1st Edition

The Fusion of Artificial Intelligence and Soft Computing Techniques for Cybersecurity

    294 Pages 67 B/W Illustrations
    by Apple Academic Press

    294 Pages 67 B/W Illustrations
    by Apple Academic Press

    With the ever-increasing threat of cyber-attacks, especially as the COVID-19 pandemic helped to ramp up the use of digital communications technology, there is a continued need to find new ways to maintain and improve cybersecurity. This new volume investigates the advances in artificial intelligence and soft computing techniques in cybersecurity. It specifically looks at cybersecurity during the COVID-19 pandemic, the use of cybersecurity for cloud intelligent systems, applications of cybersecurity techniques for web applications, and cybersecurity for cyber-physical systems. A diverse array of technologies and techniques are explored for cybersecurity applications, such as the Internet of Things, edge computing, cloud computing, artificial intelligence, soft computing, machine learning, cross-site scripting in web-based services, neural gas (GNG) clustering technique, and more.

    PART I: CYBERSECURITY DURING COVID-19 PANDEMIC

    1. An Insight into Cybersecurity During the Covid-19 Pandemic

    Rayeesa Tasneem and M. A. Jabbar

    2. Cyberattack Surges in the COVID-19 Scenario: Reasons and Consequences

    Neeranjan Chitare, Maitreyee Ghosh, Shankru Guggari, and M. A. Jabbar

    3. IoT in Security: Impact and Challenges During the Pandemic

    Sonia Sharma

    4. Mobile App Development Privacy and Security Checklist During COVID-19

    Hena Iqbal, Tanjinsikder, Yasmin Alhayek, Noora Alfurais, and Nujuom Assar

    PART II: CYBERSECURITY FOR CLOUD INTELLIGENT SYSTEMS

    5. Cloud and Edge Computing Security Using Artificial Intelligence and Soft Computing Techniques

    N. S. Gowri Ganesh, R. Roopa Chandrika, and A. Mummoorthy

    6. Security in IoT Using Artificial Intelligence

    Sanchari Saha

    7. Cybersecurity for Intelligent Systems

    Abinaya Inbamani, N. Divya, R. R. Rubia Gandhi, M. Karthik, and M. Sivaram Kumar

    PART III: APPLICATIONS OF CYBERSECURITY TECHNIQUES FOR WEB APPLICATIONS

    8. Analysis of Advance Manual Detection and Robust Prevention of Cross-Site Scripting in Web-Based Services

    Smit Sawant, Gaurav Choudhary, Shishir Kumar Shandilya, Lokesh Giripunje, And Vikas Sihag

    9. Soft Computing Techniques for Cyber-Physical Systems

    R. R. Rubia Gandhi, Abinaya Inbamani, N. Divya, M. Karthik, and E. Ramya

    10. Cyber Security Using Machine Learning Approaches: A Systematic Review

    Mohankumar K. N. and Pavankumar E.

    PART IV: CYBERSECURITY FOR CYBER-PHYSICAL SYSTEMS

    11. Efficient Vehicle-Tracking System in Dense Traffic to Enhance Security

    Bharathi S., Amisha R. Naik, and Piyush Kumar Pareek

    12. Optimized Analysis of Network Forensic Attacks Using an Enhanced Growing Neural Gas (GNG) Clustering Technique

    A. Dhanu Saswanth, V. Kavitha, B. Sundaravadivazhagan, and R. Karthikeyan

    13. Security in IoT: Systematic Review

    K. Tejasvi, Ruqqaiya Begum, and M. A. Jabbar

    Biography

    M. A. Jabbar, PhD, is a Professor and Head of the Department of Computer and Science Engineering (AI & ML), Vardhaman College of Engineering India. He has been teaching for more than 20 years. He has published over 60 papers in journals and conferences and served as a technical committee member for over 70 international conferences. He has co-edited several books and has also been editor for several conferences and has been involved as an organizing chair, program committee chair, publication chair, and reviewer.

    Sanju Tiwari, PhD, is a Senior Researcher at the Universidad Autonoma de Tamaulipas, Mexico. She has worked as a postdoctoral researcher in the Ontology Engineering Group at the Universidad Polytecnica De Madrid, Spain, and as a research associate for a sponsored research project funded by the Defence Research and Development Organisation, India, where she developed and evaluated a decision support system for Indian defence.

    Subhendu Kumar Pani, PhD, is Professor in the Department of Computer Science and Engineering and Research Coordinator, Krupajal Engineering College, India. He was formerly Professor in the Department of Computer Science and Engineering and Research Coordinator at Orissa Engineering College, India. He has more than 100 international publications, five authored books, two edited books, and ten book chapters to his credit. His professional activities include roles such as associate editor, editorial board member, and/or reviewer for various international journals. He is associated with a number of conferences and societies.

    Stephen Huang, PhD, is Professor of Computer Science at the University of Houston, Texas, USA, where he also serves as the Director of Research at the Center for Information Security Research and Education. He has published many journals and conference papers and has supervised and graduated many MSc and PhD students. Dr. Huang served in several administrative positions at UH, including Director of Graduate Studies, Associate Chairman, and Department Chairman. He was a National Research Council–NASA Senior Research Associate at the NASA Goddard Space Flight Center, Greenbelt, Maryland, during 1989-90.