Cyber Security Using Modern Technologies Artificial Intelligence, Blockchain and Quantum Cryptography PDF

Cyber Security Using Modern Technologies Artificial Intelligence, Blockchain and Quantum Cryptography PDF

Name:
Cyber Security Using Modern Technologies Artificial Intelligence, Blockchain and Quantum Cryptography PDF

Published Date:
01/01/2024

Status:
[ Active ]

Description:

Publisher:
CRC Press Books

Document status:
Active

Format:
Electronic (PDF)

Delivery time:
10 minutes

Delivery time (for Russian version):
200 business days

SKU:

Choose Document Language:
$46.2
Need Help?
ISBN: 9781000908022

The main objective of this book is to introduce cyber security using modern technologies such as Artificial Intelligence, Quantum Cryptography, and Blockchain. This book provides in-depth coverage of important concepts related to cyber security. Beginning with an introduction to Quantum Computing, Post-Quantum Digital Signatures, and Artificial Intelligence for cyber security of modern networks and covering various cyber-attacks and the defense measures, strategies, and techniques that need to be followed to combat them, this book goes on to explore several crucial topics, such as security of advanced metering infrastructure in smart grids, key management protocols, network forensics, intrusion detection using machine learning, cloud computing security risk assessment models and frameworks, cyber-physical energy systems security, a biometric random key generator using deep neural network and encrypted network traffic classification. In addition, this book provides new techniques to handle modern threats with more intelligence. It also includes some modern techniques for cyber security, such as blockchain for modern security, quantum cryptography, and forensic tools. Also, it provides a comprehensive survey of cutting-edge research on the cyber security of modern networks, giving the reader a general overview of the field. It also provides interdisciplinary solutions to protect modern networks from any type of attack or manipulation. The new protocols discussed in this book thoroughly examine the constraints of networks, including computation, communication, and storage cost constraints, and verifies the protocols both theoretically and experimentally. Written in a clear and comprehensive manner, this book would prove extremely helpful to readers. This unique and comprehensive solution for the cyber security of modern networks will greatly benefit researchers, graduate students, and engineers in the fields of cryptography and network security.

Authors: Om Pal, Vinod Kumar, Rijwan Khan, Bashir Alam, Mansaf Alam


Edition : 1.
Number of Pages : 289
Published : 01/01/2024
isbn : 9781000908022

History


Related products


Best-Selling Products

DANSK DS 1051.2
Published Date: 01/01/1980
Brandprøvning. Modstandsevne mod brand. Døre
$12.6
DANSK DS 1052.1
Published Date: 01/01/1985
Brandteknisk klassifikation. Bygningsdele eksklusive døre. Modstandsevne mod brand
$6.9
DANSK DS 1052.2
Published Date: 01/01/1985
Brandteknisk klassifikation. Døre. Modstandsevne mod brand
$6.9
DANSK DS 1052
Published Date: 01/21/2021
Brandteknisk klassifikation af bygningsdele (ekskl. døre)
$6.9
DANSK DS 1107
Published Date: 01/01/1978
Trapper. Terminologi
$6.9
DANSK DS 1140
Published Date: 08/20/2019
Udførelse af bærende konstruktioner – Almen kontrol
$24.9