Innovative Machine Learning Applications for Cryptography

Innovative Machine Learning Applications for Cryptography

Indexed In: SCOPUS
Release Date: March, 2024|Copyright: © 2024 |Pages: 294
DOI: 10.4018/979-8-3693-1642-9
ISBN13: 9798369316429|ISBN13 Softcover: 9798369346877|EISBN13: 9798369316436
Hardcover:
Available
$300.00
TOTAL SAVINGS: $300.00
Benefits
  • Printed-On-Demand (POD)
  • Usually ships one day from order
Hardcover:
Available
$300.00
TOTAL SAVINGS: $300.00
Benefits
  • Printed-On-Demand (POD)
  • Usually ships one day from order
E-Book:
Available
$300.00
TOTAL SAVINGS: $300.00
Benefits
  • Multi-user license (no added fee)
  • Immediate access after purchase
  • No DRM
  • PDF download
E-Book:
Available
$300.00
TOTAL SAVINGS: $300.00
Benefits
  • Immediate access after purchase
  • No DRM
  • PDF download
  • Receive a 10% Discount on eBooks
Hardcover +
E-Book:
Available
$360.00
TOTAL SAVINGS: $360.00
Benefits
  • Printed-On-Demand (POD)
  • Usually ships one day from order
  • Multi-user license (no added fee)
  • Immediate access after purchase
  • No DRM
  • PDF download
Hardcover +
E-Book:
Available
$360.00
TOTAL SAVINGS: $360.00
Benefits
  • Printed-On-Demand (POD)
  • Usually ships one day from order
  • Immediate access after purchase
  • No DRM
  • PDF download
Softcover:
Available
$225.00
TOTAL SAVINGS: $225.00
Benefits
  • Printed-On-Demand (POD)
  • Usually ships one day from order
Softcover:
Available
$225.00
TOTAL SAVINGS: $225.00
Benefits
  • Printed-On-Demand (POD)
  • Usually ships one day from order
Article Processing Charge:
Available
$1,950.00
TOTAL SAVINGS: $1,950.00
OnDemand:
(Individual Chapters)
Available
$37.50
TOTAL SAVINGS: $37.50
Benefits
  • Purchase individual chapters from this book
  • Immediate PDF download after purchase or access through your personal library
Description & Coverage
Description:

Data security is paramount in our modern world, and the symbiotic relationship between machine learning and cryptography has recently taken center stage. The vulnerability of traditional cryptosystems to human error and evolving cyber threats is a pressing concern. The stakes are higher than ever, and the need for innovative solutions to safeguard sensitive information is undeniable.

Innovative Machine Learning Applications for Cryptography emerges as a steadfast resource in this landscape of uncertainty. Machine learning's prowess in scrutinizing data trends, identifying vulnerabilities, and constructing adaptive analytical models offers a compelling solution. The book explores how machine learning can automate the process of constructing analytical models, providing a continuous learning mechanism to protect against an ever-increasing influx of data.

This book goes beyond theoretical exploration, and provides a comprehensive resource designed to empower academic scholars, specialists, and students in the fields of cryptography, machine learning, and network security. Its broad scope encompasses encryption, algorithms, security, and more unconventional topics like Quantum Cryptography, Biological Cryptography, and Neural Cryptography. By examining data patterns and identifying vulnerabilities, it equips its readers with actionable insights and strategies that can protect organizations from the dire consequences of security breaches.

Innovative Machine Learning Applications for Cryptography bridges the gap between two powerful domains and assists in diminishing the influence of human error on encryption and decryption processes. For academic scholars, engineers, scientists, and students, this book offers a valuable treasure trove of knowledge and actionable strategies in an age where the security of every byte is of utmost importance.

Coverage:

The many academic areas covered in this publication include, but are not limited to:

  • Algorithms
  • Biological Cryptography
  • Continuous Learning
  • Cryptography
  • Cyber Threats
  • Data Security
  • Data Trends
  • Encryption and Decryption
  • Human Error
  • Machine Learning
  • Network Security
  • Protection of Sensitive Information
  • System Vulnerability
Download OnDemand Chapters Banner
Table of Contents
Search this Book:
Reset
Editor/Author Biographies

Dr. J. Anitha Ruth is an Associate Professor at SRM Institute of Science and Technology in Chennai, where she teaches courses in Computer Science and Applications at the Vadapalani Campus. In the field of Computer Science, she has been an educator for over 22 years, both at the undergraduate and graduate levels . Ph.D. in computer science and engineering from SRMIST is her credential. She is a Bachelor of Science and Master of Science graduate of the University of Madras. In addition to filing other patents, she has published articles in prestigious journals. The has written more than two textbooks and numerous chapters for other books. She is Life time member of Indian Science Congress , Computer Society of India. Sharing her knowledge with students from all walks of life has always been something she has taken pleasure in doing as a teacher. With her background as a teacher and career counselor, she has helped countless students find fulfilling paths to professional success. In her studies, she focuses on neural networks, security, and Deep learning.

Vijayalakshmi G V Mahesh received her BE in Electronics and Communication Engineering from Bangalore University, India in 1999, and M.Tech in Digital Communication and Networking from Visvesvaraya Technological University in 2005 and the Ph.D. degree from the Vellore Institute of Technology, Vellore, India. Currently she is working as an Associate Professor at BMS Institute of Technology and Management, Bangalore, India. She has been in academics for over 19 years and has published her research in various reputed journals and conferences. Her research interests include Machine Learning, Image Processing, Pattern Recognition and Deep learning, Affective computing. She has Memberships in Professional Bodies such as ISTE and IEI.

Dr. P. Visalakshi obtained her M.C.A Degree from Annamalai University Chidambaram 1990, M.S.,(Computer Science and Engineering) from S.R.M. University, Chennai 2008, M.Phil. Degree from PRIST University, Chennai 2010 and Ph.D in computer science and Engineering from S.R.M Institute of Science and Technology Chennai 2020, Tamil Nadu, South India. Currently she is working as Associate Professor in Department of Networking and Communications, College of Engineering and Technology, S.R.M Institute of Science and Technology, Chennai, South India. Her area of specialization includes Computer networking, Mobile communication, Network security, Data Communication and networking, ad hoc networks, Cloud Computing etc., Her current projects in thirst areas are security attacks in MANET in collaboration with machine learning and deep learning algorithms, Public key Infrastructure, Cryptography, MAC layer protocol and Wireless sensor networks.

R. Uma is working as Associate Professor in the Department of Computer Science and Engineering, Sri Sairam Engineering College, Chennai, India. with 23 years of teaching experience for undergraduate and post graduate students in Computer Science Department. She has a Doctorate degree in Computer Science and Engineering from Anna University Chennai, India. She also completed her Master Degree in Computer Science and Engineering from College of Engineering Guindy, Anna University, India and Bachelor Degree from university of Madras. She has published her papers over 14 International Journals. She is a member of CSI, IACSIT and life member of ISTE. Her current research interest includes Information Retrieval, Data Mining, Deep learning and Machine learning .

Dr. A. Meenakshi serves as Head of the Department of Computer Science and Applications M.C.A at SRM Institute of Science and Technology, Vadapalani Campus, Chennai. With over 24 years of teaching experience, she holds a Doctorate degree in Computer Science and Engineering. Her research encompasses Distributed Computing, Cloud Computing, Machine Learning, Deep Learning, and Data Analytics. She has made notable contributions with publications in esteemed journals, holds three patents, and is currently guiding two research scholars. She is a lifetime member of CSI, ACM, and the Indian Science Congress.

Abstracting & Indexing
Archiving
All of IGI Global's content is archived via the CLOCKSS and LOCKSS initiative. Additionally, all IGI Global published content is available in IGI Global's InfoSci® platform.