libri scuola books Fumetti ebook dvd top ten sconti 0 Carrello


pal om (curatore); kumar vinod (curatore); khan rijwan (curatore); alam bashir (curatore); alam mansaf (curatore) - cyber security using modern technologies
Zoom

Cyber Security Using Modern Technologies Artificial Intelligence, Blockchain and Quantum Cryptography

; ; ; ;




Disponibilità: Normalmente disponibile in 20 giorni
A causa di problematiche nell'approvvigionamento legate alla Brexit sono possibili ritardi nelle consegne.


PREZZO
143,98 €
NICEPRICE
136,78 €
SCONTO
5%



Questo prodotto usufruisce delle SPEDIZIONI GRATIS
selezionando l'opzione Corriere Veloce in fase di ordine.


Pagabile anche con Carta della cultura giovani e del merito, 18App Bonus Cultura e Carta del Docente


Facebook Twitter Aggiungi commento


Spese Gratis

Dettagli

Genere:Libro
Lingua: Inglese
Editore:

CRC Press

Pubblicazione: 08/2023
Edizione: 1° edizione





Note Editore

The main objective of this book is to introduce cyber security using modern technologies such as Artificial Intelligence, Quantum Cryptography, and Blockchain. This book provides in-depth coverage of important concepts related to cyber security. Beginning with an introduction to Quantum Computing, Post-Quantum Digital Signatures, and Artificial Intelligence for cyber security of modern networks and covering various cyber-attacks and the defense measures, strategies, and techniques that need to be followed to combat them, this book goes on to explore several crucial topics, such as security of advanced metering infrastructure in smart grids, key management protocols, network forensics, intrusion detection using machine learning, cloud computing security risk assessment models and frameworks, cyber-physical energy systems security, a biometric random key generator using deep neural network and encrypted network traffic classification. In addition, this book provides new techniques to handle modern threats with more intelligence. It also includes some modern techniques for cyber security, such as blockchain for modern security, quantum cryptography, and forensic tools. Also, it provides a comprehensive survey of cutting-edge research on the cyber security of modern networks, giving the reader a general overview of the field. It also provides interdisciplinary solutions to protect modern networks from any type of attack or manipulation. The new protocols discussed in this book thoroughly examine the constraints of networks, including computation, communication, and storage cost constraints, and verifies the protocols both theoretically and experimentally. Written in a clear and comprehensive manner, this book would prove extremely helpful to readers. This unique and comprehensive solution for the cyber security of modern networks will greatly benefit researchers, graduate students, and engineers in the fields of cryptography and network security.




Sommario

Preface Acknowledgments Editors List of Contributors Chapter 1 Quantum Computing: A Global Scenario Om Pal, Vinod Kumar, Vinay Thakur, and Bashir Alam Chapter 2 Post-Quantum Digital Signatures N. Sarat Chandra Babu and M. Prem Laxman Das Chapter 3 Analysis of Quantum Computing with Food Processing Use Case Dhaval S. Jha, Het Shah, and Jai Prakash Verma Chapter 4 Security of Modern Networks and Its Challenges Apurv Garg, Bhartendu Sharma, Anmol Gupta, and Rijwan Khan Chapter 5 Security and Performance Analysis of Advanced Metering Infrastructure in Smart Grid and Use of Blockchain in Security Perspective Khushboo Gupta and Vinod Kumar Chapter 6 Computation and Storage Efficient Key Distribution Protocol for Secure Multicast Communication in Centralized Environments Vinod Kumar, Khushboo Gupta, Om Pal, Rajendra Kumar, Pradeep Kumar Tiwari, Narendra Kumar Updhyay, and Mukesh Kumar Bhardwaj Chapter 7 Effective Key Agreement Protocol for Large and Dynamic Groups Using Elliptic Curve Cryptography Vinod Kumar, Khushboo Gupta, Om Pal, Shiv Prakash, Pravin Kumar, Shiv Veer Singh, Pradeep Kumar Tiwari, and Animesh Tripathi Chapter 8 Cyber Security Using Artificial Intelligence Sapna Katiyar Chapter 9 Cloud Computing: An Overview of Security Risk Assessment Models and Frameworks Subarna Ghosh, Nafees Mansoor, and Mohammad Shahriar Rahman Chapter 10 Generating Cyber Threat Intelligence to Discover Potential Security Threats Using Classification and Topic Modeling Md Imran Hossen, Ashraful Islam, Farzana Anowar, Eshtiak Ahmed, and Mohammed Masudur Rahman Chapter 11 Cyber-Physical Energy Systems Security: Attacks, Vulnerabilities and Risk Management Sayada Sonia Akter, Rezwan Ahmed, Ferdous Hasan Khan, and Mohammad Shahriar Rahman Chapter 12 Intrusion Detection Using Machine Learning Rijwan Khan, Aditi Tiwari, Aashna Kapoor, and Abhyudaya Mittal Chapter 13 Network Forensics Sandeep Kaur, Manjit Sandhu, Sandeep Sharma, and Ravinder Singh Sawhney Chapter 14 A Deep Neural Network-Based Biometric Random Key Generator for Security Enhancement Sannidhan M. S., Jason Elroy Martis, and Sudeepa K. B. Chapter 15 Quantum Computing and Its Real-World Applications Pawan Mishra, Ravi Kamal Pandey, and Pooja Chapter 16 Encrypted Network Traffic Classification and Application Identification Employing Deep Learning Jyoti Mishra and Mahendra Tiwari Index




Autore

Dr. Om Pal received B.E. in Computer Science & Engineering from Dr. B. R. Ambedkar University, Agra, MBA in Operation Management from IGNOU, MS (Research) in field of Cryptography from IIT Bombay and Ph.D. in field of Cryptographic Key Management from Jamia Millia Islamia, New Delhi. He has more than 19 years of Academic & Research experience in various areas of Computer Science. He is currently a Scientist-D at Ministry of Electronics and Information Technology, Government of India. He has evolved and worked on many research projects of national interest. Previously he worked at Centre for Development of Advanced Computing (C-DAC) as a Sr. Technical Officer and as an IT Resource Person in National Thermal Power Corporation (NTPC). He has published many research articles in International Journals (Transaction/SCI/Scopus) and International Conferences of repute. He has been nominated in the board of reviewers of various peer-reviewed and refereed Journals. He has delivered many talks on cyber security, Quantum Security and Blockchain Technology. His research interest includes Cryptography, Quantum Cryptography, Cyber Security, Blockchain Technology, Theoretical Computer Science and Cyber Laws. Dr. Vinod Kumar is presently working as Assistant Professor with the department of Electronics and Communication (Computer Science and Engineering), University of Allahabad, Prayagraj, Uttar Pradesh, India. Before joining University of Allahabad, he worked as Assistant Professor in the Department of Computer Science and Engineering, Rajkiya Engineering College (REC) Kannauj, UP, India. Prior to this, he worked as Assistant Professor in the School of Information Technology, Centre for Development of Advanced Computing (C-DAC) Noida UP India. He has received MCA from Uttar Pradesh Technical University (UPTU) Lucknow UP, India in 2005, M.Tech in Computer Science and Engineering from Guru Gobind Singh Indraprastha University (GGSIPU) Delhi in 2011, and Ph.D. in field of Cryptographic from Jamia Millia Islamia (JMI), New Delhi. He has published various quality papers in the reputed International Journals like Elsevier, Springer, Wiley, etc. He has also presented various research papers in reputed International Conferences. He has written two books for undergraduate and postgraduate students of computer science and engineering. He has a rich academics & research experience in various areas of computer science. His research interest includes cryptographic protocols, Key management in multicasting/secure group communications, and authentication protocol and security in WSNs. Dr. Rijwan Khan received his B.Tech Degree in Computer Science & Engineering from BIT, M.Tech in Computer Science & Engineering from IETE, and Ph.D.in Computer Engineering from Jamia Millia Islamia, New Delhi. He has 16 years of Academic & Research Experience in various areas of Computer Science. He is currently working as Professor and Head of Department Computer Science and Engineering at ABES Institute of Technology, Ghaziabad U.P. He is author of three subject books. He published more than 50 research papers in different journals and conferences. He has been nominated in the board of reviewers of various peer-reviewed and refereed Journals. He is the editor of three research books. He chaired three international conferences and was a keynote speaker in some national and international conferences. Prof. Bashir Alam received his B.Tech.(Computer Engineering) from Aligarh Muslim University (A Central University of Government of India), Aligarh, Uttar Pradesh, India, M.Tech.(IT) from Guru Gobind Singh Indraprastha University, Delhi, India and Ph.D., from Jamia Millia Islamia (A Central University of Government of India), New Delhi, India. Currently he is a Professor & Head of the Department, Department of Computer Engineering, Faculty of Engineering and Technology, Jamia Millia Islamia, New Delhi. He has published several research articles/ papers in various reputed International Journals and Conference Proceedings published by reputed publishers like Elsevier, Springer, IEEE etc. He has filed patents on Conditional Access System, Cryptographic systems. His research interests include Block chain Technology, Network Security, GPU Computing, Big Data, Parallel Computing, Soft Computing, Computer Network, Operating System, Distributed and Cloud Computing, Advanced Computer Architecture and Intellectual Property Rights. He is also reviewer for several reputed international journals and Conferences. He is a Life Time Member of ISTE (Indian Society for Technical Education) and other technical societies. Prof. Mansaf Alam has been working as a Professor in the Department of Computer Science, Faculty of Natural Sciences, Jamia Millia Islamia, New Delhi-110025, Young Faculty Research Fellow, DeitY, Govt. of India & Editor-in-Chief, Journal of Applied Information Science. He has published several research articles in reputed Internati










Altre Informazioni

ISBN:

9781032213194

Condizione: Nuovo
Dimensioni: 10 x 7 in Ø 1.52 lb
Formato: Copertina rigida
Illustration Notes:108 b/w images, 47 tables, 22 halftones and 86 line drawings
Pagine Arabe: 272
Pagine Romane: xvi


Dicono di noi