1st Edition

Computational Intelligence Applications in Cyber Security

    392 Pages 68 B/W Illustrations
    by CRC Press

    The text comprehensively discusses soft computing and decision-making techniques like the fuzzy analytic hierarchy process, fuzzy analytic network process, and fuzzy TOPSIS. It further covers a wide range of wireless communication with emerging computational intelligent trends. The text explores the role of wireless technologies in applications touching on various spheres of human life with the help of hesitant fuzzy sets-based computational modeling.

    This book:

    • Discusses the Internet of Things and cloud computing technologies in promoting cyber security.                                                                                        
    • Highlights the impact of the relationship between security and sustainability, usability, and dependability during securing cyber communication.                                   
    • Evaluating the importance of artificial intelligence and machine learning-based techniques, quantitatively and empirically.                                                              
    • Discusses applications of adaptive and learning techniques for secure estimation.      
    • Showcases various risks and uses of a multi-criteria decision-making method to manage risks.                                                                                           

    The text is primarily written for senior undergraduate, graduate students, and academic researchers in the fields of electrical engineering, electronics and communication engineering, computer engineering, and information technology.

    1.     A Transition from Industry 4.0 to Industry 5.0: Securing Industry 5.0 for Sustainability

    Sandeep Kumar Verma, Vishal Verma, Md Tarique Jamal Ansar

    2.     Security Estimation of Software by Support Vector Machines: Defence Perspective

    Amitabha Yadav, Syed Anas Ansar, Manu Gautam, Sakshi Pandey, Tushar Chandra, Khushi Naik

    3.     Securing Industry 5.0 Data through Unified Emerging Technologies

    Archana Singh, Kavita Sahu, Bineet Kumar Gupta

    4.     Blockchain Technologies: Shaping Futuristic Smart Countries

    Abhay Kumar Yadav, Virendra P. Vishwakarma

    5.     Blockchain Role in Enhancing Financial Risk Management in Banking Sector using Correlation Analysis

    Abhay Kumar Yadav, Virendra P. Vishwakarma

    6.     Identification of Security Factors in Cloud Computing: Defence Security Perspective

    Mohd Nadeem, Prabhash Chandra Pathak, Masood Ahmad, Nafees Akhter Farooqui

    7.     A Review on Evolving Technology of IOT and OT: Security Threats, Attacks, and Defences

    Aditya Pratap Singh, Kavita Sahu

    8.     Managing Big Data Integrity for IoT Healthcare Information System

    Sarita Shukla, Bineet Kumar Gupta, Pallavi Somvanshi, Mukesh Mishra

    9.     Low-Latency IoT Cloud Platform Enhanced By Fog Computing For Collaboration and Safety

    Eram Fatima Siddiqui, Sandeep Kumar Nayak

    10.  Analyzing the Impact of Security Risk for Securing Healthcare Information Systems

    Kavita Sahu, R. K. Srivastava, Abhishek Kumar Pandey and Kotaiah Bonthu

    11.  Revisiting Supply Chain Management: Security Perspective

    Satya Bhushan Verma, Abhay Kumar Yadav

    12.  Software Vulnerability Prediction using Deep Learning on the Unbalanced Datasets

    Wasiur Rhmann, Amaan Ishrat, Jalaluddin Khan,  Dr. Jamal Akhtar Khan

    13.  Implementation Challenges faced by AI for National Security

    Prabhat Kumar Srivastava, Basudeo Singh Roohani, Rohit Aggarwal, Nitin Sharma

    14.  Quantum Computing and New Dimensions in Network Security

    M. Joshi, Alka, M. K. Mishra

    15.  Cyber Security Technique for Profound Analytic of Big Data using AI

    Mohd Haroon, Afsaruddin Khan, Manish Madhava Tripathi, Shish Ahmad,  Kalamuddin Ahmad

    16. A comprehensive examination of cloud forensics, including challenges and available solutions

    Narayan P. Bhosale, Gaurav Chaudhari, Vijay Kumar Vishwakarma, Dhananjay Deshpande, Siddharth Dabade

    17. Pivotal Role of Cyber Security in IoT-based Smart Cities: An Analytical Framework for Safe Smart Cities

    Saurabh Srivastava, Tasneem Ahmed, Nayyar Ali Usmani

    18. Securing Information Systems through Quantum Computing: Grover's Algorithm Approach

    Mohd Nadeem, Amal Krishna Sarkar, Mohammed Ishrat

    Biography

    Suhel Ahmad Khan is currently working as an Assistant Professor in the Department of Computer Science, Indira Gandhi National Tribal University (A Central University), Amarkantak, Madhya Pradesh. He has 10 years of teaching & research experience. His areas of interest are Software Engineering, Software Security, Security Testing, Cyber Security, and Network Security. He has completed one major research project with PI funded by UGC, New Delhi. He has published numerous papers in international journals and conferences. Dr. Suhel Ahmad Khan is an active member of various professional bodies IAENG, ISOC-USA, IACSIT, and UACEE.

    Mohammad Faisal is currently working as an Associate Professor and Head of the Department in the Department of Computer Application, Integral University, Lucknow, India. He has more than 15 years of teaching & research experience. His areas of interest are Software Engineering, Requirement Volatility, Distributed Operating System, Cyber Security, and Mobile Computing. He has published a book “Requirement Risk Management: A Practioner’s Approach”. He has published quality research papers in Journals, National and International Conferences of repute. He is contributing his knowledge and experience as member of Editorial Board/Advisory committee and TPC in various international Journals/Conferences of repute. Dr. Mohammad Faisal is an active member of various professional bodies IAENG, CSTA, ISOC-USA, EASST, HPC, ISTE, IAENG, and UACEE.

    Nawaf Alharbe, is currently working as Vice Dean of the Applied College, Badr, Taibah University, Kingdom of Saudi Arabia. He has also led the Department of Computing, Taibah University as the capacity of the Head from 2016 to 2019.  He has done his Ph D degree in Computer Science from Faculty of Computing, Engineering and Sciences, Staffordshire University, United Kigdom where he has earned Five Excellence Certificates (during the Ph.D. course 2012 - 2015), Saudi Arabian Cultural Bureau, United Kingdom. He has completed one Project on Smart Hospital Management Information System for Healthcare Transformation in Saudi Arabi from 2013 to 2016 and one Major Project is currently running on Health Informatics. Overall, he has authored/co-authored over 25 international publications including Journal articles, Conference Proceedings, Book Chapters, and books. Dr. Nawaf Alharbe’s research interest focuses on Knowledge Management Systems in Smart healthcare operations using emerging technology such as RFID, ZigBee, Internet of Things (IoT), Cloud Computing. Artificial Intelligence o Machine Learning, Big Data & Data Processing, Knowledge Engineering, Knowledge harvesting and Healthcare Applications. 

    Rajeev Kumar is currently working as an Assistant Professor in the Centre for Innovation and Technology at the Administrative Staff College of India, Hyderabad, Telangana, India. Dr. Kumar has more than 9 years of research & teaching experience. He has published numerous papers in international journals and conferences. His research interests are in the different areas of Security Engineering and Computational Techniques.

    Raees Ahmad Khan (Member, IEEE, ACM, CSI etc.) is currently working as a Professor in the Department of Information Technology, Dean of School for Information Science & Technology, Babasaheb Bhimrao Ambedkar University, (A Central University), Vidya Vihar, Raebareli Road, Lucknow, India. Prof. Khan has more than 20 years of teaching & research experience. Prof. Khan has published more than 300 research publications with good impact factors in reputed International Journals and Conferences. He has published a number of National and International Books (Authored and Edited) (including Chinese Language). His research interests are in the different areas of Security Engineering and Computational Techniques.