Quantum Computing in Cybersecurity

Machine learning, deep learning, probabilistic neural networks, blockchain, and other new technologies all demand extremely high processing speeds. A quantum computer is an example of such a system. Quantum computers may be accessed over the internet. This technology poses a significant risk, since...

Descripción completa

Detalles Bibliográficos
Otros Autores: Rawat, Romil, editor (editor)
Formato: Libro electrónico
Idioma:Inglés
Publicado: Hoboken, NJ : John Wiley & Sons, Inc [2023]
Edición:First edition
Materias:
Ver en Biblioteca Universitat Ramon Llull:https://discovery.url.edu/permalink/34CSUC_URL/1im36ta/alma991009811324206719
Tabla de Contenidos:
  • Intro
  • Table of Contents
  • Series Page
  • Title Page
  • Copyright Page
  • Preface
  • 1 Cyber Quantum Computing (Security) Using Rectified Probabilistic Packet Mark for Big Data
  • 1.1 Introduction
  • 1.2 Denial-of-Service Attacks
  • 1.3 Related Work
  • 1.4 Proposed Methodology
  • 1.5 Trace Back Mechanism for Rectified Probabilistic Packet Marking
  • 1.6 Conclusion
  • References
  • 2 Secure Distinctive Data Transmission in Fog System Using Quantum Cryptography
  • 2.1 Introduction
  • 2.2 Properties of Quantum Computing
  • 2.3 Applications of Quantum Computing
  • 2.4 Background
  • 2.5 Literature Survey
  • 2.6 Proposed Work
  • 2.7 Analysis of the Study
  • 2.8 Conclusion
  • References
  • 3 DDoS Attack and Defense Mechanism in a Server
  • 3.1 Introduction
  • 3.2 DoS Attack
  • 3.3 DDoS Attack
  • 3.4 DDoS Mitigation
  • 3.5 Conclusion
  • Acknowledgement
  • References
  • 4 Dark Web Content Classification Using Quantum Encoding
  • 4.1 Introduction
  • 4.2 Related Work
  • 4.3 Proposed Approach
  • 4.4 Result and Discussion
  • 4.5 Conclusion
  • References
  • 5 Secure E-Voting Scheme Using Blockchain
  • 5.1 Introduction
  • 5.2 Literature Survey
  • 5.3 Implementation and Methodology
  • 5.4 Result Analysis &amp
  • Output
  • 5.5 Conclusion and Future Directions
  • References
  • 6 An Overview of Quantum Computingâ€"Based Hidden Markov Models
  • 6.1 Introduction
  • 6.2 Elaboration of Hidden Quantum Markov Model
  • 6.3 Example of HQMMs (Isolated Word Recognition in Action)
  • 6.4 Matching of State Observation Density
  • 6.5 Conclusion and Results
  • References
  • 7 Artificial Intelligence and Qubit-Based Operating Systems: Current Progress and Future Perspectives
  • 7.1 Introduction to OS, AI and ML
  • 7.2 Learning Configurations
  • 7.3 Building ML Models
  • 7.4 Work Done in Improving Process Scheduling.
  • 7.5 Artificial Intelligence in Distributed Operating Systems
  • 7.6 Current Progress
  • 7.7 Quantum Artificial Intelligence
  • 7.8 Conclusion
  • References
  • 8 Techno-Nationalism and Techno-Globalization: A Perspective from the National Security Act
  • 8.1 Introduction
  • 8.2 Conclusion
  • Acknowledgement
  • References
  • 9 Quantum Computing Based on Cybersecurity
  • 9.1 Introduction
  • 9.2 Preliminaries
  • 9.3 Threat Landscape
  • 9.4 Defensive Measurements, Countermeasures, and Best Practises
  • 9.5 Conclusion
  • References
  • 10 Quantum Cryptography for the Future Internet and the Security Analysis
  • 10.1 Introduction
  • 10.2 Related Works
  • 10.3 Preliminaries
  • 10.4 Quantum Cryptography for Future Internet
  • 10.5 Conclusion
  • References
  • 11 Security Aspects of Quantum Cryptography
  • 11.1 Introduction
  • 11.2 Literature Survey
  • 11.3 Quantum Key Distribution
  • 11.4 Cryptography
  • 11.5 Quantum Cryptography with Faint Laser Pulses
  • 11.6 Eavesdropping
  • 11.7 Conclusion
  • References
  • 12 Security Aspects of Quantum Machine Learning: Opportunities, Threats and Defenses
  • 12.1 Introduction
  • 12.2 Quantum Computing Basics
  • 12.3 Security Applications
  • 12.4 Quantum Machine Learning
  • 12.5 Conclusion
  • References
  • 13 Cyber Forensics and Cybersecurity: Threat Analysis, Research Statement and Opportunities for the Future
  • 13.1 Introduction
  • 13.2 Background
  • 13.3 Scope of this Work
  • 13.4 Methodology and Analysis of Simulation Results
  • 13.5 Quantum-Based Cybersecurity and Forensics
  • 13.6 Conclusion and Future Works
  • References
  • 14 Quantum Computing: A Software Engineering Approach
  • 14.1 Introduction
  • 14.2 Background of Research Area
  • 14.3 Why Cryptography?
  • 14.4 Classical Cryptography
  • 14.5 Quantum Cryptography (QCr)
  • 14.6 Quantum Key Distribution
  • 14.7 Cryptanalysis
  • 14.8 Entanglement.
  • 14.9 Quantum Teleportation
  • 14.10 Applications of QCr in Cybersecurity
  • 14.11 Quantum Key Distribution Protocols Implementation
  • 14.12 Research and Work
  • 14.13 Challenges Faced by QC
  • 14.14 Limitations
  • 14.15 Conclusion
  • References
  • 15 Quantum Computing to the Advantage of Neural Network
  • 15.1 Introduction
  • 15.2 Significance of Quantum Computers in Machine Learning
  • 15.3 Related Work
  • 15.4 Proposed Methodology
  • 15.5 Result and Analysis
  • 15.6 Conclusion
  • Glossary
  • References
  • 16 Image Filtering Based on VQA with Quantum Security
  • 16.1 Introduction
  • 16.2 Related Work
  • 16.3 Problem Statement
  • 16.4 Working
  • 16.5 Proposed Methodology Solution
  • 16.6 Result Analysis
  • 16.7 Conclusion
  • References
  • 17 Quantum Computing Techniques Assessment and Representation
  • 17.1 Introduction
  • 17.2 Fundamentals of QC
  • 17.3 Properties of QC
  • 17.4 Topography of QC
  • 17.5 The Architecture of QC
  • 17.6 Quantum Algorithm
  • 17.7 Design Limitations of Quantum Computer
  • 17.8 Different Categories of Quantum Computer
  • 17.9 Advantages of QC
  • 17.10 Disadvantages of QC
  • 17.11 Applications of QC
  • 17.12 Major Challenges in QC
  • 17.13 Conclusion
  • References
  • 18 Quantum Computing Technological Design Along with Its Dark Side
  • 18.1 Introduction
  • 18.2 Related Work
  • 18.3 History and Evolution of QCOM
  • 18.4 Components &amp
  • Concepts that Make QCOM Possible
  • 18.5 Plans for the Future Development of Quantum Computer
  • 18.6 Dark Side of QCOM
  • 18.7 Plans for Protection in Quantum Era
  • 18.8 Conclusion
  • References
  • 19 Quantum Technology for Military Applications
  • 19.1 Introduction
  • 19.2 Related Work
  • 19.3 Overview of QTECH
  • 19.4 QTECH in Defence
  • 19.5 Military Applications of QTECH
  • 19.6 Challenges and Consequences of Quantum Warfare
  • 19.7 Conclusion
  • References.
  • 20 Potential Threats and Ethical Risks of Quantum Computing
  • 20.1 Introduction
  • 20.2 Research Design &amp
  • Methodology
  • 20.3 Brief In-Depth Overview of Possible Vulnerabilities
  • 20.4 New Risks to be Created
  • 20.5 Futuristic Picture of Quantum Ethics
  • 20.6 Conclusion
  • References
  • 21 Is Quantum Computing a Cybersecurity Threat?
  • 21.1 Introduction
  • 21.2 How QCom Threatens Cybersecurity
  • 21.3 How QCom could Improve Cybersecurity
  • 21.4 Quantum Cryptography and Its Applications
  • 21.5 Proposed Methodology
  • 21.6 Background/Objective
  • 21.7 Conclusion
  • References
  • 22 Quantum Computing in Data Security: A Critical Assessment
  • 22.1 Introduction
  • 22.2 Present Cryptographic Algorithms and Systems
  • 22.3 Comparing Traditional Computing and Quantum Computing
  • 22.4 Post-Quantum Cryptography (PQC)
  • 22.5 Quantum Cryptography and Its Applications
  • 22.6 Corporate Competitions Towards Quantum Computing
  • 22.7 Threats Posed to Critical Infrastructure and Mechanisms
  • 22.8 Conclusion
  • References
  • 23 Quantum Computing and Security Aspects of Attention-Based Visual Question Answering with Long Short-Term Memory
  • 23.1 Introduction
  • 23.2 Literature Review
  • 23.3 Problem Statement
  • 23.4 Problem Elaboration
  • 23.5 Proposed Methodology
  • 23.6 Methods
  • 23.7 Solution Approach
  • 23.8 Expected Results
  • 23.9 Conclusion
  • 23.10 Abbreviations
  • References
  • 24 Quantum Cryptography â€" A Security Architecture
  • 24.1 Introduction
  • 24.2 Related Work
  • 24.3 Properties of Quantum Information
  • 24.4 Methodology
  • 24.5 Supported Explanation
  • 24.6 Conclusion
  • References
  • 25 Quantum Computing Anomalies in Communication
  • 25.1 Introduction
  • 25.2 Significance of Quantum Computing
  • 25.3 The Dark Side of Quantum Computing
  • 25.4 Previous Works
  • 25.5 Conclusion
  • References.
  • 26 Intrusion Detection System via Classical SVM and Quantum SVM: A Comparative Overview
  • 26.1 Introduction
  • 26.2 Related Work
  • 26.3 Models for IDS
  • 26.4 Conclusion
  • References
  • 27 Quantum Computing in Military Applications and Operations
  • 27.1 Introduction
  • 27.2 Literary Survey
  • 27.3 Definition
  • 27.4 Quantum Military Applications
  • 27.5 Applications of QCRYP
  • 27.6 Limitations
  • 27.7 Conclusion
  • References
  • 28 Quantum Cryptography Techniques: Evaluation
  • 28.1 Introduction
  • 28.2 Quantum Technology (QTech) in Defence
  • 28.3 The QKD Model
  • 28.4 Related Work
  • 28.5 Preliminaries
  • 28.6 QKD Protocols Implementation
  • 28.7 Risk Analysis
  • 28.8 Applications of Quantum Cryptography
  • 28.9 Challenges of Quantum Cryptography
  • 28.10 Conclusion and Future Work
  • References
  • 29 Cyber Crime Attack Vulnerability Review for Quantum Computing
  • 29.1 Introduction
  • 29.2 Significance of Cyber Crime Attack for QC
  • 29.3 Related Work
  • 29.4 Proposed Methodology
  • 29.5 Conclusion
  • References
  • About the Editors
  • Index
  • Also of Interest
  • End User License Agreement.