Items related to Predictive Data Security using AI: Insights and Issues...

Predictive Data Security using AI: Insights and Issues of Blockchain, IoT, and DevOps (Studies in Computational Intelligence, 1065) - Hardcover

 
9789811962899: Predictive Data Security using AI: Insights and Issues of Blockchain, IoT, and DevOps (Studies in Computational Intelligence, 1065)

Synopsis

This contributed volume consists of 11 chapters that specifically cover the security aspects of the latest technologies such as Blockchain, IoT, and DevOps, and how to effectively deal with them using Intelligent techniques. Moreover, machine learning (ML) and deep learning (DL) algorithms are also not secured and often manipulated by attackers for data stealing. This book also discusses the types of attacks and offers novel solutions to counter the attacks on ML and DL algorithms. This book describes the concepts and issues with figures and the supporting arguments with facts and charts. In addition to that, the book provides the comparison of different security solutions in terms of experimental results with tables and charts. Besides, the book also provides the future directions for each chapter and novel alternative approaches, wherever applicable. Often the existing literature provides domain-specific knowledge such as the description of security aspects. However, the readers find it difficult to understand how to tackle the application-specific security issues. This book takes one step forward and offers the security issues, current trends, and technologies supported by alternate solutions. Moreover, the book provides thorough guidance on the applicability of ML and DL algorithms to deal with application-specific security issues followed by novel approaches to counter threats to ML and DL algorithms. The book includes contributions from academicians, researchers, security experts, security architectures, and practitioners and provides an in-depth understanding of the mentioned issues.

"synopsis" may belong to another edition of this title.

About the Author

Dr. Hiren Kumar Thakkar received his M.Tech in Computer Science and Engineering from IIIT Bhubaneswar, India, in 2012 and a Ph.D. degree from Chang Gung University, Taiwan, in 2018. Later, he worked as a postdoctoral researcher in the Department of Occupation Therapy, Motor Behavioral Research Lab (MBRL), Chang Gung University, Taiwan. Currently, he is an Assistant Professor in the Department of Computer Science and Engineering, Pandit Deendayal Energy University, Gujarat, India. Dr. Thakkar has published several journal research papers in the areas such as optimization, machine learning, and reinforcement learning. He is a member of IEEE.

 

Dr. Mayank Swarnkar is currently an Assistant Professor in the Department of Computer Science and Engineering at the Indian Institute of Technology (BHU) Varanasi. He completed his Ph.D. from the Indian Institute of Technology Indore in 2019. He completed his M.Tech in Wireless Communication and Computing from the Indian Institute of Information Technology Allahabad Prayagraj in 2013 and B.E. in Information Technology from Jabalpur Engineering College in 2011. He joined IIT(BHU) in 2020. He also worked as Software Engineer in NEC Technologies India during 2013-2014. His primary areas of interest are network and system security. He works mainly in network traffic classification, zero-day attacks, intrusion detection systems, IoT security analysis, network protocol vulnerability analysis, and VoIP spam detection. He has several publications in international journals and conferences. He is a member of IEEE and ACM.

 

Robin Singh Bhadoria completed his Ph.D. degree from the Indian Institute of Technology Indore in January 2018. He also finished his M.Tech. and B.E. in CSE from different institutions affiliated with RGPV Bhopal in 2011 and 2008, respectively. He has been awarded the University Gold Medal for his M.Tech. Degree at Vidhan Sabha of Madhya Pradesh in 2011. He has published over 07 edited books and over 29 journal papers, and 21 peer-reviewed international conference papers. He is a member of IEEE (USA), IAENG (Hong-Kong), Internet Society, Virginia (USA), IACSIT (Singapore), and IEI (India).


From the Back Cover

This contributed volume consists of 11 chapters that specifically cover the security aspects of the latest technologies such as Blockchain, IoT, and DevOps, and how to effectively deal with them using Intelligent techniques. Moreover, machine learning (ML) and deep learning (DL) algorithms are also not secured and often manipulated by attackers for data stealing. This book also discusses the types of attacks and offers novel solutions to counter the attacks on ML and DL algorithms. This book describes the concepts and issues with figures and the supporting arguments with facts and charts. In addition to that, the book provides the comparison of different security solutions in terms of experimental results with tables and charts. Besides, the book also provides the future directions for each chapter and novel alternative approaches, wherever applicable. Often the existing literature provides domain-specific knowledge such as the description of security aspects. However, the readers find it difficult to understand how to tackle the application-specific security issues. This book takes one step forward and offers the security issues, current trends, and technologies supported by alternate solutions. Moreover, the book provides thorough guidance on the applicability of ML and DL algorithms to deal with application-specific security issues followed by novel approaches to counter threats to ML and DL algorithms. The book includes contributions from academicians, researchers, security experts, security architectures, and practitioners and provides an in-depth understanding of the mentioned issues.

"About this title" may belong to another edition of this title.

Buy Used

Condition: As New
Unread book in perfect condition...
View this item

US$ 2.64 shipping within U.S.A.

Destination, rates & speeds

Other Popular Editions of the Same Title

9789811962929: Predictive Data Security using AI: Insights and Issues of Blockchain, IoT, and DevOps (Studies in Computational Intelligence, 1065)

Featured Edition

ISBN 10:  9811962928 ISBN 13:  9789811962929
Publisher: Springer, 2023
Softcover

Search results for Predictive Data Security using AI: Insights and Issues...

Seller Image

Thakkar, Hiren Kumar (EDT); Swarnkar, Mayank (EDT); Bhadoria, Robin Singh (EDT)
Published by Springer, 2022
ISBN 10: 9811962898 ISBN 13: 9789811962899
New Hardcover

Seller: GreatBookPrices, Columbia, MD, U.S.A.

Seller rating 5 out of 5 stars 5-star rating, Learn more about seller ratings

Condition: New. Seller Inventory # 45588340-n

Contact seller

Buy New

US$ 210.35
Convert currency
Shipping: US$ 2.64
Within U.S.A.
Destination, rates & speeds

Quantity: 1 available

Add to basket

Stock Image

Published by Springer, 2022
ISBN 10: 9811962898 ISBN 13: 9789811962899
New Hardcover

Seller: California Books, Miami, FL, U.S.A.

Seller rating 5 out of 5 stars 5-star rating, Learn more about seller ratings

Condition: New. Seller Inventory # I-9789811962899

Contact seller

Buy New

US$ 213.00
Convert currency
Shipping: FREE
Within U.S.A.
Destination, rates & speeds

Quantity: 11 available

Add to basket

Stock Image

Hiren Kumar Thakkar
ISBN 10: 9811962898 ISBN 13: 9789811962899
New Hardcover

Seller: Grand Eagle Retail, Mason, OH, U.S.A.

Seller rating 5 out of 5 stars 5-star rating, Learn more about seller ratings

Hardcover. Condition: new. Hardcover. This contributed volume consists of 11 chapters that specifically cover the security aspects of the latest technologies such as Blockchain, IoT, and DevOps, and how to effectively deal with them using Intelligent techniques. Moreover, machine learning (ML) and deep learning (DL) algorithms are also not secured and often manipulated by attackers for data stealing. This book also discusses the types of attacks and offers novel solutions to counter the attacks on ML and DL algorithms. This book describes the concepts and issues with figures and the supporting arguments with facts and charts. In addition to that, the book provides the comparison of different security solutions in terms of experimental results with tables and charts. Besides, the book also provides the future directions for each chapter and novel alternative approaches, wherever applicable. Often the existing literature provides domain-specific knowledge such as the description of security aspects. However, the readers find it difficult to understand how to tackle the application-specific security issues. This book takes one step forward and offers the security issues, current trends, and technologies supported by alternate solutions. Moreover, the book provides thorough guidance on the applicability of ML and DL algorithms to deal with application-specific security issues followed by novel approaches to counter threats to ML and DL algorithms. The book includes contributions from academicians, researchers, security experts, security architectures, and practitioners and provides an in-depth understanding of the mentioned issues. Moreover, the book provides thorough guidance on the applicability of ML and DL algorithms to deal with application-specific security issues followed by novel approaches to counter threats to ML and DL algorithms. Shipping may be from multiple locations in the US or from the UK, depending on stock availability. Seller Inventory # 9789811962899

Contact seller

Buy New

US$ 225.59
Convert currency
Shipping: FREE
Within U.S.A.
Destination, rates & speeds

Quantity: 1 available

Add to basket

Seller Image

Thakkar, Hiren Kumar (EDT); Swarnkar, Mayank (EDT); Bhadoria, Robin Singh (EDT)
Published by Springer, 2022
ISBN 10: 9811962898 ISBN 13: 9789811962899
Used Hardcover

Seller: GreatBookPrices, Columbia, MD, U.S.A.

Seller rating 5 out of 5 stars 5-star rating, Learn more about seller ratings

Condition: As New. Unread book in perfect condition. Seller Inventory # 45588340

Contact seller

Buy Used

US$ 225.14
Convert currency
Shipping: US$ 2.64
Within U.S.A.
Destination, rates & speeds

Quantity: 1 available

Add to basket

Seller Image

ISBN 10: 9811962898 ISBN 13: 9789811962899
New Hardcover
Print on Demand

Seller: moluna, Greven, Germany

Seller rating 5 out of 5 stars 5-star rating, Learn more about seller ratings

Condition: New. Dieser Artikel ist ein Print on Demand Artikel und wird nach Ihrer Bestellung fuer Sie gedruckt. This contributed volume consists of 11 chapters that specifically cover the security aspects of the latest technologies such as Blockchain, IoT, and DevOps, and how to effectively deal with them using Intelligent techniques. Moreover, machine learning (M. Seller Inventory # 668479779

Contact seller

Buy New

US$ 173.63
Convert currency
Shipping: US$ 56.98
From Germany to U.S.A.
Destination, rates & speeds

Quantity: Over 20 available

Add to basket

Seller Image

Hiren Kumar Thakkar
ISBN 10: 9811962898 ISBN 13: 9789811962899
New Hardcover
Print on Demand

Seller: BuchWeltWeit Ludwig Meier e.K., Bergisch Gladbach, Germany

Seller rating 5 out of 5 stars 5-star rating, Learn more about seller ratings

Buch. Condition: Neu. This item is printed on demand - it takes 3-4 days longer - Neuware -This contributed volume consists of 11 chapters that specifically cover the security aspects of the latest technologies such as Blockchain, IoT, and DevOps, and how to effectively deal with them using Intelligent techniques. Moreover, machine learning (ML) and deep learning (DL) algorithms are also not secured and often manipulated by attackers for data stealing. This book also discusses the types of attacks and offers novel solutions to counter the attacks on ML and DL algorithms. This book describes the concepts and issues with figures and the supporting arguments with facts and charts. In addition to that, the book provides the comparison of different security solutions in terms of experimental results with tables and charts. Besides, the book also provides the future directions for each chapter and novel alternative approaches, wherever applicable. Often the existing literature provides domain-specific knowledge such as the description of security aspects. However, the readers find it difficult to understand how to tackle the application-specific security issues. This book takes one step forward and offers the security issues, current trends, and technologies supported by alternate solutions. Moreover, the book provides thorough guidance on the applicability of ML and DL algorithms to deal with application-specific security issues followed by novel approaches to counter threats to ML and DL algorithms. The book includes contributions from academicians, researchers, security experts, security architectures, and practitioners and provides an in-depth understanding of the mentioned issues. 228 pp. Englisch. Seller Inventory # 9789811962899

Contact seller

Buy New

US$ 205.08
Convert currency
Shipping: US$ 26.75
From Germany to U.S.A.
Destination, rates & speeds

Quantity: 2 available

Add to basket

Seller Image

Hiren Kumar Thakkar
ISBN 10: 9811962898 ISBN 13: 9789811962899
New Hardcover

Seller: AHA-BUCH GmbH, Einbeck, Germany

Seller rating 5 out of 5 stars 5-star rating, Learn more about seller ratings

Buch. Condition: Neu. Druck auf Anfrage Neuware - Printed after ordering - This contributed volume consists of 11 chapters that specifically cover the security aspects of the latest technologies such as Blockchain, IoT, and DevOps, and how to effectively deal with them using Intelligent techniques. Moreover, machine learning (ML) and deep learning (DL) algorithms are also not secured and often manipulated by attackers for data stealing. This book also discusses the types of attacks and offers novel solutions to counter the attacks on ML and DL algorithms. This book describes the concepts and issues with figures and the supporting arguments with facts and charts. In addition to that, the book provides the comparison of different security solutions in terms of experimental results with tables and charts. Besides, the book also provides the future directions for each chapter and novel alternative approaches, wherever applicable. Often the existing literature provides domain-specific knowledge such as the description of security aspects. However, the readers find it difficult to understand how to tackle the application-specific security issues. This book takes one step forward and offers the security issues, current trends, and technologies supported by alternate solutions. Moreover, the book provides thorough guidance on the applicability of ML and DL algorithms to deal with application-specific security issues followed by novel approaches to counter threats to ML and DL algorithms. The book includes contributions from academicians, researchers, security experts, security architectures, and practitioners and provides an in-depth understanding of the mentioned issues. Seller Inventory # 9789811962899

Contact seller

Buy New

US$ 209.74
Convert currency
Shipping: US$ 35.77
From Germany to U.S.A.
Destination, rates & speeds

Quantity: 1 available

Add to basket

Stock Image

Published by Springer, 2022
ISBN 10: 9811962898 ISBN 13: 9789811962899
New Hardcover
Print on Demand

Seller: Majestic Books, Hounslow, United Kingdom

Seller rating 5 out of 5 stars 5-star rating, Learn more about seller ratings

Condition: New. Print on Demand. Seller Inventory # 401112823

Contact seller

Buy New

US$ 251.14
Convert currency
Shipping: US$ 8.72
From United Kingdom to U.S.A.
Destination, rates & speeds

Quantity: 4 available

Add to basket

Seller Image

Hiren Kumar Thakkar
ISBN 10: 9811962898 ISBN 13: 9789811962899
New Hardcover

Seller: buchversandmimpf2000, Emtmannsberg, BAYE, Germany

Seller rating 5 out of 5 stars 5-star rating, Learn more about seller ratings

Buch. Condition: Neu. Neuware -This contributed volume consists of 11 chapters that specifically cover the security aspects of the latest technologies such as Blockchain, IoT, and DevOps, and how to effectively deal with them using Intelligent techniques. Moreover, machine learning (ML) and deep learning (DL) algorithms are also not secured and often manipulated by attackers for data stealing. This book also discusses the types of attacks and offers novel solutions to counter the attacks on ML and DL algorithms. This book describes the concepts and issues with figures and the supporting arguments with facts and charts. In addition to that, the book provides the comparison of different security solutions in terms of experimental results with tables and charts. Besides, the book also provides the future directions for each chapter and novel alternative approaches, wherever applicable. Often the existing literature provides domain-specific knowledge such as the description of security aspects. However, the readers find it difficult to understand how to tackle the application-specific security issues. This book takes one step forward and offers the security issues, current trends, and technologies supported by alternate solutions. Moreover, the book provides thorough guidance on the applicability of ML and DL algorithms to deal with application-specific security issues followed by novel approaches to counter threats to ML and DL algorithms. The book includes contributions from academicians, researchers, security experts, security architectures, and practitioners and provides an in-depth understanding of the mentioned issues.Springer Verlag GmbH, Tiergartenstr. 17, 69121 Heidelberg 228 pp. Englisch. Seller Inventory # 9789811962899

Contact seller

Buy New

US$ 205.08
Convert currency
Shipping: US$ 63.97
From Germany to U.S.A.
Destination, rates & speeds

Quantity: 2 available

Add to basket

Stock Image

Published by Springer, 2022
ISBN 10: 9811962898 ISBN 13: 9789811962899
New Hardcover
Print on Demand

Seller: Biblios, Frankfurt am main, HESSE, Germany

Seller rating 5 out of 5 stars 5-star rating, Learn more about seller ratings

Condition: New. PRINT ON DEMAND. Seller Inventory # 18396345634

Contact seller

Buy New

US$ 271.65
Convert currency
Shipping: US$ 11.57
From Germany to U.S.A.
Destination, rates & speeds

Quantity: 4 available

Add to basket

There are 1 more copies of this book

View all search results for this book