Deliver to 
0 review
1 of 1
GIGHUB (1).png
GIGHUB (1).png

The Fusion of Artificial Intelligence and Soft Computing Techniques for Cybersecurity

byGigHub
6 sales
$12.59 
 & Instant Download

About this item

down arrow
  • The Fusion of Artificial Intelligence
Payment Methods:
Item description from the seller
down arrow

The Fusion of Artificial Intelligence and Soft Computing Techniques for Cybersecurity

.File: Digital Book PDF Type

.Best Sellers Books

.Edition Language: English

.INSTANT DOWNLOAD E–BOOK

The Fusion of Artificial Intelligence and Soft Computing Techniques for Cybersecurity (AAP Advances in Artificial Intelligence and Robotics) Download by M. A. Jabbar. Download The Fusion of Artificial Intelligence and Soft Computing Techniques for Cybersecurity (AAP Advances in Artificial Intelligence and Robotics) by M. A. Jabbar in PDF format complete free.

Brief Summary of Book: The Fusion of Artificial Intelligence and Soft Computing Techniques for Cybersecurity (AAP Advances in Artificial Intelligence and Robotics) by M. A. Jabbar

Here is a quick description and cover image of book The Fusion of Artificial Intelligence and Soft Computing Techniques for Cybersecurity (AAP Advances in Artificial Intelligence and Robotics) written by M. A. Jabbar which was published in June 28, 2024. You can read this before The Fusion of Artificial Intelligence and Soft Computing Techniques for Cybersecurity (AAP Advances in Artificial Intelligence and Robotics) PDF full Download at the bottom.

With the ever-increasing threat of cyber-attacks helped to ramp up the use of digital communications technology, there is a continued need to find new ways to maintain and improve cybersecurity. This new volume investigates the advances in Artificial Intelligence and soft computing techniques in cybersecurity. It specifically looks at cybersecurity during the COVID-19 pandemic, the use of cybersecurity for cloud intelligent systems, applications of cybersecurity techniques for web applications, and cybersecurity for cyber-physical systems. A diverse array of technologies and techniques are explored for cybersecurity applications, such as the Internet of Things, edge computing, cloud computing, Artificial Intelligence (AI), soft computing, Machine Learning, cross-site scripting in web-based services, neural gas (GNG) clustering technique, and more.

Cyber Physical Systems (CPS) are essential for paving a bridge between the physical objects and the computation elements. The CPS is prone to vulnerabilities and hence its dependability should be overawed by proper modeling of the elements and network. This book chapter gives an indication on the various computing techniques pertaining to CPS. The various spheres including the application domains in smart grids, industrial automation, and intelligent transportation system are discussed. The attributes of the dependability factors are briefed to enhance the security. Soft computing methods are preferred as they are good in solving nonlinear problems and use approximation techniques for self-evolving and improvements. This book chapter describes the soft computing taxonomy with special inclusion to Fuzzy Logic, Artificial Neural Network, and Genetic Algorithm. The various integration technologies with regards to Cyber Physical systems are also described.