Innovative machine learning applications for cryptography
Data security is paramount in our modern world, and the symbiotic relationship between machine learning and cryptography has recently taken center stage. The vulnerability of traditional cryptosystems to human error and evolving cyber threats is a pressing concern. The stakes are higher than ever, a...
Gespeichert in:
Weitere Verfasser: | , , , , |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Hershey, Pennsylvania
IGI Global
2024
|
Schlagworte: | |
Online-Zugang: | DE-91 URL des Erstveröffentlichers |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV049645341 | ||
003 | DE-604 | ||
007 | cr|uuu---uuuuu | ||
008 | 240411s2024 |||| o||u| ||||||eng d | ||
020 | |a 9798369316436 |9 979-83-69316-43-6 | ||
024 | 7 | |a 10.4018/979-8-3693-1642-9 |2 doi | |
035 | |a (ZDB-98-IGB)00329242 | ||
035 | |a (OCoLC)1430762209 | ||
035 | |a (DE-599)BVBBV049645341 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-91 | ||
082 | 0 | |a 005.8 | |
245 | 1 | 0 | |a Innovative machine learning applications for cryptography |c J. Anitha Ruth, G.V. Mahesh Vijayalakshmi, P. Visalakshi, R. Uma, A. Meenakshi, editors |
264 | 1 | |a Hershey, Pennsylvania |b IGI Global |c 2024 | |
300 | |a 1 Online-Ressource (294 Seiten) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
520 | |a Data security is paramount in our modern world, and the symbiotic relationship between machine learning and cryptography has recently taken center stage. The vulnerability of traditional cryptosystems to human error and evolving cyber threats is a pressing concern. The stakes are higher than ever, and the need for innovative solutions to safeguard sensitive information is undeniable.Innovative Machine Learning Applications for Cryptography emerges as a steadfast resource in this landscape of uncertainty. Machine learning's prowess in scrutinizing data trends, identifying vulnerabilities, and constructing adaptive analytical models offers a compelling solution. The book explores how machine learning can automate the process of constructing analytical models, providing a continuous learning mechanism to protect against an ever-increasing influx of data.This book goes beyond theoretical exploration, and provides a comprehensive resource designed to empower academic scholars, specialists, and students in the fields of cryptography, machine learning, and network security. Its broad scope encompasses encryption, algorithms, security, and more unconventional topics like Quantum Cryptography, Biological Cryptography, and Neural Cryptography. By examining data patterns and identifying vulnerabilities, it equips its readers with actionable insights and strategies that can protect organizations from the dire consequences of security breaches. | ||
650 | 4 | |a Data encryption (Computer science) | |
650 | 4 | |a Machine learning | |
700 | 1 | |a Meenakshi, A. |4 edt | |
700 | 1 | |a Ruth, J. Anitha |4 edt | |
700 | 1 | |a Uma, R. |4 edt | |
700 | 1 | |a Vijayalakshmi, G.V. Mahesh |4 edt | |
700 | 1 | |a Visalakshi, P. |4 edt | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 9798369316429 |
856 | 4 | 0 | |u https://doi.org/10.4018/979-8-3693-1642-9 |x Verlag |z URL des Erstveröffentlichers |3 Volltext |
912 | |a ZDB-98-IGB | ||
966 | e | |u https://doi.org/10.4018/979-8-3693-1642-9 |l DE-91 |p ZDB-98-IGB |q TUM_Paketkauf_2024 |x Verlag |3 Volltext |
Datensatz im Suchindex
_version_ | 1805071413099364352 |
---|---|
adam_text | |
adam_txt | |
any_adam_object | |
any_adam_object_boolean | |
author2 | Meenakshi, A. Ruth, J. Anitha Uma, R. Vijayalakshmi, G.V. Mahesh Visalakshi, P. |
author2_role | edt edt edt edt edt |
author2_variant | a m am j a r ja jar r u ru g m v gm gmv p v pv |
author_facet | Meenakshi, A. Ruth, J. Anitha Uma, R. Vijayalakshmi, G.V. Mahesh Visalakshi, P. |
building | Verbundindex |
bvnumber | BV049645341 |
collection | ZDB-98-IGB |
ctrlnum | (ZDB-98-IGB)00329242 (OCoLC)1430762209 (DE-599)BVBBV049645341 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
discipline_str_mv | Informatik |
doi_str_mv | 10.4018/979-8-3693-1642-9 |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>00000nmm a2200000zc 4500</leader><controlfield tag="001">BV049645341</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">240411s2024 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9798369316436</subfield><subfield code="9">979-83-69316-43-6</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.4018/979-8-3693-1642-9</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-98-IGB)00329242</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1430762209</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV049645341</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Innovative machine learning applications for cryptography</subfield><subfield code="c">J. Anitha Ruth, G.V. Mahesh Vijayalakshmi, P. Visalakshi, R. Uma, A. Meenakshi, editors</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Hershey, Pennsylvania</subfield><subfield code="b">IGI Global</subfield><subfield code="c">2024</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (294 Seiten)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Data security is paramount in our modern world, and the symbiotic relationship between machine learning and cryptography has recently taken center stage. The vulnerability of traditional cryptosystems to human error and evolving cyber threats is a pressing concern. The stakes are higher than ever, and the need for innovative solutions to safeguard sensitive information is undeniable.Innovative Machine Learning Applications for Cryptography emerges as a steadfast resource in this landscape of uncertainty. Machine learning's prowess in scrutinizing data trends, identifying vulnerabilities, and constructing adaptive analytical models offers a compelling solution. The book explores how machine learning can automate the process of constructing analytical models, providing a continuous learning mechanism to protect against an ever-increasing influx of data.This book goes beyond theoretical exploration, and provides a comprehensive resource designed to empower academic scholars, specialists, and students in the fields of cryptography, machine learning, and network security. Its broad scope encompasses encryption, algorithms, security, and more unconventional topics like Quantum Cryptography, Biological Cryptography, and Neural Cryptography. By examining data patterns and identifying vulnerabilities, it equips its readers with actionable insights and strategies that can protect organizations from the dire consequences of security breaches.</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data encryption (Computer science)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Machine learning</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Meenakshi, A.</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Ruth, J. Anitha</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Uma, R.</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Vijayalakshmi, G.V. Mahesh</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Visalakshi, P.</subfield><subfield code="4">edt</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">9798369316429</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.4018/979-8-3693-1642-9</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Erstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-98-IGB</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.4018/979-8-3693-1642-9</subfield><subfield code="l">DE-91</subfield><subfield code="p">ZDB-98-IGB</subfield><subfield code="q">TUM_Paketkauf_2024</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV049645341 |
illustrated | Not Illustrated |
index_date | 2024-07-03T23:39:47Z |
indexdate | 2024-07-20T04:37:25Z |
institution | BVB |
isbn | 9798369316436 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-034988888 |
oclc_num | 1430762209 |
open_access_boolean | |
owner | DE-91 DE-BY-TUM |
owner_facet | DE-91 DE-BY-TUM |
physical | 1 Online-Ressource (294 Seiten) |
psigel | ZDB-98-IGB ZDB-98-IGB TUM_Paketkauf_2024 |
publishDate | 2024 |
publishDateSearch | 2024 |
publishDateSort | 2024 |
publisher | IGI Global |
record_format | marc |
spelling | Innovative machine learning applications for cryptography J. Anitha Ruth, G.V. Mahesh Vijayalakshmi, P. Visalakshi, R. Uma, A. Meenakshi, editors Hershey, Pennsylvania IGI Global 2024 1 Online-Ressource (294 Seiten) txt rdacontent c rdamedia cr rdacarrier Data security is paramount in our modern world, and the symbiotic relationship between machine learning and cryptography has recently taken center stage. The vulnerability of traditional cryptosystems to human error and evolving cyber threats is a pressing concern. The stakes are higher than ever, and the need for innovative solutions to safeguard sensitive information is undeniable.Innovative Machine Learning Applications for Cryptography emerges as a steadfast resource in this landscape of uncertainty. Machine learning's prowess in scrutinizing data trends, identifying vulnerabilities, and constructing adaptive analytical models offers a compelling solution. The book explores how machine learning can automate the process of constructing analytical models, providing a continuous learning mechanism to protect against an ever-increasing influx of data.This book goes beyond theoretical exploration, and provides a comprehensive resource designed to empower academic scholars, specialists, and students in the fields of cryptography, machine learning, and network security. Its broad scope encompasses encryption, algorithms, security, and more unconventional topics like Quantum Cryptography, Biological Cryptography, and Neural Cryptography. By examining data patterns and identifying vulnerabilities, it equips its readers with actionable insights and strategies that can protect organizations from the dire consequences of security breaches. Data encryption (Computer science) Machine learning Meenakshi, A. edt Ruth, J. Anitha edt Uma, R. edt Vijayalakshmi, G.V. Mahesh edt Visalakshi, P. edt Erscheint auch als Druck-Ausgabe 9798369316429 https://doi.org/10.4018/979-8-3693-1642-9 Verlag URL des Erstveröffentlichers Volltext |
spellingShingle | Innovative machine learning applications for cryptography Data encryption (Computer science) Machine learning |
title | Innovative machine learning applications for cryptography |
title_auth | Innovative machine learning applications for cryptography |
title_exact_search | Innovative machine learning applications for cryptography |
title_exact_search_txtP | Innovative machine learning applications for cryptography |
title_full | Innovative machine learning applications for cryptography J. Anitha Ruth, G.V. Mahesh Vijayalakshmi, P. Visalakshi, R. Uma, A. Meenakshi, editors |
title_fullStr | Innovative machine learning applications for cryptography J. Anitha Ruth, G.V. Mahesh Vijayalakshmi, P. Visalakshi, R. Uma, A. Meenakshi, editors |
title_full_unstemmed | Innovative machine learning applications for cryptography J. Anitha Ruth, G.V. Mahesh Vijayalakshmi, P. Visalakshi, R. Uma, A. Meenakshi, editors |
title_short | Innovative machine learning applications for cryptography |
title_sort | innovative machine learning applications for cryptography |
topic | Data encryption (Computer science) Machine learning |
topic_facet | Data encryption (Computer science) Machine learning |
url | https://doi.org/10.4018/979-8-3693-1642-9 |
work_keys_str_mv | AT meenakshia innovativemachinelearningapplicationsforcryptography AT ruthjanitha innovativemachinelearningapplicationsforcryptography AT umar innovativemachinelearningapplicationsforcryptography AT vijayalakshmigvmahesh innovativemachinelearningapplicationsforcryptography AT visalakship innovativemachinelearningapplicationsforcryptography |