Chapter
Publicly Available
Frontmatter
Chapters in this book
- Frontmatter I
- Contents V
- Chapter 1 Emerging Cyber Threats: Challenges, Impacts, and Proactive Defenses in the Digital Age 1
- Chapter 2 Silent Guardians: Proactive Approaches to Modern Cyber Threats 31
- Chapter 3 Data Science for Threat Detection and Analysis 59
- Chapter 4 An Integrated Approach: Merging Cybersecurity, AI, and Threat Detection 87
- Chapter 5 Cybersecurity Analytics: A Review of Challenges and the Role of Machine Learning and Deep Learning in Threat Detection 103
- Chapter 6 Hardware-Based Authentication Techniques for Secure Data Transmission in IoT Edge Computing 141
- Chapter 7 Securing the IoT Networks Using a Deep Learning Paradigm for Intrusion Detection 161
- Chapter 8 Hybrid Malware Detection and Classification Using Explainable Deep Neural Network 177
- Chapter 9 Light POW for Smart Grid Communication 201
- Chapter 10 Zero Trust Architecture – A Beginner’s Guide 227
- Chapter 11 Post-quantum Cryptography for Enhanced Authentication in Mobile Data Communication: Resilience Against Quantum Attacks 265
- Chapter 12 Two-Factor Authentication (2FA) and Multi-factor Authentication (MFA) Solutions for Secure Mobile Data Communication 287
- Chapter 13 Artificial Intelligence and Machine Learning in Cybersecurity 313
- Chapter 14 Enhancing IoT Security with Zero Trust Networking: Protecting Wireless Sensors, Edge Devices, and Cloud Environments 343
- Chapter 15 Biometric Authentication Methods for Mobile Devices: Exploring Fingerprint, Face Recognition, and Iris Scanning 365
- Chapter 16 Robust Dynamic Voice-Based Key Generation Using Novel Fuzzy Extraction, Averaged Thresholding, and Hamming Enhancement Techniques 385
- Chapter 17 Enhancing Cybersecurity with Artificial Intelligence and Machine Learning Techniques 413
- Chapter 18 Firewall and IDS in Cybersecurity 439
- Index
Chapters in this book
- Frontmatter I
- Contents V
- Chapter 1 Emerging Cyber Threats: Challenges, Impacts, and Proactive Defenses in the Digital Age 1
- Chapter 2 Silent Guardians: Proactive Approaches to Modern Cyber Threats 31
- Chapter 3 Data Science for Threat Detection and Analysis 59
- Chapter 4 An Integrated Approach: Merging Cybersecurity, AI, and Threat Detection 87
- Chapter 5 Cybersecurity Analytics: A Review of Challenges and the Role of Machine Learning and Deep Learning in Threat Detection 103
- Chapter 6 Hardware-Based Authentication Techniques for Secure Data Transmission in IoT Edge Computing 141
- Chapter 7 Securing the IoT Networks Using a Deep Learning Paradigm for Intrusion Detection 161
- Chapter 8 Hybrid Malware Detection and Classification Using Explainable Deep Neural Network 177
- Chapter 9 Light POW for Smart Grid Communication 201
- Chapter 10 Zero Trust Architecture – A Beginner’s Guide 227
- Chapter 11 Post-quantum Cryptography for Enhanced Authentication in Mobile Data Communication: Resilience Against Quantum Attacks 265
- Chapter 12 Two-Factor Authentication (2FA) and Multi-factor Authentication (MFA) Solutions for Secure Mobile Data Communication 287
- Chapter 13 Artificial Intelligence and Machine Learning in Cybersecurity 313
- Chapter 14 Enhancing IoT Security with Zero Trust Networking: Protecting Wireless Sensors, Edge Devices, and Cloud Environments 343
- Chapter 15 Biometric Authentication Methods for Mobile Devices: Exploring Fingerprint, Face Recognition, and Iris Scanning 365
- Chapter 16 Robust Dynamic Voice-Based Key Generation Using Novel Fuzzy Extraction, Averaged Thresholding, and Hamming Enhancement Techniques 385
- Chapter 17 Enhancing Cybersecurity with Artificial Intelligence and Machine Learning Techniques 413
- Chapter 18 Firewall and IDS in Cybersecurity 439
- Index