Cyber security using modern technologies : artificial intelligence, blockchain and quantum cryptography /: artificial intelligence, blockchain and quantum cryptography. (2023)
- Record Type:
- Book
- Title:
- Cyber security using modern technologies : artificial intelligence, blockchain and quantum cryptography /: artificial intelligence, blockchain and quantum cryptography. (2023)
- Main Title:
- Cyber security using modern technologies : artificial intelligence, blockchain and quantum cryptography
- Further Information:
- Note: Edited by Om Pal, Vinod Kumar, Rijwan Khan, Bashir Alam, Mansaf Alam.
- Editors:
- Pal, Om
(Professor of electronics and communication), Kumar, Vinod
Khan, Rijwan, 1981-
Alam, Bashir
Alam, Mansaf - Contents:
- 1. Quantum Computing: A Global Scenario by Om Pal, Vinod Kumar, Vinay Thakur and Bashir Alam. 2. Post-Quantum Digital Signatures by N. Sarat Chandra Babu and M. Prem Laxman Das. 3. Analysis of Quantum Computing with Food Processing Use case by Dhaval S Jha, Het Shah and Jai Prakash Verma. 4. Security of Modern Networks and its Challenges by Apurv Garg, Bhartendu Sharma, Anmol Gupta and Rijwan Khan. 5. Security and Performance Analysis of Advanced Metering Infrastructure in Smart Grid and Use of Blockchain in Security Perspective by Khushboo Gupta and Vinod Kumar. 6. Computation and Storage Efficient Key Distribution Protocol for Secure Multicast Communication in Centralized Environments by Vinod Kumar, Khushboo Gupta, Om Pal, Rajendra Kumar, Pradeep Kumar Tiwari, Narendra Kumar Updhyay and Mukesh Kumar Bhardwaj. 7. Effective Key Agreement Protocol for Large and Dynamic Groups Using Elliptic Curve Cryptography by Vinod Kumar, Khushboo Gupta, Om Pal, Shiv Prakash, Pravin Kumar, Shiv Veer Singh, Pradeep Kumar Tiwari and Animesh Tripathi. 8. Cyber Security using Artificial Intelligence by Sapna Katiyar. 9. Cloud Computing: An Overview of Security Risk Assessment Models & Frameworks by Subarna Ghosh, Nafees Mansoor and Mohammad Shahriar Rahman. 10. Generating Cyber Threat Intelligence to Discover Potential Security Threats Using Classification and Topic Modeling by Md Imran Hossen, Ashraful Islam, Farzana Anowar, Eshtiak Ahmed and Mohammed Masudur Rahman. 11. Cyber-Physical1. Quantum Computing: A Global Scenario by Om Pal, Vinod Kumar, Vinay Thakur and Bashir Alam. 2. Post-Quantum Digital Signatures by N. Sarat Chandra Babu and M. Prem Laxman Das. 3. Analysis of Quantum Computing with Food Processing Use case by Dhaval S Jha, Het Shah and Jai Prakash Verma. 4. Security of Modern Networks and its Challenges by Apurv Garg, Bhartendu Sharma, Anmol Gupta and Rijwan Khan. 5. Security and Performance Analysis of Advanced Metering Infrastructure in Smart Grid and Use of Blockchain in Security Perspective by Khushboo Gupta and Vinod Kumar. 6. Computation and Storage Efficient Key Distribution Protocol for Secure Multicast Communication in Centralized Environments by Vinod Kumar, Khushboo Gupta, Om Pal, Rajendra Kumar, Pradeep Kumar Tiwari, Narendra Kumar Updhyay and Mukesh Kumar Bhardwaj. 7. Effective Key Agreement Protocol for Large and Dynamic Groups Using Elliptic Curve Cryptography by Vinod Kumar, Khushboo Gupta, Om Pal, Shiv Prakash, Pravin Kumar, Shiv Veer Singh, Pradeep Kumar Tiwari and Animesh Tripathi. 8. Cyber Security using Artificial Intelligence by Sapna Katiyar. 9. Cloud Computing: An Overview of Security Risk Assessment Models & Frameworks by Subarna Ghosh, Nafees Mansoor and Mohammad Shahriar Rahman. 10. Generating Cyber Threat Intelligence to Discover Potential Security Threats Using Classification and Topic Modeling by Md Imran Hossen, Ashraful Islam, Farzana Anowar, Eshtiak Ahmed and Mohammed Masudur Rahman. 11. Cyber-Physical Energy Systems Security: Attacks, Vulnerabilities and Risk Management by Sayada Sonia Akter, Rezwan Ahmed, Ferdous Hasan Khan and Mohammad Shahriar Rahman. 12. Intrusion Detection Using Machine Learning by Rijwan Khan, Aditi Tiwari, Aashna Kapoor and Abhyudaya Mittal. 13. Network Forensic by Sandeep Kaur, Manjit Sandhu, Sandeep Sharma and Ravinder Singh Sawhney. 14. A Deep Neural Network Based Biometric Random Key Generator for Security Enhancement by Sannidhan M S, Jason Elroy Martis and Sudeepa K B. 15. Quantum Computing and its Real-World Applications by Pawan Mishra, Ravi Kamal Pandey and Pooja. 16. Encrypted Network Traffic Classification and Application Identification Employing Deep Learning by Jyoti Mishra and Mahendra Tiwari. … (more)
- Edition:
- 1st
- Publisher Details:
- Boca Raton : CRC Press
- Publication Date:
- 2023
- Extent:
- 1 online resource (272 pages), illustrations (black and white)
- Subjects:
- 005.8
Computer security -- Technological innovations - Languages:
- English
- ISBNs:
- 9781000908060
9781000908022 - Related ISBNs:
- 9781032213194
- Notes:
- Note: Includes bibliographical references and index.
Note: Description based on CIP data; resource not viewed. - Access Rights:
- Legal Deposit; Only available on premises controlled by the deposit library and to one user at any one time; The Legal Deposit Libraries (Non-Print Works) Regulations (UK).
- Access Usage:
- Restricted: Printing from this resource is governed by The Legal Deposit Libraries (Non-Print Works) Regulations (UK) and UK copyright law currently in force.
- View Content:
- Available online (eLD content is only available in our Reading Rooms) ↗
- Physical Locations:
- British Library HMNTS - ELD.DS.793875
- Ingest File:
- 20_043.xml