CSU-Carig

LRC WEB OPAC

Your Gateway to Our Library Collection

RedEagle Search
Normal view MARC view ISBD view

Computational intelligence applications in cyber security / edited by Suhel Ahmad Khan [and four others].

Edition statement:First edition Published by : CRC Press, (Boca Raton, FL : ) Physical details: 1 online resource, xxv ; 334 pages. illustrations. ISBN: 9781003514312 (ebk). Year: 2025
Tags from this library: No tags from this library for this title. Add tag(s)
Log in to add tags.
    average rating: 0.0 (0 votes)

Includes bibliographical references and index.

1. A Transition from Industry 4.0 to Industry 5.0: Securing Industry 5.0 for Sustainability. 2. Security Estimation of Software by Support Vector Machines: Defence Perspective. 3. Securing Industry 5.0 Data through Unified Emerging Technologies. 4. Blockchain Technologies: Shaping Futuristic Smart Countries. 5. Blockchain Role in Enhancing Financial Risk Management in Banking Sector using Correlation Analysis. 6. Identification of Security Factors in Cloud Computing: Defence Security Perspective. 7. A Review on Evolving Technology of IOT and OT: Security Threats, Attacks, and Defences. 8. Managing Big Data Integrity for IoT Healthcare Information System. 9. Low-Latency IoT Cloud Platform Enhanced By Fog Computing For Collaboration and Safety. 10. Analyzing the Impact of Security Risk for Securing Healthcare Information Systems. 11. Revisiting Supply Chain Management: Security Perspective. 12. Software Vulnerability Prediction using Deep Learning on the Unbalanced Datasets. 13. Implementation Challenges faced by AI for National Security. 14. Quantum Computing and New Dimensions in Network Security. 15. Cyber Security Technique for Profound Analytic of Big Data using AI. 16. A comprehensive examination of cloud forensics, including challenges and available solutions. 17. Pivotal Role of Cyber Security in IoT-based Smart Cities: An Analytical Framework for Safe Smart Cities. 18. Securing Information Systems through Quantum Computing: Grover's Algorithm Approach.

"The text comprehensively discusses soft computing and decision-making techniques like the fuzzy analytic hierarchy process, fuzzy analytic network process, and fuzzy TOPSIS. It further covers a wide range of wireless communication with emerging computational intelligent trends. The text explores the role of wireless technologies in applications touching on various spheres of human life with the help of hesitant fuzzy sets-based computational modeling. This book: Discusses the Internet of Things and cloud computing technologies in promoting cyber security. Highlights the impact of the relationship between security and sustainability, usability, and dependability during securing cyber communication. Evaluating the importance of artificial intelligence and machine learning-based techniques, quantitatively and empirically. Discusses applications of adaptive and learning techniques for secure estimation. Showcases various risks and uses of a multi-criteria decision-making method to manage risks. The text is primarily written for senior undergraduate, graduate students, and academic researchers in the fields of electrical engineering, electronics and communication engineering, computer engineering, and information technology"-- Provided by publisher

There are no comments for this item.

Log in to your account to post a comment.

Cagayan State University University Library, Carig Campus
Tuguegarao City, Cagayan 3500 | www.csucarig.edu.ph

Powered by Koha