Book description
The main objective of this book is to introduce cyber security using modern technologies like AI, Quantum Cryptography and Blockchain. This unique and comprehensive solution for cyber security of modern networks will greatly benefit researchers, graduate students and engineers in the fields of cryptography and network security.
Table of contents
- Cover
- Half Title
- Title Page
- Copyright Page
- Table of Contents
- Preface
- Acknowledgments
- Editors
- List of Contributors
- Chapter 1 Quantum Computing: A Global Scenario
- Chapter 2 Post-Quantum Digital Signatures
- Chapter 3 Analysis of Quantum Computing with Food Processing Use Case
- Chapter 4 Security of Modern Networks and Its Challenges
- Chapter 5 Security and Performance Analysis of Advanced Metering Infrastructure in Smart Grid and Use of Blockchain in Security Perspective
- Chapter 6 Computation and Storage Efficient Key Distribution Protocol for Secure Multicast Communication in Centralized Environments
- Chapter 7 Effective Key Agreement Protocol for Large and Dynamic Groups Using Elliptic Curve Cryptography
- Chapter 8 Cyber Security Using Artificial Intelligence
- Chapter 9 Cloud Computing: An Overview of Security Risk Assessment Models and Frameworks
- Chapter 10 Generating Cyber Threat Intelligence to Discover Potential Security Threats Using Classification and Topic Modeling
- Chapter 11 Cyber-Physical Energy Systems Security: Attacks, Vulnerabilities and Risk Management
- Chapter 12 Intrusion Detection Using Machine Learning
- Chapter 13 Network Forensics
- Chapter 14 A Deep Neural Network-Based Biometric Random Key Generator for Security Enhancement
- Chapter 15 Quantum Computing and Its Real-World Applications
- Chapter 16 Encrypted Network Traffic Classification and Application Identification Employing Deep Learning
- Index
Product information
- Title: Cyber Security Using Modern Technologies
- Author(s):
- Release date: August 2023
- Publisher(s): CRC Press
- ISBN: 9781000908060
You might also like
book
Resilient Cybersecurity
Build a robust cybersecurity program that adapts to the constantly evolving threat landscape Key Features Gain …
video
AI-Enabled Programming, Networking, and Cybersecurity
Learn practical applications with ChatGPT, Claude, Copilot, LangChain, LlamaIndex, and AI models. Overview 2.5 hours of …
book
Open-Source Security Operations Center (SOC)
A comprehensive and up-to-date exploration of implementing and managing a security operations center in an open-source …
book
Inside Cyber
Discover how to navigate the intersection of tech, cybersecurity, and commerce In an era where technological …