Buch, Englisch, 187 Seiten, Format (B × H): 155 mm x 235 mm, Gewicht: 312 g
Reihe: EAI/Springer Innovations in Communication and Computing
Buch, Englisch, 187 Seiten, Format (B × H): 155 mm x 235 mm, Gewicht: 312 g
Reihe: EAI/Springer Innovations in Communication and Computing
ISBN: 978-3-030-90710-5
Verlag: Springer
This book presents a comprehensive reference source for dynamic and innovative research in the field of cyber security, focusing on nature-inspired research and applications. The authors present the design and development of future-ready cyber security measures, providing a critical and descriptive examination of all facets of cyber security with a special focus on recent technologies and applications. The book showcases the advanced defensive cyber security mechanism that is a requirement in the industry and highlights measures that provide efficient and fast solutions. The authors explore the potential of AI-based and nature-inspired based computing compatibilities in establishing an adaptive defense mechanism system. The book focuses on current research while highlighting the empirical results along with theoretical concepts to provide a reference for students, researchers, scholars, professionals, and practitioners in the field of cyber security and analytics. This book features contributions from leading scholars from all over the world.
Zielgruppe
Research
Autoren/Hrsg.
Fachgebiete
- Technische Wissenschaften Elektronik | Nachrichtentechnik Nachrichten- und Kommunikationstechnik
- Mathematik | Informatik EDV | Informatik Informatik Berechenbarkeitstheorie, Komplexitätstheorie
- Mathematik | Informatik EDV | Informatik Informatik Künstliche Intelligenz
- Mathematik | Informatik EDV | Informatik Technische Informatik Computersicherheit
Weitere Infos & Material
1) Nature-inspired Cyber Security and Resilience: An Overview2) Detection of Reconnaissance Attacks on IoT Devices Using Deep Neural Networks3) Particle Swarm Optimization driven DSE based Low Cost Hardware Security for Securing DSP IP Cores4) Malicious Activity Detection in IoT Networks: A Nature-Inspired Approach5) Nature-inspired malware & anomaly detection in android-based systems6) A Review of Artificial Intelligence and Machine Learning Methods for Cybersecurity Applications7) A Nature Inspired DNA Encoding Technique for Quantum Session Key Exchange Protocol8) Novel Hybridized Crow Optimization for Secure Data Transmission in Cyber Networks9) Malware attacks: Dimensions, Impact, and Defenses




