Machine Learning and Cryptographic Solutions for Data Protection and Network Security

Machine Learning and Cryptographic Solutions for Data Protection and Network Security

J. Anitha Ruth, Vijayalakshmi G. V. Mahesh, P. Visalakshi, R. Uma, A. Meenakshi
Release Date: May, 2024|Copyright: © 2024 |Pages: 526
DOI: 10.4018/979-8-3693-4159-9
ISBN13: 9798369341599|ISBN13 Softcover: 9798369349939|EISBN13: 9798369341605
Hardcover:
Forthcoming
$355.00
TOTAL SAVINGS: $355.00
Benefits
  • Printed-On-Demand (POD)
  • Usually ships one day from order
Hardcover:
Forthcoming
$355.00
TOTAL SAVINGS: $355.00
Benefits
  • Printed-On-Demand (POD)
  • Usually ships one day from order
E-Book:
Available
$355.00
TOTAL SAVINGS: $355.00
Benefits
  • Multi-user license (no added fee)
  • Immediate access after purchase
  • No DRM
  • PDF download
E-Book:
Available
$355.00
TOTAL SAVINGS: $355.00
Benefits
  • Immediate access after purchase
  • No DRM
  • PDF download
  • Receive a 10% Discount on eBooks
Hardcover +
E-Book:
Forthcoming
$425.00
TOTAL SAVINGS: $425.00
Benefits
  • Printed-On-Demand (POD)
  • Usually ships one day from order
  • Multi-user license (no added fee)
  • Immediate access after purchase
  • No DRM
  • PDF download
Hardcover +
E-Book:
Forthcoming
$425.00
TOTAL SAVINGS: $425.00
Benefits
  • Printed-On-Demand (POD)
  • Usually ships one day from order
  • Immediate access after purchase
  • No DRM
  • PDF download
Softcover:
Forthcoming
$270.00
TOTAL SAVINGS: $270.00
Benefits
  • Printed-On-Demand (POD)
  • Usually ships one day from order
Softcover:
Forthcoming
$270.00
TOTAL SAVINGS: $270.00
Benefits
  • Printed-On-Demand (POD)
  • Usually ships one day from order
Article Processing Charge:
$1,950.00
TOTAL SAVINGS: $1,950.00
OnDemand:
(Individual Chapters)
Available
$37.50
TOTAL SAVINGS: $37.50
Benefits
  • Purchase individual chapters from this book
  • Immediate PDF download after purchase or access through your personal library
Description & Coverage
Description:

In the relentless battle against escalating cyber threats, data security faces a critical challenge – the need for innovative solutions to fortify encryption and decryption processes. The increasing frequency and complexity of cyber-attacks demand a dynamic approach, and this is where the intersection of cryptography and machine learning emerges as a powerful ally. As hackers become more adept at exploiting vulnerabilities, the book stands as a beacon of insight, addressing the urgent need to leverage machine learning techniques in cryptography.

Machine Learning and Cryptographic Solutions for Data Protection and Network Security unveil the intricate relationship between data security and machine learning and provide a roadmap for implementing these cutting-edge techniques in the field. The book equips specialists, academics, and students in cryptography, machine learning, and network security with the tools to enhance encryption and decryption procedures by offering theoretical frameworks and the latest empirical research findings. Its pages unfold a narrative of collaboration and cross-pollination of ideas, showcasing how machine learning can be harnessed to sift through vast datasets, identify network weak points, and predict future cyber threats.

This book is an indispensable guide for scholars navigating the intricate domains of Elliptic Curve Cryptography, Cryptanalysis, Pairing-based Cryptography, Artificial Intelligence, Digital Signature Algorithms, and more. It not only sheds light on current challenges but also provides actionable insights and recommendations, making it an essential resource for those seeking to understand the evolving landscape of data security and actively contribute to its fortification. In a world where the stakes of cybersecurity are higher than ever, this book emerges as a beacon of knowledge, offering a proactive and informed solution to the persistent challenges faced by the research community.

Coverage:

The many academic areas covered in this publication include, but are not limited to:

  • Artificial Intelligence
  • Biological Cryptography
  • Cryptanalysis
  • Digital Signature Algorithm
  • Elliptic Curve Cryptography
  • Machine Learning
  • Network Security
  • Neural Cryptography
  • Pairing-based Cryptography
  • Quantum Cryptography
Table of Contents
Search this Book:
Reset
Editor/Author Biographies
|G.V. Vijayalakshmi - Editor|N/A
P. Visalakshi is an Associate Professor at SRM Institute of Science and Technology based in Dist, Tamil Nadu.
R. Uma is working as Associate Professor in the Department of Computer Science and Engineering, Sri Sairam Engineering College, Chennai, India. with 23 years of teaching experience for undergraduate and post graduate students in Computer Science Department. She has a Doctorate degree in Computer Science and Engineering from Anna University Chennai, India. She also completed her Master Degree in Computer Science and Engineering from College of Engineering Guindy, Anna University, India and Bachelor Degree from university of Madras. She has published her papers over 14 International Journals. She is a member of CSI, IACSIT and life member of ISTE. Her current research interest includes Information Retrieval, Data Mining, Deep learning and Machine learning .
Archiving
All of IGI Global's content is archived via the CLOCKSS and LOCKSS initiative. Additionally, all IGI Global published content is available in IGI Global's InfoSci® platform.