Automated secure computing for next-generation systems (Record no. 1621)

MARC details
000 -LEADER
fixed length control field 02804nam a2200217 4500
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20250714163854.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 250714b2024|||||||| |||| 00| 0 eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
ISBN 9781394213931
041 ## - LANGUAGE CODE
Language code of text/sound track or separate title English
082 ## - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 005.8
100 ## - MAIN ENTRY--AUTHOR NAME
Personal name Tyagi, Amit Kumar
Relator term Author
245 ## - TITLE STATEMENT
Title Automated secure computing for next-generation systems
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT)
Place of publication New Jersey:
Name of publisher Wiley Data and Cybersecurity,
Year of publication 2024.
300 ## - PHYSICAL DESCRIPTION
Number of Pages xix, 443p.
500 ## - GENERAL NOTE
General note AUTOMATED SECURE COMPUTING FOR NEXT-GENERATION SYSTEMS<br/>This book provides cutting-edge chapters on machine-empowered solutions for next-generation systems for today’s society.<br/><br/>Security is always a primary concern for each application and sector. In the last decade, many techniques and frameworks have been suggested to improve security (data, information, and network). Due to rapid improvements in industry automation, however, systems need to be secured more quickly and efficiently.<br/><br/>It is important to explore the best ways to incorporate the suggested solutions to improve their accuracy while reducing their learning cost. During implementation, the most difficult challenge is determining how to exploit AI and ML algorithms for improved safe service computation while maintaining the user’s privacy. The robustness of AI and deep learning, as well as the reliability and privacy of data, is an important part of modern computing. It is essential to determine the security issues of using AI to protect systems or ML-based automated intelligent systems. To enforce them in reality, privacy would have to be maintained throughout the implementation process. This book presents groundbreaking applications related to artificial intelligence and machine learning for more stable and privacy-focused computing.<br/><br/>By reflecting on the role of machine learning in information, cyber, and data security, Automated Secure Computing for Next-Generation Systems outlines recent developments in the security domain with artificial intelligence, machine learning, and privacy-preserving methods and strategies. To make computation more secure and confidential, the book provides ways to experiment, conceptualize, and theorize about issues that include AI and machine learning for improved security and preserve privacy in next-generation-based automated and intelligent systems. Hence, this book provides a detailed description of the role of AI, ML, etc., in automated and intelligent systems used for solving critical issues in various sectors of modern society.
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical Term Digital Twin Technology
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical Term An Intersection Between Machine Learning, Security, and Privacy
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical Term Artificial Intelligence for Cyber Security
856 ## - ELECTRONIC LOCATION AND ACCESS
Uniform Resource Identifier https://ieeexplore.ieee.org/servlet/opac?bknumber=10554376
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Koha item type e-Books
Holdings
Withdrawn status Lost status Damaged status Not for loan Permanent Location Current Location Shelving location Coded location qualifier Full call number Accession Number Koha item type
        Dr. S. R. Ranganathan Library Dr. S. R. Ranganathan Library Ebook (Online Access) --- 005.8 (Online Access) EB0049 e-Books

Implemented and Maintained by Dr. S.R. Ranganathan Library.
For any Suggestions/Query Contact to library or Email: library@iipe.ac.in
Website/OPAC best viewed in Mozilla Browser in 1366X768 Resolution.

Powered by Koha