The Fusion of Artificial Intelligence and Soft Computing Techniques for Cybersecurity
Herausgeber: Jabbar, M. A.; Pani, Subhendu Kumar; Huang, Stephen; Tiwari, Sanju
The Fusion of Artificial Intelligence and Soft Computing Techniques for Cybersecurity
Herausgeber: Jabbar, M. A.; Pani, Subhendu Kumar; Huang, Stephen; Tiwari, Sanju
- Gebundenes Buch
- Merkliste
- Auf die Merkliste
- Bewerten Bewerten
- Teilen
- Produkt teilen
- Produkterinnerung
- Produkterinnerung
Discussess advances in artificial intelligence and soft computing techniques in cybersecurity. It looks at the use of cybersecurity for cloud intelligent systems, applications of cybersecurity techniques for web applications, cybersecurity for cyber-physical systems, edge computing, machine learning, neural gas clustering technique, etc.
Andere Kunden interessierten sich auch für
- Tyson MacaulayCritical Infrastructure201,99 €
- Nikos DaskalakisAn Introduction to Cryptocurrencies163,99 €
- Ruben FernandesBilanzierung von Cloud-Computing-Vereinbarungen nach IFRS. Abschlusspolitik und Abschlussanalyse42,95 €
- David EspindolaSoulful: You in the Future of Artificial Intelligence34,99 €
- Artificial Intelligence in the Gulf132,99 €
- Ad J. W. van de GevelThe Nexus between Artificial Intelligence and Economics37,99 €
- Harry Katzan Jr.On the Trail of Artificial Intelligence50,99 €
-
-
-
Discussess advances in artificial intelligence and soft computing techniques in cybersecurity. It looks at the use of cybersecurity for cloud intelligent systems, applications of cybersecurity techniques for web applications, cybersecurity for cyber-physical systems, edge computing, machine learning, neural gas clustering technique, etc.
Hinweis: Dieser Artikel kann nur an eine deutsche Lieferadresse ausgeliefert werden.
Hinweis: Dieser Artikel kann nur an eine deutsche Lieferadresse ausgeliefert werden.
Produktdetails
- Produktdetails
- Verlag: Apple Academic Press Inc.
- Seitenzahl: 274
- Erscheinungstermin: 28. Juni 2024
- Englisch
- Abmessung: 229mm x 152mm
- Gewicht: 703g
- ISBN-13: 9781774914809
- ISBN-10: 1774914808
- Artikelnr.: 70164625
- Verlag: Apple Academic Press Inc.
- Seitenzahl: 274
- Erscheinungstermin: 28. Juni 2024
- Englisch
- Abmessung: 229mm x 152mm
- Gewicht: 703g
- ISBN-13: 9781774914809
- ISBN-10: 1774914808
- Artikelnr.: 70164625
M. A. Jabbar, PhD, is a Professor and Head of the Department of Computer and Science Engineering (AI & ML), Vardhaman College of Engineering India. He has been teaching for more than 20 years. He has published over 60 papers in journals and conferences and served as a technical committee member for over 70 international conferences. He has co-edited several books and has also been editor for several conferences and has been involved as an organizing chair, program committee chair, publication chair, and reviewer. Sanju Tiwari, PhD, is a Senior Researcher at the Universidad Autonoma de Tamaulipas, Mexico. She has worked as a postdoctoral researcher in the Ontology Engineering Group at the Universidad Polytecnica De Madrid, Spain, and as a research associate for a sponsored research project funded by the Defence Research and Development Organisation, India, where she developed and evaluated a decision support system for Indian defence. Subhendu Kumar Pani, PhD, is Professor in the Department of Computer Science and Engineering and Research Coordinator, Krupajal Engineering College, India. He was formerly Professor in the Department of Computer Science and Engineering and Research Coordinator at Orissa Engineering College, India. He has more than 100 international publications, five authored books, two edited books, and ten book chapters to his credit. His professional activities include roles such as associate editor, editorial board member, and/or reviewer for various international journals. He is associated with a number of conferences and societies. Stephen Huang, PhD, is Professor of Computer Science at the University of Houston, Texas, USA, where he also serves as the Director of Research at the Center for Information Security Research and Education. He has published many journals and conference papers and has supervised and graduated many MSc and PhD students. Dr. Huang served in several administrative positions at UH, including Director of Graduate Studies, Associate Chairman, and Department Chairman. He was a National Research Council-NASA Senior Research Associate at the NASA Goddard Space Flight Center, Greenbelt, Maryland, during 1989-90.
PART I: CYBERSECURITY DURING COVID-19 PANDEMIC 1. An Insight into
Cybersecurity During the COVID-19 Pandemic 2. Cyberattack Surges in the
COVID-19 Scenario: Reasons and Consequences 3. IoT in Security: Impact and
Challenges During a Pandemic 4. Mobile App Development Privacy and Security
Checklist During COVID-19 PART II: CYBERSECURITY FOR CLOUD INTELLIGENT
SYSTEMS 5. Cloud and Edge Computing Security Using Artificial Intelligence
and Soft Computing Techniques 6. Security in IoT Using Artificial
Intelligence 7. Cybersecurity for Intelligent Systems PART III:
APPLICATIONS OF CYBERSECURITY TECHNIQUES FOR WEB APPLICATIONS 8. Analysis
of Advanced Manual Detection and Robust Prevention of Cross-Site Scripting
in Web-Based Services 9. Soft Computing Techniques for Cyber-Physical
Systems 10. Cyber Security Using Machine Learning Approaches: A Systematic
Review PART IV: CYBERSECURITY FOR CYBER-PHYSICAL SYSTEMS 11. Efficient
Vehicle-Tracking System in Dense Traffic to Enhance Security 12. Optimized
Analysis of Network Forensic Attacks Using Enhanced Growing Neural Gas
(GNG) Clustering Technique 13. Security in IoT: Systematic Review
Cybersecurity During the COVID-19 Pandemic 2. Cyberattack Surges in the
COVID-19 Scenario: Reasons and Consequences 3. IoT in Security: Impact and
Challenges During a Pandemic 4. Mobile App Development Privacy and Security
Checklist During COVID-19 PART II: CYBERSECURITY FOR CLOUD INTELLIGENT
SYSTEMS 5. Cloud and Edge Computing Security Using Artificial Intelligence
and Soft Computing Techniques 6. Security in IoT Using Artificial
Intelligence 7. Cybersecurity for Intelligent Systems PART III:
APPLICATIONS OF CYBERSECURITY TECHNIQUES FOR WEB APPLICATIONS 8. Analysis
of Advanced Manual Detection and Robust Prevention of Cross-Site Scripting
in Web-Based Services 9. Soft Computing Techniques for Cyber-Physical
Systems 10. Cyber Security Using Machine Learning Approaches: A Systematic
Review PART IV: CYBERSECURITY FOR CYBER-PHYSICAL SYSTEMS 11. Efficient
Vehicle-Tracking System in Dense Traffic to Enhance Security 12. Optimized
Analysis of Network Forensic Attacks Using Enhanced Growing Neural Gas
(GNG) Clustering Technique 13. Security in IoT: Systematic Review
PART I: CYBERSECURITY DURING COVID-19 PANDEMIC 1. An Insight into
Cybersecurity During the COVID-19 Pandemic 2. Cyberattack Surges in the
COVID-19 Scenario: Reasons and Consequences 3. IoT in Security: Impact and
Challenges During a Pandemic 4. Mobile App Development Privacy and Security
Checklist During COVID-19 PART II: CYBERSECURITY FOR CLOUD INTELLIGENT
SYSTEMS 5. Cloud and Edge Computing Security Using Artificial Intelligence
and Soft Computing Techniques 6. Security in IoT Using Artificial
Intelligence 7. Cybersecurity for Intelligent Systems PART III:
APPLICATIONS OF CYBERSECURITY TECHNIQUES FOR WEB APPLICATIONS 8. Analysis
of Advanced Manual Detection and Robust Prevention of Cross-Site Scripting
in Web-Based Services 9. Soft Computing Techniques for Cyber-Physical
Systems 10. Cyber Security Using Machine Learning Approaches: A Systematic
Review PART IV: CYBERSECURITY FOR CYBER-PHYSICAL SYSTEMS 11. Efficient
Vehicle-Tracking System in Dense Traffic to Enhance Security 12. Optimized
Analysis of Network Forensic Attacks Using Enhanced Growing Neural Gas
(GNG) Clustering Technique 13. Security in IoT: Systematic Review
Cybersecurity During the COVID-19 Pandemic 2. Cyberattack Surges in the
COVID-19 Scenario: Reasons and Consequences 3. IoT in Security: Impact and
Challenges During a Pandemic 4. Mobile App Development Privacy and Security
Checklist During COVID-19 PART II: CYBERSECURITY FOR CLOUD INTELLIGENT
SYSTEMS 5. Cloud and Edge Computing Security Using Artificial Intelligence
and Soft Computing Techniques 6. Security in IoT Using Artificial
Intelligence 7. Cybersecurity for Intelligent Systems PART III:
APPLICATIONS OF CYBERSECURITY TECHNIQUES FOR WEB APPLICATIONS 8. Analysis
of Advanced Manual Detection and Robust Prevention of Cross-Site Scripting
in Web-Based Services 9. Soft Computing Techniques for Cyber-Physical
Systems 10. Cyber Security Using Machine Learning Approaches: A Systematic
Review PART IV: CYBERSECURITY FOR CYBER-PHYSICAL SYSTEMS 11. Efficient
Vehicle-Tracking System in Dense Traffic to Enhance Security 12. Optimized
Analysis of Network Forensic Attacks Using Enhanced Growing Neural Gas
(GNG) Clustering Technique 13. Security in IoT: Systematic Review