Machine Learning and Cryptographic Solutions for Data Protection and Network Security
Book 1
Book 2
Book 3
Book 1
Book 2
Book 3
Book 1
Book 2
Book 3
Book 1
Book 2
Book 3
Home > Computing and Information Technology > Computer security > Data encryption > Machine Learning and Cryptographic Solutions for Data Protection and Network Security: (Advances in Information Security, Privacy, and Ethics)
Machine Learning and Cryptographic Solutions for Data Protection and Network Security: (Advances in Information Security, Privacy, and Ethics)

Machine Learning and Cryptographic Solutions for Data Protection and Network Security: (Advances in Information Security, Privacy, and Ethics)


     0     
5
4
3
2
1



Out of Stock


Notify me when this book is in stock
X
About the Book

In the relentless battle against escalating cyber threats, data security faces a critical challenge – the need for innovative solutions to fortify encryption and decryption processes. The increasing frequency and complexity of cyber-attacks demand a dynamic approach, and this is where the intersection of cryptography and machine learning emerges as a powerful ally. As hackers become more adept at exploiting vulnerabilities, the book stands as a beacon of insight, addressing the urgent need to leverage machine learning techniques in cryptography. Machine Learning and Cryptographic Solutions for Data Protection and Network Security unveil the intricate relationship between data security and machine learning and provide a roadmap for implementing these cutting-edge techniques in the field. The book equips specialists, academics, and students in cryptography, machine learning, and network security with the tools to enhance encryption and decryption procedures by offering theoretical frameworks and the latest empirical research findings. Its pages unfold a narrative of collaboration and cross-pollination of ideas, showcasing how machine learning can be harnessed to sift through vast datasets, identify network weak points, and predict future cyber threats. This book is an indispensable guide for scholars navigating the intricate domains of Elliptic Curve Cryptography, Cryptanalysis, Pairing-based Cryptography, Artificial Intelligence, Digital Signature Algorithms, and more. It not only sheds light on current challenges but also provides actionable insights and recommendations, making it an essential resource for those seeking to understand the evolving landscape of data security and actively contribute to its fortification. In a world where the stakes of cybersecurity are higher than ever, this book emerges as a beacon of knowledge, offering a proactive and informed solution to the persistent challenges faced by the research community.

About the Author :
Dr. J. Anitha Ruth is an Associate Professor at SRM Institute of Science and Technology in Chennai, where she teaches courses in Computer Science and Applications at the Vadapalani Campus. In the field of Computer Science, she has been an educator for over 22 years, both at the undergraduate and graduate levels . Ph.D. in computer science and engineering from SRMIST is her credential. She is a Bachelor of Science and Master of Science graduate of the University of Madras. In addition to filing other patents, she has published articles in prestigious journals. The has written more than two textbooks and numerous chapters for other books. She is Life time member of Indian Science Congress , Computer Society of India. Sharing her knowledge with students from all walks of life has always been something she has taken pleasure in doing as a teacher. With her background as a teacher and career counselor, she has helped countless students find fulfilling paths to professional success. In her studies, she focuses on neural networks, security, and Deep learning. N/A P. Visalakshi is currently affiliated with the College of Engineering and Technology at SRM Institute of Science and Technology in India. R. Uma is working as Associate Professor in the Department of Computer Science and Engineering, Sri Sairam Engineering College, Chennai, India. with 23 years of teaching experience for undergraduate and post graduate students in Computer Science Department. She has a Doctorate degree in Computer Science and Engineering from Anna University Chennai, India .She also completed her Master Degree in Computer Science and Engineering from College of Engineering Guindy, Anna University, India and Bachelor Degree from university of Madras. She has published her papers over 14 International Journals. She is a member of CSI,IACSIT and life member of ISTE. Her current research interest includes Information Retrieval, Data Mining, Deep learning and Machine learning . Dr. A. Meenakshi serves as Head of the Department of Computer Science and Applications M.C.A at SRM Institute of Science and Technology, Vadapalani Campus, Chennai. With over 24 years of teaching experience, she holds a Doctorate degree in Computer Science and Engineering. Her research encompasses Distributed Computing, Cloud Computing, Machine Learning, Deep Learning, and Data Analytics. She has made notable contributions with publications in esteemed journals, holds three patents, and is currently guiding two research scholars. She is a lifetime member of CSI, ACM, and the Indian Science Congress.


Best Sellers


Product Details
  • ISBN-13: 9798369341612
  • Publisher: IGI Global
  • Publisher Imprint: Engineering Science Reference
  • Language: English
  • Series Title: Advances in Information Security, Privacy, and Ethics
  • ISBN-10: 8369341616
  • Publisher Date: 31 May 2024
  • Binding: Digital download and online
  • No of Pages: 526


Similar Products

Add Photo
Add Photo

Customer Reviews

REVIEWS      0     
Click Here To Be The First to Review this Product
Machine Learning and Cryptographic Solutions for Data Protection and Network Security: (Advances in Information Security, Privacy, and Ethics)
IGI Global -
Machine Learning and Cryptographic Solutions for Data Protection and Network Security: (Advances in Information Security, Privacy, and Ethics)
Writing guidlines
We want to publish your review, so please:
  • keep your review on the product. Review's that defame author's character will be rejected.
  • Keep your review focused on the product.
  • Avoid writing about customer service. contact us instead if you have issue requiring immediate attention.
  • Refrain from mentioning competitors or the specific price you paid for the product.
  • Do not include any personally identifiable information, such as full names.

Machine Learning and Cryptographic Solutions for Data Protection and Network Security: (Advances in Information Security, Privacy, and Ethics)

Required fields are marked with *

Review Title*
Review
    Add Photo Add up to 6 photos
    Would you recommend this product to a friend?
    Tag this Book Read more
    Does your review contain spoilers?
    What type of reader best describes you?
    I agree to the terms & conditions
    You may receive emails regarding this submission. Any emails will include the ability to opt-out of future communications.

    CUSTOMER RATINGS AND REVIEWS AND QUESTIONS AND ANSWERS TERMS OF USE

    These Terms of Use govern your conduct associated with the Customer Ratings and Reviews and/or Questions and Answers service offered by Bookswagon (the "CRR Service").


    By submitting any content to Bookswagon, you guarantee that:
    • You are the sole author and owner of the intellectual property rights in the content;
    • All "moral rights" that you may have in such content have been voluntarily waived by you;
    • All content that you post is accurate;
    • You are at least 13 years old;
    • Use of the content you supply does not violate these Terms of Use and will not cause injury to any person or entity.
    You further agree that you may not submit any content:
    • That is known by you to be false, inaccurate or misleading;
    • That infringes any third party's copyright, patent, trademark, trade secret or other proprietary rights or rights of publicity or privacy;
    • That violates any law, statute, ordinance or regulation (including, but not limited to, those governing, consumer protection, unfair competition, anti-discrimination or false advertising);
    • That is, or may reasonably be considered to be, defamatory, libelous, hateful, racially or religiously biased or offensive, unlawfully threatening or unlawfully harassing to any individual, partnership or corporation;
    • For which you were compensated or granted any consideration by any unapproved third party;
    • That includes any information that references other websites, addresses, email addresses, contact information or phone numbers;
    • That contains any computer viruses, worms or other potentially damaging computer programs or files.
    You agree to indemnify and hold Bookswagon (and its officers, directors, agents, subsidiaries, joint ventures, employees and third-party service providers, including but not limited to Bazaarvoice, Inc.), harmless from all claims, demands, and damages (actual and consequential) of every kind and nature, known and unknown including reasonable attorneys' fees, arising out of a breach of your representations and warranties set forth above, or your violation of any law or the rights of a third party.


    For any content that you submit, you grant Bookswagon a perpetual, irrevocable, royalty-free, transferable right and license to use, copy, modify, delete in its entirety, adapt, publish, translate, create derivative works from and/or sell, transfer, and/or distribute such content and/or incorporate such content into any form, medium or technology throughout the world without compensation to you. Additionally,  Bookswagon may transfer or share any personal information that you submit with its third-party service providers, including but not limited to Bazaarvoice, Inc. in accordance with  Privacy Policy


    All content that you submit may be used at Bookswagon's sole discretion. Bookswagon reserves the right to change, condense, withhold publication, remove or delete any content on Bookswagon's website that Bookswagon deems, in its sole discretion, to violate the content guidelines or any other provision of these Terms of Use.  Bookswagon does not guarantee that you will have any recourse through Bookswagon to edit or delete any content you have submitted. Ratings and written comments are generally posted within two to four business days. However, Bookswagon reserves the right to remove or to refuse to post any submission to the extent authorized by law. You acknowledge that you, not Bookswagon, are responsible for the contents of your submission. None of the content that you submit shall be subject to any obligation of confidence on the part of Bookswagon, its agents, subsidiaries, affiliates, partners or third party service providers (including but not limited to Bazaarvoice, Inc.)and their respective directors, officers and employees.

    Accept

    Fresh on the Shelf


    Inspired by your browsing history


    Your review has been submitted!

    You've already reviewed this product!