Machine Learning and Cryptographic Solutions for Data Protection and Network Security

Machine Learning and Cryptographic Solutions for Data Protection and Network Security

Release Date: May, 2024|Copyright: © 2024 |Pages: 526
DOI: 10.4018/979-8-3693-4159-9
ISBN13: 9798369341599|ISBN13 Softcover: 9798369349939|EISBN13: 9798369341605
Hardcover:
Available
$355.00
TOTAL SAVINGS: $355.00
Benefits
  • Printed-On-Demand (POD)
  • Usually ships one day from order
Hardcover:
Available
$355.00
TOTAL SAVINGS: $355.00
Benefits
  • Printed-On-Demand (POD)
  • Usually ships one day from order
E-Book:
Available
$355.00
TOTAL SAVINGS: $355.00
Benefits
  • Multi-user license (no added fee)
  • Immediate access after purchase
  • No DRM
  • PDF download
E-Book:
Available
$355.00
TOTAL SAVINGS: $355.00
Benefits
  • Immediate access after purchase
  • No DRM
  • PDF download
  • Receive a 10% Discount on eBooks
Hardcover +
E-Book:
Available
$425.00
TOTAL SAVINGS: $425.00
Benefits
  • Printed-On-Demand (POD)
  • Usually ships one day from order
  • Multi-user license (no added fee)
  • Immediate access after purchase
  • No DRM
  • PDF download
Hardcover +
E-Book:
Available
$425.00
TOTAL SAVINGS: $425.00
Benefits
  • Printed-On-Demand (POD)
  • Usually ships one day from order
  • Immediate access after purchase
  • No DRM
  • PDF download
Softcover:
Available
$270.00
TOTAL SAVINGS: $270.00
Benefits
  • Printed-On-Demand (POD)
  • Usually ships one day from order
Softcover:
Available
$270.00
TOTAL SAVINGS: $270.00
Benefits
  • Printed-On-Demand (POD)
  • Usually ships one day from order
Article Processing Charge:
Available
$1,950.00
TOTAL SAVINGS: $1,950.00
OnDemand:
(Individual Chapters)
Available
$37.50
TOTAL SAVINGS: $37.50
Benefits
  • Purchase individual chapters from this book
  • Immediate PDF download after purchase or access through your personal library
Description & Coverage
Description:

In the relentless battle against escalating cyber threats, data security faces a critical challenge – the need for innovative solutions to fortify encryption and decryption processes. The increasing frequency and complexity of cyber-attacks demand a dynamic approach, and this is where the intersection of cryptography and machine learning emerges as a powerful ally. As hackers become more adept at exploiting vulnerabilities, the book stands as a beacon of insight, addressing the urgent need to leverage machine learning techniques in cryptography.

Machine Learning and Cryptographic Solutions for Data Protection and Network Security unveil the intricate relationship between data security and machine learning and provide a roadmap for implementing these cutting-edge techniques in the field. The book equips specialists, academics, and students in cryptography, machine learning, and network security with the tools to enhance encryption and decryption procedures by offering theoretical frameworks and the latest empirical research findings. Its pages unfold a narrative of collaboration and cross-pollination of ideas, showcasing how machine learning can be harnessed to sift through vast datasets, identify network weak points, and predict future cyber threats.

This book is an indispensable guide for scholars navigating the intricate domains of Elliptic Curve Cryptography, Cryptanalysis, Pairing-based Cryptography, Artificial Intelligence, Digital Signature Algorithms, and more. It not only sheds light on current challenges but also provides actionable insights and recommendations, making it an essential resource for those seeking to understand the evolving landscape of data security and actively contribute to its fortification. In a world where the stakes of cybersecurity are higher than ever, this book emerges as a beacon of knowledge, offering a proactive and informed solution to the persistent challenges faced by the research community.

Coverage:

The many academic areas covered in this publication include, but are not limited to:

  • Artificial Intelligence
  • Biological Cryptography
  • Cryptanalysis
  • Digital Signature Algorithm
  • Elliptic Curve Cryptography
  • Machine Learning
  • Network Security
  • Neural Cryptography
  • Pairing-based Cryptography
  • Quantum Cryptography
Download OnDemand Chapters Banner
Table of Contents
Search this Book:
Reset
Editor/Author Biographies

Dr. J. Anitha Ruth is an Associate Professor at SRM Institute of Science and Technology in Chennai, where she teaches courses in Computer Science and Applications at the Vadapalani Campus. In the field of Computer Science, she has been an educator for over 22 years, both at the undergraduate and graduate levels . Ph.D. in computer science and engineering from SRMIST is her credential. She is a Bachelor of Science and Master of Science graduate of the University of Madras. In addition to filing other patents, she has published articles in prestigious journals. The has written more than two textbooks and numerous chapters for other books. She is Life time member of Indian Science Congress , Computer Society of India. Sharing her knowledge with students from all walks of life has always been something she has taken pleasure in doing as a teacher. With her background as a teacher and career counselor, she has helped countless students find fulfilling paths to professional success. In her studies, she focuses on neural networks, security, and Deep learning.

|G.V. Vijayalakshmi - Editor|N/A
|P. Visalakshi - Editor|N/A
|R. Uma - Editor|N/A

Dr. A. Meenakshi serves as Head of the Department of Computer Science and Applications M.C.A at SRM Institute of Science and Technology, Vadapalani Campus, Chennai. With over 24 years of teaching experience, she holds a Doctorate degree in Computer Science and Engineering. Her research encompasses Distributed Computing, Cloud Computing, Machine Learning, Deep Learning, and Data Analytics. She has made notable contributions with publications in esteemed journals, holds three patents, and is currently guiding two research scholars. She is a lifetime member of CSI, ACM, and the Indian Science Congress.

Archiving
All of IGI Global's content is archived via the CLOCKSS and LOCKSS initiative. Additionally, all IGI Global published content is available in IGI Global's InfoSci® platform.