000 -LEADER |
fixed length control field |
03592nam a22002417a 4500 |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
ISBN |
9781003514312 (ebk) |
082 ## - DEWEY DECIMAL CLASSIFICATION NUMBER |
Classification number |
005.8 |
Item number |
C7383 2025 |
245 ## - TITLE STATEMENT |
Title |
Computational intelligence applications in cyber security / edited by Suhel Ahmad Khan [and four others]. |
250 ## - EDITION STATEMENT |
Edition statement |
First edition |
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT) |
Place of publication |
Boca Raton, FL : |
Name of publisher |
CRC Press, |
Year of publication |
©2025. |
300 ## - PHYSICAL DESCRIPTION |
Number of Pages |
1 online resource, xxv ; 334 pages. |
Other physical details |
illustrations. |
500 ## - GENERAL NOTE |
General note |
Includes bibliographical references and index. |
505 ## - FORMATTED CONTENTS NOTE |
Formatted contents note |
1. A Transition from Industry 4.0 to Industry 5.0: Securing Industry 5.0 for Sustainability. 2. Security Estimation of Software by Support Vector Machines: Defence Perspective. 3. Securing Industry 5.0 Data through Unified Emerging Technologies. 4. Blockchain Technologies: Shaping Futuristic Smart Countries. 5. Blockchain Role in Enhancing Financial Risk Management in Banking Sector using Correlation Analysis. 6. Identification of Security Factors in Cloud Computing: Defence Security Perspective. 7. A Review on Evolving Technology of IOT and OT: Security Threats, Attacks, and Defences. 8. Managing Big Data Integrity for IoT Healthcare Information System. 9. Low-Latency IoT Cloud Platform Enhanced By Fog Computing For Collaboration and Safety. 10. Analyzing the Impact of Security Risk for Securing Healthcare Information Systems. 11. Revisiting Supply Chain Management: Security Perspective. 12. Software Vulnerability Prediction using Deep Learning on the Unbalanced Datasets. 13. Implementation Challenges faced by AI for National Security. 14. Quantum Computing and New Dimensions in Network Security. 15. Cyber Security Technique for Profound Analytic of Big Data using AI. 16. A comprehensive examination of cloud forensics, including challenges and available solutions. 17. Pivotal Role of Cyber Security in IoT-based Smart Cities: An Analytical Framework for Safe Smart Cities. 18. Securing Information Systems through Quantum Computing: Grover's Algorithm Approach. |
520 ## - SUMMARY, ETC. |
Summary, etc |
"The text comprehensively discusses soft computing and decision-making techniques like the fuzzy analytic hierarchy process, fuzzy analytic network process, and fuzzy TOPSIS. It further covers a wide range of wireless communication with emerging computational intelligent trends. The text explores the role of wireless technologies in applications touching on various spheres of human life with the help of hesitant fuzzy sets-based computational modeling. This book: Discusses the Internet of Things and cloud computing technologies in promoting cyber security. Highlights the impact of the relationship between security and sustainability, usability, and dependability during securing cyber communication. Evaluating the importance of artificial intelligence and machine learning-based techniques, quantitatively and empirically. Discusses applications of adaptive and learning techniques for secure estimation. Showcases various risks and uses of a multi-criteria decision-making method to manage risks. The text is primarily written for senior undergraduate, graduate students, and academic researchers in the fields of electrical engineering, electronics and communication engineering, computer engineering, and information technology"-- Provided by publisher |
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical Term |
Computer security. |
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical Term |
Technological innovations. |
700 ## - ADDED ENTRY--PERSONAL NAME |
Personal name |
Khan, Suhel Ahmad, editor. |
700 ## - ADDED ENTRY--PERSONAL NAME |
Personal name |
Faisal, Mohammad (Professor of computer application), editor. |
700 ## - ADDED ENTRY--PERSONAL NAME |
Personal name |
Alharbe, Nawaf R., editor. |
700 ## - ADDED ENTRY--PERSONAL NAME |
Personal name |
Kumar, Rajeev, 1991- editor. |
700 ## - ADDED ENTRY--PERSONAL NAME |
Personal name |
Khan, Ahmad, editor. |
942 ## - ADDED ENTRY ELEMENTS (KOHA) |
Koha item type |
Electronic Books |