Computational intelligence applications in cyber security / edited by Suhel Ahmad Khan [and four others].
Item type | Location | Collection | Call number | Status | Date due | Barcode |
---|---|---|---|---|---|---|
![]() |
E-Resource Section | E-Books | 005.8 C7383 2025 (Browse shelf) | Available |
Includes bibliographical references and index.
1. A Transition from Industry 4.0 to Industry 5.0: Securing Industry 5.0 for Sustainability. 2. Security Estimation of Software by Support Vector Machines: Defence Perspective. 3. Securing Industry 5.0 Data through Unified Emerging Technologies. 4. Blockchain Technologies: Shaping Futuristic Smart Countries. 5. Blockchain Role in Enhancing Financial Risk Management in Banking Sector using Correlation Analysis. 6. Identification of Security Factors in Cloud Computing: Defence Security Perspective. 7. A Review on Evolving Technology of IOT and OT: Security Threats, Attacks, and Defences. 8. Managing Big Data Integrity for IoT Healthcare Information System. 9. Low-Latency IoT Cloud Platform Enhanced By Fog Computing For Collaboration and Safety. 10. Analyzing the Impact of Security Risk for Securing Healthcare Information Systems. 11. Revisiting Supply Chain Management: Security Perspective. 12. Software Vulnerability Prediction using Deep Learning on the Unbalanced Datasets. 13. Implementation Challenges faced by AI for National Security. 14. Quantum Computing and New Dimensions in Network Security. 15. Cyber Security Technique for Profound Analytic of Big Data using AI. 16. A comprehensive examination of cloud forensics, including challenges and available solutions. 17. Pivotal Role of Cyber Security in IoT-based Smart Cities: An Analytical Framework for Safe Smart Cities. 18. Securing Information Systems through Quantum Computing: Grover's Algorithm Approach.
"The text comprehensively discusses soft computing and decision-making techniques like the fuzzy analytic hierarchy process, fuzzy analytic network process, and fuzzy TOPSIS. It further covers a wide range of wireless communication with emerging computational intelligent trends. The text explores the role of wireless technologies in applications touching on various spheres of human life with the help of hesitant fuzzy sets-based computational modeling. This book: Discusses the Internet of Things and cloud computing technologies in promoting cyber security. Highlights the impact of the relationship between security and sustainability, usability, and dependability during securing cyber communication. Evaluating the importance of artificial intelligence and machine learning-based techniques, quantitatively and empirically. Discusses applications of adaptive and learning techniques for secure estimation. Showcases various risks and uses of a multi-criteria decision-making method to manage risks. The text is primarily written for senior undergraduate, graduate students, and academic researchers in the fields of electrical engineering, electronics and communication engineering, computer engineering, and information technology"-- Provided by publisher
There are no comments for this item.