 1 | |a Singapore : |b Springer Nature Singapore : |b Imprint: Springer, |c 2024. | |
300 | |a XII, 470 p. 96 illus., 65 illus. in color. |b online resource. | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
347 | |a text file |b PDF |2 rda | ||
490 | 1 | |a Blockchain Technologies, |x 2661-8346 | |
505 | 0 | |a Introduction to Cybersecurity with AI, ML, and Blockchain -- Opportunities and Challenges in New Generation Cyber Security Applications using Artificial Intelligence, Machine Learning and Block Chain -- AI and Blockchain for Secure Data Analytics -- Synergizing Artificial Intelligence and Blockchain -- Blockchain-Based Smart Contracts: Technical and Usage Aspects -- An Impact of Cyber Security and Blockchain in Healthcare Industry: an implementation through AI -- Deep Learning and Blockchain Applications in Healthcare Sector using Imaging Data -- Healthcare Data Security using AI and Blockchain: Safeguarding Sensitive Information for a Safer Society -- The Future of Electronic Healthcare Management: Blockchain and Artificial Intelligence Integration -- Impact of Neural Network on Malware Detection -- Evaluating different malware detection neural network architectures -- Protecting Your Assets: Effective Use of Cybersecurity Measures in Banking Industries -- Revolutionizing Banking with Blockchain:Opportunities and Challenges Ahead -- Leveraging AI and Blockchain for Enhanced IoT Cybersecurity -- Dissecting the Role of Women in Cybersecurity and Information Technology: A Medical Perspective -- A Comprehensive Exploration of Advancements and Applications of Digital Watermarking -- Optimizing Drug Discovery: Molecular Docking with Glow-worm Swarm Optimization -- Bridging the Gap Between Learning and Security: An Investigation of Blended Learning Systems and Ransomware Detection -- Ethical Considerations in AI-based Cybersecurity. | |
520 | |a This book highlights a comprehensive overview of the recent advancements and challenges in the field of cybersecurity with a focus on the integration of artificial intelligence (AI), machine learning (ML), and blockchain technologies. The book targets both researchers and practitioners working in the field of cybersecurity and aims to fill the gap in the current literature by providing a comprehensive and up-to-date examination of the integration of AI, ML, and blockchain in cybersecurity systems. The book has a technical focus and provides an in-depth examination of the latest developments in the field. It covers a range of topics including the basics of AI, ML, and blockchain, the application of AI and ML in cybersecurity, the use of blockchain in cybersecurity, and the integration of AI, ML, and blockchain in cybersecurity systems. Each chapter is written by leading experts in the field and provides a thorough and technical overview of the topic, including case studies, examples, and practical applications. | ||
650 | 0 | |a Security systems. | |
650 | 0 | |a Blockchains (Databases). | |
650 | 0 | |a Machine learning. | |
650 | 0 | |a Artificial intelligence. | |
650 | 0 | |a Internet of things. | |
700 | 1 | |a Kaushik, Keshav. |e editor. |4 edt |4 http://id.loc.gov/vocabulary/relators/edt | |
700 | 1 | |a Sharma, Ishu. |e editor. |4 edt |4 http://id.loc.gov/vocabulary/relators/edt | |
710 | 2 | |a SpringerLink (Online service) | |
773 | 0 | |t Springer Nature eBook | |
776 | 0 | 8 | |i Printed edition: |z 9789819712489 |
776 | 0 | 8 | |i Printed edition: |z 9789819712502 |
776 | 0 | 8 | |i Printed edition: |z 9789819712519 |
830 | 0 | |a Blockchain Technologies, |x 2661-8346 | |
951 | |a 3099354 | ||
999 | f | f | |i 54ab259a-ab9f-5922-9968-6557911b3b21 |s 2cd41a90-7035-5684-8c06-905fd6fa6e02 |t 0 |
952 | f | f | |a Wentworth Institute of Technology |b Main Campus |c Wentworth Library |d Ebooks |t 0 |e Springer |h Other scheme |
856 | 4 | 0 | |t 0 |u https://ezproxywit.flo.org/login?url=https://doi.org/10.1007/978-981-97-1249-6 |y Full text (Wentworth users only) |