AI-Enhanced Solutions for Sustainable Cybersecurity

AI-Enhanced Solutions for Sustainable Cybersecurity

DOI: 10.4018/979-8-3693-6371-3
ISBN13: 9798369363713|ISBN13 Softcover: 9798369363720|EISBN13: 9798369363737
Hardcover:
Forthcoming
$225.00
TOTAL SAVINGS: $225.00
Benefits
  • Printed-On-Demand (POD)
  • Usually ships one day from order
Hardcover:
Forthcoming
$225.00
TOTAL SAVINGS: $225.00
Benefits
  • Printed-On-Demand (POD)
  • Usually ships one day from order
E-Book:
Forthcoming
$225.00
TOTAL SAVINGS: $225.00
Benefits
  • Multi-user license (no added fee)
  • Immediate access after purchase
  • No DRM
  • PDF download
E-Book:
Forthcoming
$225.00
TOTAL SAVINGS: $225.00
Benefits
  • Immediate access after purchase
  • No DRM
  • PDF download
  • Receive a 10% Discount on eBooks
Hardcover +
E-Book:
Forthcoming
$270.00
TOTAL SAVINGS: $270.00
Benefits
  • Printed-On-Demand (POD)
  • Usually ships one day from order
  • Multi-user license (no added fee)
  • Immediate access after purchase
  • No DRM
  • PDF download
Hardcover +
E-Book:
Forthcoming
$270.00
TOTAL SAVINGS: $270.00
Benefits
  • Printed-On-Demand (POD)
  • Usually ships one day from order
  • Immediate access after purchase
  • No DRM
  • PDF download
Softcover:
Forthcoming
$170.00
TOTAL SAVINGS: $170.00
Benefits
  • Printed-On-Demand (POD)
  • Usually ships one day from order
Softcover:
Forthcoming
$170.00
TOTAL SAVINGS: $170.00
Benefits
  • Printed-On-Demand (POD)
  • Usually ships one day from order
Article Processing Charge:
Forthcoming
$1,950.00
TOTAL SAVINGS: $1,950.00
Description & Coverage
Description:

In the recent years, many new technologies have been invented and implemented to make our daily lives easier, thus multiplying the problems of cybersecurity. In fact, such technologies provide enhanced opportunities of accessibility, completeness, accessibility, availability, evolvability, confidentiality and interoperability for users in terms of device-to-device communication. Nonetheless, the diversity of potential attack sources, together with the innovativeness of these technologies, means they are vulnerable to cyber-attacks, and therefore to a failure to meet standardization and security requirements.

This book is designed to provide all the necessary knowledge for young researchers, academics, and industry professionals who want to understand the diffrent cybersecurity solutions either those that are based on machine learning, deep learning or data analysis methodology, and blockchain for securing IoT technologies.

Coverage:
Coverage forthcoming
Table of Contents
Search this Book:
Reset
Editor/Author Biographies

Prof. Dr. Mourade Azrour received his PhD from Faculty of sciences and Techniques, Moulay Ismail University of Meknes, Morocco. He has received his MS in computer and distributed systems from Faculty of Sciences, Ibn Zouhr University, Agadir, Morocco in 2014. Mourade currently works as computer sciences professor at the Department of Computer Science, Faculty of Sciences and Techniques, Moulay Ismail University of Meknès. His research interests include Authentication protocol, Computer Security, Internet of things, Smart systems, Machine learning and so ones. Mourade is member of the member of the scientific committee of numerous international conferences. He is also a reviewer of various scientific journals. He has published more than 85 scientific papers and book chapters. Mourade Has edited many scientific books “IoT and Smart Devices for Sustainable Environment” and “Advanced Technology for Smart Environment and Energy”. Finally, he has served as guest editor in journals “EAI Endorsed Transactions on Internet of Things”, “Tsinghua Science and Technology”, “Applied Sciences MDPI” and “Sustainability MDPI.”

Jamal MABROUKI received his PhD in Process and Environmental Engineering at Mohammed V University in Rabat, specializing in artificial intelligence and smart automatic systems. He completed the Bachelor of Science in Physics and Chemistry with honors from Hassan II University in Casablanca, Morocco and the engineer in Environment and smart system. His research is on intelligent monitoring, control, and management systems and more particularly on sensing and supervising remote intoxication systems, smart self-supervised systems and recurrent neural networks. He has published several papers in conferences and indexed journals, most of them related to artificial intelligent systems, internet of things or big data and mining. Jamal will currently work in environment, energy and smart system professor at Mohammed V University in Rabat, Faculty of Science. Jamal is scientific committee member of numerous national and international conferences. He is also a reviewer of Modeling Earth Systems and Environment; International Journal of Environmental Analytical Chemistry; International Journal of Modeling, Simulation, and Scientific Computing; The Journal of Supercomputing, Energy & Environment and Big Data Mining and Analytics…

Azidine Guezzaz received his Ph.D from Ibn Zohr University Agadir, Morocco in 2018. He obtained his Master in computer and distributed systems from Faculty of Sciences, Ibn Zouhr University, Agadir, Morocco in 2013. He is currently an associate professor of computer science and mathematics at Cadi Ayyad University Marrakech, Morocco. His main field of research interest is computer security, cryptography, artificial intelligence, intrusion detection and smart cities. He is member of the scientific and orgnizing committee of various international conferences. Azidine is a guest editor of special issues in Tsinghua Science and Technology journal, Sustainability Journal and EAI Endorsed Transactions on Internet of Things journal. He is also an editor of some Books and reviewer of various scientific journals.

Abdulatif Alabdulatif is an associated professor at the School of Computer, Qassim University, Saudi Arabia. He completed his Ph.D. degree in Computer Science from RMIT University, Australia in 2018. He received his B.Sc. degree in Computer Science from Qassim University, Saudi Arabia in 2008 and his M.Sc. degree in Computer Science from RMIT University, Australia in 2013. He has published more than 60 academic papers in prominent journals. His research interests include applied cryptography, cloud computing, data mining and remote healthcare.

Archiving
All of IGI Global's content is archived via the CLOCKSS and LOCKSS initiative. Additionally, all IGI Global published content is available in IGI Global's InfoSci® platform.