Quantum Computing in Cybersecurity
Machine learning, deep learning, probabilistic neural networks, blockchain, and other new technologies all demand extremely high processing speeds. A quantum computer is an example of such a system. Quantum computers may be accessed over the internet. This technology poses a significant risk, since...
Otros Autores: | |
---|---|
Formato: | Libro electrónico |
Idioma: | Inglés |
Publicado: |
Hoboken, NJ :
John Wiley & Sons, Inc
[2023]
|
Edición: | First edition |
Materias: | |
Ver en Biblioteca Universitat Ramon Llull: | https://discovery.url.edu/permalink/34CSUC_URL/1im36ta/alma991009811324206719 |
Tabla de Contenidos:
- Intro
- Table of Contents
- Series Page
- Title Page
- Copyright Page
- Preface
- 1 Cyber Quantum Computing (Security) Using Rectified Probabilistic Packet Mark for Big Data
- 1.1 Introduction
- 1.2 Denial-of-Service Attacks
- 1.3 Related Work
- 1.4 Proposed Methodology
- 1.5 Trace Back Mechanism for Rectified Probabilistic Packet Marking
- 1.6 Conclusion
- References
- 2 Secure Distinctive Data Transmission in Fog System Using Quantum Cryptography
- 2.1 Introduction
- 2.2 Properties of Quantum Computing
- 2.3 Applications of Quantum Computing
- 2.4 Background
- 2.5 Literature Survey
- 2.6 Proposed Work
- 2.7 Analysis of the Study
- 2.8 Conclusion
- References
- 3 DDoS Attack and Defense Mechanism in a Server
- 3.1 Introduction
- 3.2 DoS Attack
- 3.3 DDoS Attack
- 3.4 DDoS Mitigation
- 3.5 Conclusion
- Acknowledgement
- References
- 4 Dark Web Content Classification Using Quantum Encoding
- 4.1 Introduction
- 4.2 Related Work
- 4.3 Proposed Approach
- 4.4 Result and Discussion
- 4.5 Conclusion
- References
- 5 Secure E-Voting Scheme Using Blockchain
- 5.1 Introduction
- 5.2 Literature Survey
- 5.3 Implementation and Methodology
- 5.4 Result Analysis &
- Output
- 5.5 Conclusion and Future Directions
- References
- 6 An Overview of Quantum Computingâ€"Based Hidden Markov Models
- 6.1 Introduction
- 6.2 Elaboration of Hidden Quantum Markov Model
- 6.3 Example of HQMMs (Isolated Word Recognition in Action)
- 6.4 Matching of State Observation Density
- 6.5 Conclusion and Results
- References
- 7 Artificial Intelligence and Qubit-Based Operating Systems: Current Progress and Future Perspectives
- 7.1 Introduction to OS, AI and ML
- 7.2 Learning Configurations
- 7.3 Building ML Models
- 7.4 Work Done in Improving Process Scheduling.
- 7.5 Artificial Intelligence in Distributed Operating Systems
- 7.6 Current Progress
- 7.7 Quantum Artificial Intelligence
- 7.8 Conclusion
- References
- 8 Techno-Nationalism and Techno-Globalization: A Perspective from the National Security Act
- 8.1 Introduction
- 8.2 Conclusion
- Acknowledgement
- References
- 9 Quantum Computing Based on Cybersecurity
- 9.1 Introduction
- 9.2 Preliminaries
- 9.3 Threat Landscape
- 9.4 Defensive Measurements, Countermeasures, and Best Practises
- 9.5 Conclusion
- References
- 10 Quantum Cryptography for the Future Internet and the Security Analysis
- 10.1 Introduction
- 10.2 Related Works
- 10.3 Preliminaries
- 10.4 Quantum Cryptography for Future Internet
- 10.5 Conclusion
- References
- 11 Security Aspects of Quantum Cryptography
- 11.1 Introduction
- 11.2 Literature Survey
- 11.3 Quantum Key Distribution
- 11.4 Cryptography
- 11.5 Quantum Cryptography with Faint Laser Pulses
- 11.6 Eavesdropping
- 11.7 Conclusion
- References
- 12 Security Aspects of Quantum Machine Learning: Opportunities, Threats and Defenses
- 12.1 Introduction
- 12.2 Quantum Computing Basics
- 12.3 Security Applications
- 12.4 Quantum Machine Learning
- 12.5 Conclusion
- References
- 13 Cyber Forensics and Cybersecurity: Threat Analysis, Research Statement and Opportunities for the Future
- 13.1 Introduction
- 13.2 Background
- 13.3 Scope of this Work
- 13.4 Methodology and Analysis of Simulation Results
- 13.5 Quantum-Based Cybersecurity and Forensics
- 13.6 Conclusion and Future Works
- References
- 14 Quantum Computing: A Software Engineering Approach
- 14.1 Introduction
- 14.2 Background of Research Area
- 14.3 Why Cryptography?
- 14.4 Classical Cryptography
- 14.5 Quantum Cryptography (QCr)
- 14.6 Quantum Key Distribution
- 14.7 Cryptanalysis
- 14.8 Entanglement.
- 14.9 Quantum Teleportation
- 14.10 Applications of QCr in Cybersecurity
- 14.11 Quantum Key Distribution Protocols Implementation
- 14.12 Research and Work
- 14.13 Challenges Faced by QC
- 14.14 Limitations
- 14.15 Conclusion
- References
- 15 Quantum Computing to the Advantage of Neural Network
- 15.1 Introduction
- 15.2 Significance of Quantum Computers in Machine Learning
- 15.3 Related Work
- 15.4 Proposed Methodology
- 15.5 Result and Analysis
- 15.6 Conclusion
- Glossary
- References
- 16 Image Filtering Based on VQA with Quantum Security
- 16.1 Introduction
- 16.2 Related Work
- 16.3 Problem Statement
- 16.4 Working
- 16.5 Proposed Methodology Solution
- 16.6 Result Analysis
- 16.7 Conclusion
- References
- 17 Quantum Computing Techniques Assessment and Representation
- 17.1 Introduction
- 17.2 Fundamentals of QC
- 17.3 Properties of QC
- 17.4 Topography of QC
- 17.5 The Architecture of QC
- 17.6 Quantum Algorithm
- 17.7 Design Limitations of Quantum Computer
- 17.8 Different Categories of Quantum Computer
- 17.9 Advantages of QC
- 17.10 Disadvantages of QC
- 17.11 Applications of QC
- 17.12 Major Challenges in QC
- 17.13 Conclusion
- References
- 18 Quantum Computing Technological Design Along with Its Dark Side
- 18.1 Introduction
- 18.2 Related Work
- 18.3 History and Evolution of QCOM
- 18.4 Components &
- Concepts that Make QCOM Possible
- 18.5 Plans for the Future Development of Quantum Computer
- 18.6 Dark Side of QCOM
- 18.7 Plans for Protection in Quantum Era
- 18.8 Conclusion
- References
- 19 Quantum Technology for Military Applications
- 19.1 Introduction
- 19.2 Related Work
- 19.3 Overview of QTECH
- 19.4 QTECH in Defence
- 19.5 Military Applications of QTECH
- 19.6 Challenges and Consequences of Quantum Warfare
- 19.7 Conclusion
- References.
- 20 Potential Threats and Ethical Risks of Quantum Computing
- 20.1 Introduction
- 20.2 Research Design &
- Methodology
- 20.3 Brief In-Depth Overview of Possible Vulnerabilities
- 20.4 New Risks to be Created
- 20.5 Futuristic Picture of Quantum Ethics
- 20.6 Conclusion
- References
- 21 Is Quantum Computing a Cybersecurity Threat?
- 21.1 Introduction
- 21.2 How QCom Threatens Cybersecurity
- 21.3 How QCom could Improve Cybersecurity
- 21.4 Quantum Cryptography and Its Applications
- 21.5 Proposed Methodology
- 21.6 Background/Objective
- 21.7 Conclusion
- References
- 22 Quantum Computing in Data Security: A Critical Assessment
- 22.1 Introduction
- 22.2 Present Cryptographic Algorithms and Systems
- 22.3 Comparing Traditional Computing and Quantum Computing
- 22.4 Post-Quantum Cryptography (PQC)
- 22.5 Quantum Cryptography and Its Applications
- 22.6 Corporate Competitions Towards Quantum Computing
- 22.7 Threats Posed to Critical Infrastructure and Mechanisms
- 22.8 Conclusion
- References
- 23 Quantum Computing and Security Aspects of Attention-Based Visual Question Answering with Long Short-Term Memory
- 23.1 Introduction
- 23.2 Literature Review
- 23.3 Problem Statement
- 23.4 Problem Elaboration
- 23.5 Proposed Methodology
- 23.6 Methods
- 23.7 Solution Approach
- 23.8 Expected Results
- 23.9 Conclusion
- 23.10 Abbreviations
- References
- 24 Quantum Cryptography â€" A Security Architecture
- 24.1 Introduction
- 24.2 Related Work
- 24.3 Properties of Quantum Information
- 24.4 Methodology
- 24.5 Supported Explanation
- 24.6 Conclusion
- References
- 25 Quantum Computing Anomalies in Communication
- 25.1 Introduction
- 25.2 Significance of Quantum Computing
- 25.3 The Dark Side of Quantum Computing
- 25.4 Previous Works
- 25.5 Conclusion
- References.
- 26 Intrusion Detection System via Classical SVM and Quantum SVM: A Comparative Overview
- 26.1 Introduction
- 26.2 Related Work
- 26.3 Models for IDS
- 26.4 Conclusion
- References
- 27 Quantum Computing in Military Applications and Operations
- 27.1 Introduction
- 27.2 Literary Survey
- 27.3 Definition
- 27.4 Quantum Military Applications
- 27.5 Applications of QCRYP
- 27.6 Limitations
- 27.7 Conclusion
- References
- 28 Quantum Cryptography Techniques: Evaluation
- 28.1 Introduction
- 28.2 Quantum Technology (QTech) in Defence
- 28.3 The QKD Model
- 28.4 Related Work
- 28.5 Preliminaries
- 28.6 QKD Protocols Implementation
- 28.7 Risk Analysis
- 28.8 Applications of Quantum Cryptography
- 28.9 Challenges of Quantum Cryptography
- 28.10 Conclusion and Future Work
- References
- 29 Cyber Crime Attack Vulnerability Review for Quantum Computing
- 29.1 Introduction
- 29.2 Significance of Cyber Crime Attack for QC
- 29.3 Related Work
- 29.4 Proposed Methodology
- 29.5 Conclusion
- References
- About the Editors
- Index
- Also of Interest
- End User License Agreement.