Innovative machine learning applications for cryptography

Data security is paramount in our modern world, and the symbiotic relationship between machine learning and cryptography has recently taken center stage. The vulnerability of traditional cryptosystems to human error and evolving cyber threats is a pressing concern. The stakes are higher than ever, a...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Weitere Verfasser: Meenakshi, A. (HerausgeberIn), Ruth, J. Anitha (HerausgeberIn), Uma, R. (HerausgeberIn), Vijayalakshmi, G.V. Mahesh (HerausgeberIn), Visalakshi, P. (HerausgeberIn)
Format: Elektronisch E-Book
Sprache:English
Veröffentlicht: Hershey, Pennsylvania IGI Global 2024
Schlagworte:
Online-Zugang:DE-91
URL des Erstveröffentlichers
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!

MARC

LEADER 00000nmm a2200000zc 4500
001 BV049645341
003 DE-604
007 cr|uuu---uuuuu
008 240411s2024 |||| o||u| ||||||eng d
020 |a 9798369316436  |9 979-83-69316-43-6 
024 7 |a 10.4018/979-8-3693-1642-9  |2 doi 
035 |a (ZDB-98-IGB)00329242 
035 |a (OCoLC)1430762209 
035 |a (DE-599)BVBBV049645341 
040 |a DE-604  |b ger  |e rda 
041 0 |a eng 
049 |a DE-91 
082 0 |a 005.8 
245 1 0 |a Innovative machine learning applications for cryptography  |c J. Anitha Ruth, G.V. Mahesh Vijayalakshmi, P. Visalakshi, R. Uma, A. Meenakshi, editors 
264 1 |a Hershey, Pennsylvania  |b IGI Global  |c 2024 
300 |a 1 Online-Ressource (294 Seiten) 
336 |b txt  |2 rdacontent 
337 |b c  |2 rdamedia 
338 |b cr  |2 rdacarrier 
520 |a Data security is paramount in our modern world, and the symbiotic relationship between machine learning and cryptography has recently taken center stage. The vulnerability of traditional cryptosystems to human error and evolving cyber threats is a pressing concern. The stakes are higher than ever, and the need for innovative solutions to safeguard sensitive information is undeniable.Innovative Machine Learning Applications for Cryptography emerges as a steadfast resource in this landscape of uncertainty. Machine learning's prowess in scrutinizing data trends, identifying vulnerabilities, and constructing adaptive analytical models offers a compelling solution. The book explores how machine learning can automate the process of constructing analytical models, providing a continuous learning mechanism to protect against an ever-increasing influx of data.This book goes beyond theoretical exploration, and provides a comprehensive resource designed to empower academic scholars, specialists, and students in the fields of cryptography, machine learning, and network security. Its broad scope encompasses encryption, algorithms, security, and more unconventional topics like Quantum Cryptography, Biological Cryptography, and Neural Cryptography. By examining data patterns and identifying vulnerabilities, it equips its readers with actionable insights and strategies that can protect organizations from the dire consequences of security breaches. 
650 4 |a Data encryption (Computer science) 
650 4 |a Machine learning 
700 1 |a Meenakshi, A.  |4 edt 
700 1 |a Ruth, J. Anitha  |4 edt 
700 1 |a Uma, R.  |4 edt 
700 1 |a Vijayalakshmi, G.V. Mahesh  |4 edt 
700 1 |a Visalakshi, P.  |4 edt 
776 0 8 |i Erscheint auch als  |n Druck-Ausgabe  |z 9798369316429 
856 4 0 |u https://doi.org/10.4018/979-8-3693-1642-9  |x Verlag  |z URL des Erstveröffentlichers  |3 Volltext 
912 |a ZDB-98-IGB 
966 e |u https://doi.org/10.4018/979-8-3693-1642-9  |l DE-91  |p ZDB-98-IGB  |q TUM_Paketkauf_2024  |x Verlag  |3 Volltext 

Datensatz im Suchindex

_version_ 1805071413099364352
adam_text
adam_txt
any_adam_object
any_adam_object_boolean
author2 Meenakshi, A.
Ruth, J. Anitha
Uma, R.
Vijayalakshmi, G.V. Mahesh
Visalakshi, P.
author2_role edt
edt
edt
edt
edt
author2_variant a m am
j a r ja jar
r u ru
g m v gm gmv
p v pv
author_facet Meenakshi, A.
Ruth, J. Anitha
Uma, R.
Vijayalakshmi, G.V. Mahesh
Visalakshi, P.
building Verbundindex
bvnumber BV049645341
collection ZDB-98-IGB
ctrlnum (ZDB-98-IGB)00329242
(OCoLC)1430762209
(DE-599)BVBBV049645341
dewey-full 005.8
dewey-hundreds 000 - Computer science, information, general works
dewey-ones 005 - Computer programming, programs, data, security
dewey-raw 005.8
dewey-search 005.8
dewey-sort 15.8
dewey-tens 000 - Computer science, information, general works
discipline Informatik
discipline_str_mv Informatik
doi_str_mv 10.4018/979-8-3693-1642-9
format Electronic
eBook
fullrecord <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>00000nmm a2200000zc 4500</leader><controlfield tag="001">BV049645341</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">240411s2024 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9798369316436</subfield><subfield code="9">979-83-69316-43-6</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.4018/979-8-3693-1642-9</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-98-IGB)00329242</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1430762209</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV049645341</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Innovative machine learning applications for cryptography</subfield><subfield code="c">J. Anitha Ruth, G.V. Mahesh Vijayalakshmi, P. Visalakshi, R. Uma, A. Meenakshi, editors</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Hershey, Pennsylvania</subfield><subfield code="b">IGI Global</subfield><subfield code="c">2024</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (294 Seiten)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Data security is paramount in our modern world, and the symbiotic relationship between machine learning and cryptography has recently taken center stage. The vulnerability of traditional cryptosystems to human error and evolving cyber threats is a pressing concern. The stakes are higher than ever, and the need for innovative solutions to safeguard sensitive information is undeniable.Innovative Machine Learning Applications for Cryptography emerges as a steadfast resource in this landscape of uncertainty. Machine learning's prowess in scrutinizing data trends, identifying vulnerabilities, and constructing adaptive analytical models offers a compelling solution. The book explores how machine learning can automate the process of constructing analytical models, providing a continuous learning mechanism to protect against an ever-increasing influx of data.This book goes beyond theoretical exploration, and provides a comprehensive resource designed to empower academic scholars, specialists, and students in the fields of cryptography, machine learning, and network security. Its broad scope encompasses encryption, algorithms, security, and more unconventional topics like Quantum Cryptography, Biological Cryptography, and Neural Cryptography. By examining data patterns and identifying vulnerabilities, it equips its readers with actionable insights and strategies that can protect organizations from the dire consequences of security breaches.</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data encryption (Computer science)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Machine learning</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Meenakshi, A.</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Ruth, J. Anitha</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Uma, R.</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Vijayalakshmi, G.V. Mahesh</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Visalakshi, P.</subfield><subfield code="4">edt</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">9798369316429</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.4018/979-8-3693-1642-9</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Erstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-98-IGB</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.4018/979-8-3693-1642-9</subfield><subfield code="l">DE-91</subfield><subfield code="p">ZDB-98-IGB</subfield><subfield code="q">TUM_Paketkauf_2024</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection>
id DE-604.BV049645341
illustrated Not Illustrated
index_date 2024-07-03T23:39:47Z
indexdate 2024-07-20T04:37:25Z
institution BVB
isbn 9798369316436
language English
oai_aleph_id oai:aleph.bib-bvb.de:BVB01-034988888
oclc_num 1430762209
open_access_boolean
owner DE-91
DE-BY-TUM
owner_facet DE-91
DE-BY-TUM
physical 1 Online-Ressource (294 Seiten)
psigel ZDB-98-IGB
ZDB-98-IGB TUM_Paketkauf_2024
publishDate 2024
publishDateSearch 2024
publishDateSort 2024
publisher IGI Global
record_format marc
spelling Innovative machine learning applications for cryptography J. Anitha Ruth, G.V. Mahesh Vijayalakshmi, P. Visalakshi, R. Uma, A. Meenakshi, editors
Hershey, Pennsylvania IGI Global 2024
1 Online-Ressource (294 Seiten)
txt rdacontent
c rdamedia
cr rdacarrier
Data security is paramount in our modern world, and the symbiotic relationship between machine learning and cryptography has recently taken center stage. The vulnerability of traditional cryptosystems to human error and evolving cyber threats is a pressing concern. The stakes are higher than ever, and the need for innovative solutions to safeguard sensitive information is undeniable.Innovative Machine Learning Applications for Cryptography emerges as a steadfast resource in this landscape of uncertainty. Machine learning's prowess in scrutinizing data trends, identifying vulnerabilities, and constructing adaptive analytical models offers a compelling solution. The book explores how machine learning can automate the process of constructing analytical models, providing a continuous learning mechanism to protect against an ever-increasing influx of data.This book goes beyond theoretical exploration, and provides a comprehensive resource designed to empower academic scholars, specialists, and students in the fields of cryptography, machine learning, and network security. Its broad scope encompasses encryption, algorithms, security, and more unconventional topics like Quantum Cryptography, Biological Cryptography, and Neural Cryptography. By examining data patterns and identifying vulnerabilities, it equips its readers with actionable insights and strategies that can protect organizations from the dire consequences of security breaches.
Data encryption (Computer science)
Machine learning
Meenakshi, A. edt
Ruth, J. Anitha edt
Uma, R. edt
Vijayalakshmi, G.V. Mahesh edt
Visalakshi, P. edt
Erscheint auch als Druck-Ausgabe 9798369316429
https://doi.org/10.4018/979-8-3693-1642-9 Verlag URL des Erstveröffentlichers Volltext
spellingShingle Innovative machine learning applications for cryptography
Data encryption (Computer science)
Machine learning
title Innovative machine learning applications for cryptography
title_auth Innovative machine learning applications for cryptography
title_exact_search Innovative machine learning applications for cryptography
title_exact_search_txtP Innovative machine learning applications for cryptography
title_full Innovative machine learning applications for cryptography J. Anitha Ruth, G.V. Mahesh Vijayalakshmi, P. Visalakshi, R. Uma, A. Meenakshi, editors
title_fullStr Innovative machine learning applications for cryptography J. Anitha Ruth, G.V. Mahesh Vijayalakshmi, P. Visalakshi, R. Uma, A. Meenakshi, editors
title_full_unstemmed Innovative machine learning applications for cryptography J. Anitha Ruth, G.V. Mahesh Vijayalakshmi, P. Visalakshi, R. Uma, A. Meenakshi, editors
title_short Innovative machine learning applications for cryptography
title_sort innovative machine learning applications for cryptography
topic Data encryption (Computer science)
Machine learning
topic_facet Data encryption (Computer science)
Machine learning
url https://doi.org/10.4018/979-8-3693-1642-9
work_keys_str_mv AT meenakshia innovativemachinelearningapplicationsforcryptography
AT ruthjanitha innovativemachinelearningapplicationsforcryptography
AT umar innovativemachinelearningapplicationsforcryptography
AT vijayalakshmigvmahesh innovativemachinelearningapplicationsforcryptography
AT visalakship innovativemachinelearningapplicationsforcryptography