CSU-Carig

LRC WEB OPAC

Your Gateway to Our Library Collection

RedEagle Search

Computational intelligence applications in cyber security / edited by Suhel Ahmad Khan [and four others]. (Record no. 20430)

000 -LEADER
fixed length control field 03592nam a22002417a 4500
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
ISBN 9781003514312 (ebk)
082 ## - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 005.8
Item number C7383 2025
245 ## - TITLE STATEMENT
Title Computational intelligence applications in cyber security / edited by Suhel Ahmad Khan [and four others].
250 ## - EDITION STATEMENT
Edition statement First edition
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT)
Place of publication Boca Raton, FL :
Name of publisher CRC Press,
Year of publication ©2025.
300 ## - PHYSICAL DESCRIPTION
Number of Pages 1 online resource, xxv ; 334 pages.
Other physical details illustrations.
500 ## - GENERAL NOTE
General note Includes bibliographical references and index.
505 ## - FORMATTED CONTENTS NOTE
Formatted contents note 1. A Transition from Industry 4.0 to Industry 5.0: Securing Industry 5.0 for Sustainability. 2. Security Estimation of Software by Support Vector Machines: Defence Perspective. 3. Securing Industry 5.0 Data through Unified Emerging Technologies. 4. Blockchain Technologies: Shaping Futuristic Smart Countries. 5. Blockchain Role in Enhancing Financial Risk Management in Banking Sector using Correlation Analysis. 6. Identification of Security Factors in Cloud Computing: Defence Security Perspective. 7. A Review on Evolving Technology of IOT and OT: Security Threats, Attacks, and Defences. 8. Managing Big Data Integrity for IoT Healthcare Information System. 9. Low-Latency IoT Cloud Platform Enhanced By Fog Computing For Collaboration and Safety. 10. Analyzing the Impact of Security Risk for Securing Healthcare Information Systems. 11. Revisiting Supply Chain Management: Security Perspective. 12. Software Vulnerability Prediction using Deep Learning on the Unbalanced Datasets. 13. Implementation Challenges faced by AI for National Security. 14. Quantum Computing and New Dimensions in Network Security. 15. Cyber Security Technique for Profound Analytic of Big Data using AI. 16. A comprehensive examination of cloud forensics, including challenges and available solutions. 17. Pivotal Role of Cyber Security in IoT-based Smart Cities: An Analytical Framework for Safe Smart Cities. 18. Securing Information Systems through Quantum Computing: Grover's Algorithm Approach.
520 ## - SUMMARY, ETC.
Summary, etc "The text comprehensively discusses soft computing and decision-making techniques like the fuzzy analytic hierarchy process, fuzzy analytic network process, and fuzzy TOPSIS. It further covers a wide range of wireless communication with emerging computational intelligent trends. The text explores the role of wireless technologies in applications touching on various spheres of human life with the help of hesitant fuzzy sets-based computational modeling. This book: Discusses the Internet of Things and cloud computing technologies in promoting cyber security. Highlights the impact of the relationship between security and sustainability, usability, and dependability during securing cyber communication. Evaluating the importance of artificial intelligence and machine learning-based techniques, quantitatively and empirically. Discusses applications of adaptive and learning techniques for secure estimation. Showcases various risks and uses of a multi-criteria decision-making method to manage risks. The text is primarily written for senior undergraduate, graduate students, and academic researchers in the fields of electrical engineering, electronics and communication engineering, computer engineering, and information technology"-- Provided by publisher
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical Term Computer security.
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical Term Technological innovations.
700 ## - ADDED ENTRY--PERSONAL NAME
Personal name Khan, Suhel Ahmad, editor.
700 ## - ADDED ENTRY--PERSONAL NAME
Personal name Faisal, Mohammad (Professor of computer application), editor.
700 ## - ADDED ENTRY--PERSONAL NAME
Personal name Alharbe, Nawaf R., editor.
700 ## - ADDED ENTRY--PERSONAL NAME
Personal name Kumar, Rajeev, 1991- editor.
700 ## - ADDED ENTRY--PERSONAL NAME
Personal name Khan, Ahmad, editor.
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Koha item type Electronic Books
Holdings
Source of acquisition Permanent Location Date acquired Collection code Koha item type Lost status Shelving location Withdrawn status Current Location Full call number
DonationCagayan State University - Carig Library2025-05-24E-BooksElectronic Books E-Resource Section Cagayan State University - Carig Library005.8 C7383 2025

Cagayan State University University Library, Carig Campus
Tuguegarao City, Cagayan 3500 | www.csucarig.edu.ph

Powered by Koha