The Fusion of Artificial Intelligence and Soft Computing Techniques for Cybersecurity

The Fusion of Artificial Intelligence and Soft Computing Techniques for Cybersecurity

The Fusion of Artificial Intelligence and Soft Computing Techniques for Cybersecurity

The Fusion of Artificial Intelligence and Soft Computing Techniques for Cybersecurity

eBook

$127.49  $169.95 Save 25% Current price is $127.49, Original price is $169.95. You Save 25%.
Available for Pre-Order. This item will be released on June 28, 2024

Available on Compatible NOOK devices, the free NOOK App and in My Digital Library.
WANT A NOOK?  Explore Now

Related collections and offers


Overview

With the ever-increasing threat of cyber-attacks, especially as the COVID-19 pandemic helped to ramp up the use of digital communications technology, there is a continued need to find new ways to maintain and improve cybersecurity. This new volume investigates the advances in artificial intelligence and soft computing techniques in cybersecurity. It specifically looks at cybersecurity during the COVID-19 pandemic, the use of cybersecurity for cloud intelligent systems, applications of cybersecurity techniques for web applications, and cybersecurity for cyber-physical systems. A diverse array of technologies and techniques are explored for cybersecurity applications, such as the Internet of Things, edge computing, cloud computing, artificial intelligence, soft computing, machine learning, cross-site scripting in web-based services, neural gas (GNG) clustering technique, and more.


Product Details

ISBN-13: 9781000925449
Publisher: Apple Academic Press
Publication date: 06/28/2024
Series: AAP Advances in Artificial Intelligence and Robotics
Sold by: Barnes & Noble
Format: eBook
Pages: 294
File size: 11 MB
Note: This product may take a few minutes to download.

About the Author

M. A. Jabbar, PhD, is a Professor and Head of the Department of Computer and Science Engineering (AI & ML), Vardhaman College of Engineering India. He has been teaching for more than 20 years. He has published over 60 papers in journals and conferences and served as a technical committee member for over 70 international conferences. He has co-edited several books and has also been editor for several conferences and has been involved as an organizing chair, program committee chair, publication chair, and reviewer.

Sanju Tiwari, PhD, is a Senior Researcher at the Universidad Autonoma de Tamaulipas, Mexico. She has worked as a postdoctoral researcher in the Ontology Engineering Group at the Universidad Polytecnica De Madrid, Spain, and as a research associate for a sponsored research project funded by the Defence Research and Development Organisation, India, where she developed and evaluated a decision support system for Indian defence.

Subhendu Kumar Pani, PhD, is Professor in the Department of Computer Science and Engineering and Research Coordinator, Krupajal Engineering College, India. He was formerly Professor in the Department of Computer Science and Engineering and Research Coordinator at Orissa Engineering College, India. He has more than 100 international publications, five authored books, two edited books, and ten book chapters to his credit. His professional activities include roles such as associate editor, editorial board member, and/or reviewer for various international journals. He is associated with a number of conferences and societies.

Stephen Huang, PhD, is Professor of Computer Science at the University of Houston, Texas, USA, where he also serves as the Director of Research at the Center for Information Security Research and Education. He has published many journals and conference papers and has supervised and graduated many MSc and PhD students. Dr. Huang served in several administrative positions at UH, including Director of Graduate Studies, Associate Chairman, and Department Chairman. He was a National Research Council–NASA Senior Research Associate at the NASA Goddard Space Flight Center, Greenbelt, Maryland, during 1989-90.

Table of Contents

PART I: CYBERSECURITY DURING COVID-19 PANDEMIC 1. An Insight into Cybersecurity During the COVID-19 Pandemic 2. Cyberattack Surges in the COVID-19 Scenario: Reasons and Consequences 3. IoT in Security: Impact and Challenges During a Pandemic 4. Mobile App Development Privacy and Security Checklist During COVID-19 PART II: CYBERSECURITY FOR CLOUD INTELLIGENT SYSTEMS 5. Cloud and Edge Computing Security Using Artificial Intelligence and Soft Computing Techniques 6. Security in IoT Using Artificial Intelligence 7. Cybersecurity for Intelligent Systems PART III: APPLICATIONS OF CYBERSECURITY TECHNIQUES FOR WEB APPLICATIONS 8. Analysis of Advanced Manual Detection and Robust Prevention of Cross-Site Scripting in Web-Based Services 9. Soft Computing Techniques for Cyber-Physical Systems 10. Cyber Security Using Machine Learning Approaches: A Systematic Review PART IV: CYBERSECURITY FOR CYBER-PHYSICAL SYSTEMS 11. Efficient Vehicle-Tracking System in Dense Traffic to Enhance Security 12. Optimized Analysis of Network Forensic Attacks Using Enhanced Growing Neural Gas (GNG) Clustering Technique 13. Security in IoT: Systematic Review

From the B&N Reads Blog

Customer Reviews