Quantum computing in cybersecurity / (Record no. 91616)

000 -LEADER
fixed length control field 23490nam a22004937i 4500
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20250803174737.0
006 - FIXED-LENGTH DATA ELEMENTS--ADDITIONAL MATERIAL CHARACTERISTICS--GENERAL INFORMATION
fixed length control field m||||||||d||||||||
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION
fixed length control field cr||n|||||||||
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 250803t20232023nju o 000 0 eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781394166336
Qualifying information hardcover
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781394167401
Qualifying information electronic book
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 1394167407
Qualifying information electronic book
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 1394167385
Qualifying information electronic book
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781394167388
Qualifying information (electronic bk.)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
Cancelled/invalid ISBN 1394166338
Qualifying information hardcover
035 #9 - SYSTEM CONTROL NUMBER
System control number (GOBI)99996244677
035 ## - SYSTEM CONTROL NUMBER
System control number (OCoLC)1405843019
Canceled/invalid control number (OCoLC)1405405523
037 ## - SOURCE OF ACQUISITION
Stock number 9781394166336
Source of stock number/acquisition O'Reilly Media
041 ## - LANGUAGE CODE
Language code of text/sound track or separate title eng
050 #4 - LIBRARY OF CONGRESS CALL NUMBER
Classification number QA76.9.A25
Item number Q83 2023
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 005.80285
Edition number 23/eng/20231025
245 00 - TITLE STATEMENT
Title Quantum computing in cybersecurity /
Statement of responsibility, etc edited by Romil Rawat... [and 6 others].
264 #1 - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT)
Place of publication, distribution, etc Hoboken, NJ :
Name of publisher, distributor, etc John Wiley & Sons, Inc. ;
Place of publication, distribution, etc Beverly, MA :
Name of publisher, distributor, etc Scrivener Publishing LLC,
Date of publication, distribution, etc 2023.
264 #4 - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT)
Date of publication, distribution, etc ©2023
300 ## - PHYSICAL DESCRIPTION
Extent 1 online resource.
336 ## - CONTENT TYPE
Content type term text
Content type code txt
Source rdacontent
337 ## - MEDIA TYPE
Media type term computer
Media type code c
Source rdamedia
338 ## - CARRIER TYPE
Carrier type term online resource
Carrier type code cr
Source rdacarrier
505 0# - CONTENTS
Formatted contents note Intro -- Table of Contents -- Series Page -- Title Page -- Copyright Page -- Preface -- 1 Cyber Quantum Computing (Security) Using Rectified Probabilistic Packet Mark for Big Data -- 1.1 Introduction -- 1.2 Denial-of-Service Attacks -- 1.3 Related Work -- 1.4 Proposed Methodology -- 1.5 Trace Back Mechanism for Rectified Probabilistic Packet Marking -- 1.6 Conclusion -- References -- 2 Secure Distinctive Data Transmission in Fog System Using Quantum Cryptography -- 2.1 Introduction -- 2.2 Properties of Quantum Computing -- 2.3 Applications of Quantum Computing -- 2.4 Background -- 2.5 Literature Survey -- 2.6 Proposed Work -- 2.7 Analysis of the Study -- 2.8 Conclusion -- References -- 3 DDoS Attack and Defense Mechanism in a Server -- 3.1 Introduction -- 3.2 DoS Attack -- 3.3 DDoS Attack -- 3.4 DDoS Mitigation -- 3.5 Conclusion -- Acknowledgement -- References -- 4 Dark Web Content Classification Using Quantum Encoding -- 4.1 Introduction -- 4.2 Related Work -- 4.3 Proposed Approach -- 4.4 Result and Discussion -- 4.5 Conclusion -- References -- 5 Secure E-Voting Scheme Using Blockchain -- 5.1 Introduction -- 5.2 Literature Survey -- 5.3 Implementation and Methodology -- 5.4 Result Analysis &amp -- Output -- 5.5 Conclusion and Future Directions -- References -- 6 An Overview of Quantum Computingâ€"Based Hidden Markov Models -- 6.1 Introduction -- 6.2 Elaboration of Hidden Quantum Markov Model -- 6.3 Example of HQMMs (Isolated Word Recognition in Action) -- 6.4 Matching of State Observation Density -- 6.5 Conclusion and Results -- References -- 7 Artificial Intelligence and Qubit-Based Operating Systems: Current Progress and Future Perspectives -- 7.1 Introduction to OS, AI and ML -- 7.2 Learning Configurations -- 7.3 Building ML Models -- 7.4 Work Done in Improving Process Scheduling.
505 8# - CONTENTS
Formatted contents note Table of Contents<br/>Preface xix<br/><br/>1 Cyber Quantum Computing (Security) Using Rectified Probabilistic Packet Mark for Big Data 1<br/>Anil V. Turukmane and Ganesh Khekare<br/><br/>1.1 Introduction 2<br/><br/>1.2 Denial-of-Service Attacks 3<br/><br/>1.3 Related Work 5<br/><br/>1.4 Proposed Methodology 8<br/><br/>1.5 Trace Back Mechanism for Rectified Probabilistic Packet Marking 10<br/><br/>1.6 Conclusion 13<br/><br/>2 Secure Distinctive Data Transmission in Fog System Using Quantum Cryptography 17<br/>Ambika N.<br/><br/>2.1 Introduction 18<br/><br/>2.2 Properties of Quantum Computing 19<br/><br/>2.3 Applications of Quantum Computing 22<br/><br/>2.4 Background 24<br/><br/>2.5 Literature Survey 25<br/><br/>2.6 Proposed Work 26<br/><br/>2.7 Analysis of the Study 27<br/><br/>2.8 Conclusion 29<br/><br/>3 DDoS Attack and Defense Mechanism in a Server 33<br/>Pranav Bhatnagar, Shreya Pai and Minhaj Khan<br/><br/>3.1 Introduction 34<br/><br/>3.2 DoS Attack 37<br/><br/>3.3 DDoS Attack 39<br/><br/>3.4 DDoS Mitigation 51<br/><br/>3.5 Conclusion 54<br/><br/>4 Dark Web Content Classification Using Quantum Encoding 57<br/>Ashwini Dalvi, Soham Bhoir, Faruk Kazi and S. G. Bhirud<br/><br/>4.1 Introduction 58<br/><br/>4.2 Related Work 61<br/><br/>4.3 Proposed Approach 65<br/><br/>4.4 Result and Discussion 70<br/><br/>4.5 Conclusion 76<br/><br/>5 Secure E-Voting Scheme Using Blockchain 81<br/>Shrimoyee Banerjee and Umesh Bodkhe<br/><br/>5.1 Introduction 82<br/><br/>5.2 Literature Survey 87<br/><br/>5.3 Implementation and Methodology 89<br/><br/>5.4 Result Analysis & Output 100<br/><br/>5.5 Conclusion and Future Directions 102<br/><br/>6 An Overview of Quantum Computing--Based Hidden Markov Models 105<br/>B. Abhishek, Sathian D., Amit Kumar Tyagi and Deepshikha Agarwal<br/><br/>6.1 Introduction 105<br/><br/>6.2 Elaboration of Hidden Quantum Markov Model 107<br/><br/>6.3 Example of HQMMs (Isolated Word Recognition in Action) 115<br/><br/>6.4 Matching of State Observation Density 117<br/><br/>6.5 Conclusion and Results 118<br/><br/>7 Artificial Intelligence and Qubit--Based Operating Systems: Current Progress and Future Perspectives 121<br/>Tejashwa Agarwal and Amit Kumar Tyagi<br/><br/>7.1 Introduction to OS, AI and ML 122<br/><br/>7.2 Learning Configurations 123<br/><br/>7.3 Building ML Models 124<br/><br/>7.4 Work Done in Improving Process Scheduling 124<br/><br/>7.5 Artificial Intelligence in Distributed Operating Systems 128<br/><br/>7.6 Current Progress 129<br/><br/>7.7 Quantum Artificial Intelligence 133<br/><br/>7.8 Conclusion 135<br/><br/>8 Techno-Nationalism and Techno-Globalization: A Perspective from the National Security Act 137<br/>Hepi Suthar, Hitesh Rawat, Gayathri M. and K. Chidambarathanu<br/><br/>8.1 Introduction 138<br/><br/>8.2 Conclusion 161<br/><br/>9 Quantum Computing Based on Cybersecurity 165<br/>P. William, Vivek Parganiha and D.B. Pardeshi<br/><br/>9.1 Introduction 166<br/><br/>9.2 Preliminaries 166<br/><br/>9.3 Threat Landscape 168<br/><br/>9.4 Defensive Measurements, Countermeasures, and Best Practises 170<br/><br/>9.5 Conclusion 171<br/><br/>10 Quantum Cryptography for the Future Internet and the Security Analysis 175<br/>P. William, A.B. Pawar and M.A. Jawale<br/><br/>10.1 Introduction 175<br/><br/>10.2 Related Works 177<br/><br/>10.3 Preliminaries 178<br/><br/>10.4 Quantum Cryptography for Future Internet 180<br/><br/>10.5 Conclusion 185<br/><br/>11 Security Aspects of Quantum Cryptography 189<br/>P. William, Siddhartha Choubey and Abha Choubey<br/><br/>11.1 Introduction 189<br/><br/>11.2 Literature Survey 190<br/><br/>11.3 Quantum Key Distribution 192<br/><br/>11.4 Cryptography 193<br/><br/>11.5 Quantum Cryptography with Faint Laser Pulses 195<br/><br/>11.6 Eavesdropping 196<br/><br/>11.7 Conclusion 198<br/><br/>12 Security Aspects of Quantum Machine Learning: Opportunities, Threats and Defenses 201<br/>P. William, Vivek Parganiha and D.B. Pardeshi<br/><br/>12.1 Introduction 201<br/><br/>12.2 Quantum Computing Basics 202<br/><br/>12.3 Security Applications 206<br/><br/>12.4 Quantum Machine Learning 210<br/><br/>12.5 Conclusion 213<br/><br/>13 Cyber Forensics and Cybersecurity: Threat Analysis, Research Statement and Opportunities for the Future 217<br/>Nirav Bhatt and Amit Kumar Tyagi<br/><br/>13.1 Introduction 218<br/><br/>13.2 Background 219<br/><br/>13.3 Scope of this Work 220<br/><br/>13.4 Methodology and Analysis of Simulation Results 222<br/><br/>13.5 Quantum-Based Cybersecurity and Forensics 228<br/><br/>13.6 Conclusion and Future Works 230<br/><br/>14 Quantum Computing: A Software Engineering Approach 233<br/>Mradul Agrawal, Aviral Jain, Rudraksh Thorat and Shivam Sharma<br/><br/>14.1 Introduction 234<br/><br/>14.2 Background of Research Area 235<br/><br/>14.3 Why Cryptography? 235<br/><br/>14.4 Classical Cryptography 238<br/><br/>14.5 Quantum Cryptography (QCr) 239<br/><br/>14.6 Quantum Key Distribution 240<br/><br/>14.7 Cryptanalysis 242<br/><br/>14.8 Entanglement 242<br/><br/>14.9 Quantum Teleportation 243<br/><br/>14.10 Applications of QCr in Cybersecurity 243<br/><br/>14.11 Quantum Key Distribution Protocols Implementation 244<br/><br/>14.12 Research and Work 244<br/><br/>14.13 Challenges Faced by QC 245<br/><br/>14.14 Limitations 245<br/><br/>14.15 Conclusion 246<br/><br/>15 Quantum Computing to the Advantage of Neural Network 249<br/>Aditya Maltare, Ishita Jain, Keshav Agrawal and Tanya Rawat<br/><br/>15.1 Introduction 250<br/><br/>15.2 Significance of Quantum Computers in Machine Learning 251<br/><br/>15.3 Related Work 252<br/><br/>15.4 Proposed Methodology 255<br/><br/>15.5 Result and Analysis 258<br/><br/>15.6 Conclusion 258<br/><br/>16 Image Filtering Based on VQA with Quantum Security 263<br/>Avni Burman, Bhushan Bawaskar, Harsh Dindorkar and Hrithik Surjan<br/><br/>16.1 Introduction 263<br/><br/>16.2 Related Work 267<br/><br/>16.3 Problem Statement 269<br/><br/>16.4 Working 269<br/><br/>16.5 Proposed Methodology Solution 270<br/><br/>16.6 Result Analysis 272<br/><br/>16.7 Conclusion 272<br/><br/>17 Quantum Computing Techniques Assessment and Representation 275<br/>Dewansh Khandelwal, Nimish Vyas, Priyanshi Skaktawat, Vaidehi Anwekar, Om Kumar C.U. and D. Jeyakumar<br/><br/>17.1 Introduction 276<br/><br/>17.2 Fundamentals of QC 278<br/><br/>17.3 Properties of QC 278<br/><br/>17.4 Topography of QC 280<br/><br/>17.5 The Architecture of QC 281<br/><br/>17.6 Quantum Algorithm 283<br/><br/>17.7 Design Limitations of Quantum Computer 284<br/><br/>17.8 Different Categories of Quantum Computer 286<br/><br/>17.9 Advantages of QC 287<br/><br/>17.10 Disadvantages of QC 287<br/><br/>17.11 Applications of QC 288<br/><br/>17.12 Major Challenges in QC 290<br/><br/>17.13 Conclusion 291<br/><br/>18 Quantum Computing Technological Design Along with Its Dark Side 295<br/>Divyam Pithawa, Sarthak Nahar, Vivek Bhardwaj, Romil Rawat, Ruchi Dronawat and Anjali Rawat<br/><br/>18.1 Introduction 296<br/><br/>18.2 Related Work 297<br/><br/>18.3 History and Evolution of QCOM 298<br/><br/>18.4 Components & Concepts that Make QCOM Possible 300<br/><br/>18.5 Plans for the Future Development of Quantum Computer 302<br/><br/>18.6 Dark Side of QCOM 306<br/><br/>18.7 Plans for Protection in Quantum Era 309<br/><br/>18.8 Conclusion 310<br/><br/>19 Quantum Technology for Military Applications 313<br/>Sarthak Nahar, Divyam Pithawa, Vivek Bhardwaj, Romil Rawat, Anjali Rawat and Kiran Pachlasiya<br/><br/>19.1 Introduction 314<br/><br/>19.2 Related Work 317<br/><br/>19.3 Overview of QTECH 318<br/><br/>19.4 QTECH in Defence 325<br/><br/>19.5 Military Applications of QTECH 327<br/><br/>19.6 Challenges and Consequences of Quantum Warfare 331<br/><br/>19.7 Conclusion 332<br/><br/>20 Potential Threats and Ethical Risks of Quantum Computing 335<br/>Apurva Namdev, Darshan Patni, Balwinder Kaur Dhaliwal, Sunil Parihar, Shrikant Telang and Anjali Rawat<br/><br/>20.1 Introduction 335<br/><br/>20.2 Research Design & Methodology 339<br/><br/>20.3 Brief In-Depth Overview of Possible Vulnerabilities 341<br/><br/>20.4 New Risks to be Created 349<br/><br/>20.5 Futuristic Picture of Quantum Ethics 350<br/><br/>20.6 Conclusion 352<br/><br/>21 Is Quantum Computing a Cybersecurity Threat? 353<br/>Akshat Maheshwari, Manan Jain, Vindhya Tiwari, Mandakini Ingle and Ashish Chourey<br/><br/>21.1 Introduction 354<br/><br/>21.2 How QCom Threatens Cybersecurity 360<br/><br/>21.3 How QCom could Improve Cybersecurity 361<br/><br/>21.4 Quantum Cryptography and Its Applications 362<br/><br/>21.5 Proposed Methodology 363<br/><br/>21.6 Background/Objective 366<br/><br/>21.7 Conclusion 366 References 367<br/><br/>22 Quantum Computing in Data Security: A Critical Assessment 369<br/>Sadullah Khan, Chintan Jain, Sudhir Rathi, Prakash Kumar Maravi, Arun Jhapate and Divyani Joshi<br/><br/>22.1 Introduction 370<br/><br/>22.2 Present Cryptographic Algorithms and Systems 371<br/><br/>22.3 Comparing Traditional Computing and Quantum Computing 373<br/><br/>22.4 Post--Quantum Cryptography (PQC) 377<br/><br/>22.5 Quantum Cryptography and Its Applications 378<br/><br/>22.6 Corporate Competitions Towards Quantum Computing 383<br/><br/>22.7 Threats Posed to Critical Infrastructure and Mechanisms 384<br/><br/>22.8 Conclusion 388<br/><br/>23 Quantum Computing and Security Aspects of Attention-Based Visual Question Answering with Long Short-Term Memory 395<br/>Madhav Shrivastava, Rajat Patil, Vivek Bhardwaj, Romil Rawat, Shrikant Telang and Anjali Rawat<br/><br/>23.1 Introduction 396<br/><br/>23.2 Literature Review 399<br/><br/>23.3 Problem Statement 401<br/><br/>23.4 Problem Elaboration 401<br/><br/>23.5 Proposed Methodology 402<br/><br/>23.6 Methods 404<br/><br/>23.7 Solution Approach 407<br/><br/>23.8 Expected Results 407<br/><br/>23.9 Conclusion 409<br/><br/>23.10 Abbreviations 410<br/><br/>24 Quantum Cryptography -- A Security Architecture 413<br/>Sunandani Sharma, Sneha Agrawal, Sneha Baldeva, Diya Dabhade, Parikshit Bais and Ankita Singh<br/><br/>24.1 Introduction 413<br/><br/>24.2 Related Work 414<br/><br/>24.3 Properties of Quantum Information 415<br/><br/>24.4 Methodology 416<br/><br/>24.5 Supported Explanation 418<br/><br/>24.6 Conclusion 422<br/><br/>25 Quantum Computing Anomalies in Communication 425<br/>Anushka Ayachit, Jahanvee Sharma, Bhupendra Panchal, Sunil Patil, Safdar Sardar Khan and Rijvan Beg<br/><br/>25.1 Introduction 425<br/><br/>25.2 Significance of Quantum Computing 427<br/><br/>25.3 The Dark Side of Quantum Computing 433<br/><br/>25.4 Previous Works 436<br/><br/>25.5 Conclusion 437<br/><br/>26 Intrusion Detection System via Classical SVM and Quantum SVM: A Comparative Overview 441<br/>Ananya Upadhyay, Ruchir Namjoshi, Riya Jain, Jaideep Patel and Gayathri M.<br/><br/>26.1 Introduction 442<br/><br/>26.2 Related Work 443<br/><br/>26.3 Models for IDS 443<br/><br/>26.4 Conclusion 449<br/><br/>27 Quantum Computing in Military Applications and Operations 453<br/>Aman Khubani, Anadi Sharma, Axith Choudhary, Om Shankar Bhatnagar and K. Chidambarathanu<br/><br/>27.1 Introduction 454<br/><br/>27.2 Literary Survey 455<br/><br/>27.3 Definition 456<br/><br/>27.4 Quantum Military Applications 462<br/><br/>27.5 Applications of QCRYP 465<br/><br/>27.6 Limitations 468<br/><br/>27.7 Conclusion 468<br/><br/>28 Quantum Cryptography Techniques: Evaluation 471<br/>Shashank Sharma, T.M. Thiyagu, Om Kumar C.U. and D. Jeyakumar<br/><br/>28.1 Introduction 472<br/><br/>28.2 Quantum Technology (QTech) in Defence 473<br/><br/>28.3 The QKD Model 476<br/><br/>28.4 Related Work 478<br/><br/>28.5 Preliminaries 479<br/><br/>28.6 QKD Protocols Implementation 482<br/><br/>28.7 Risk Analysis 483<br/><br/>28.8 Applications of Quantum Cryptography 484<br/><br/>28.9 Challenges of Quantum Cryptography 485<br/><br/>28.10 Conclusion and Future Work 486<br/><br/>29 Cyber Crime Attack Vulnerability Review for Quantum Computing 489<br/>Vaishnavi Gawde, Vanshika Goswami, Balwinder Kaur Dhaliwal, Sunil Parihar, Rupali Chaure and Mandakini Ingle<br/><br/>29.1 Introduction 490<br/><br/>29.2 Significance of Cyber Crime Attack for QC 492<br/><br/>29.3 Related Work 493<br/><br/>29.4 Proposed Methodology 494<br/><br/>29.5 Conclusion 500<br/><br/>References 501<br/><br/>About the Editors 505<br/><br/>Index 507
505 8# - CONTENTS
Formatted contents note 14.9 Quantum Teleportation -- 14.10 Applications of QCr in Cybersecurity -- 14.11 Quantum Key Distribution Protocols Implementation -- 14.12 Research and Work -- 14.13 Challenges Faced by QC -- 14.14 Limitations -- 14.15 Conclusion -- References -- 15 Quantum Computing to the Advantage of Neural Network -- 15.1 Introduction -- 15.2 Significance of Quantum Computers in Machine Learning -- 15.3 Related Work -- 15.4 Proposed Methodology -- 15.5 Result and Analysis -- 15.6 Conclusion -- Glossary -- References -- 16 Image Filtering Based on VQA with Quantum Security -- 16.1 Introduction -- 16.2 Related Work -- 16.3 Problem Statement -- 16.4 Working -- 16.5 Proposed Methodology Solution -- 16.6 Result Analysis -- 16.7 Conclusion -- References -- 17 Quantum Computing Techniques Assessment and Representation -- 17.1 Introduction -- 17.2 Fundamentals of QC -- 17.3 Properties of QC -- 17.4 Topography of QC -- 17.5 The Architecture of QC -- 17.6 Quantum Algorithm -- 17.7 Design Limitations of Quantum Computer -- 17.8 Different Categories of Quantum Computer -- 17.9 Advantages of QC -- 17.10 Disadvantages of QC -- 17.11 Applications of QC -- 17.12 Major Challenges in QC -- 17.13 Conclusion -- References -- 18 Quantum Computing Technological Design Along with Its Dark Side -- 18.1 Introduction -- 18.2 Related Work -- 18.3 History and Evolution of QCOM -- 18.4 Components &amp -- Concepts that Make QCOM Possible -- 18.5 Plans for the Future Development of Quantum Computer -- 18.6 Dark Side of QCOM -- 18.7 Plans for Protection in Quantum Era -- 18.8 Conclusion -- References -- 19 Quantum Technology for Military Applications -- 19.1 Introduction -- 19.2 Related Work -- 19.3 Overview of QTECH -- 19.4 QTECH in Defence -- 19.5 Military Applications of QTECH -- 19.6 Challenges and Consequences of Quantum Warfare -- 19.7 Conclusion -- References.
505 8# - CONTENTS
Formatted contents note 20 Potential Threats and Ethical Risks of Quantum Computing -- 20.1 Introduction -- 20.2 Research Design &amp -- Methodology -- 20.3 Brief In-Depth Overview of Possible Vulnerabilities -- 20.4 New Risks to be Created -- 20.5 Futuristic Picture of Quantum Ethics -- 20.6 Conclusion -- References -- 21 Is Quantum Computing a Cybersecurity Threat? -- 21.1 Introduction -- 21.2 How QCom Threatens Cybersecurity -- 21.3 How QCom could Improve Cybersecurity -- 21.4 Quantum Cryptography and Its Applications -- 21.5 Proposed Methodology -- 21.6 Background/Objective -- 21.7 Conclusion -- References -- 22 Quantum Computing in Data Security: A Critical Assessment -- 22.1 Introduction -- 22.2 Present Cryptographic Algorithms and Systems -- 22.3 Comparing Traditional Computing and Quantum Computing -- 22.4 Post-Quantum Cryptography (PQC) -- 22.5 Quantum Cryptography and Its Applications -- 22.6 Corporate Competitions Towards Quantum Computing -- 22.7 Threats Posed to Critical Infrastructure and Mechanisms -- 22.8 Conclusion -- References -- 23 Quantum Computing and Security Aspects of Attention-Based Visual Question Answering with Long Short-Term Memory -- 23.1 Introduction -- 23.2 Literature Review -- 23.3 Problem Statement -- 23.4 Problem Elaboration -- 23.5 Proposed Methodology -- 23.6 Methods -- 23.7 Solution Approach -- 23.8 Expected Results -- 23.9 Conclusion -- 23.10 Abbreviations -- References -- 24 Quantum Cryptography â€" A Security Architecture -- 24.1 Introduction -- 24.2 Related Work -- 24.3 Properties of Quantum Information -- 24.4 Methodology -- 24.5 Supported Explanation -- 24.6 Conclusion -- References -- 25 Quantum Computing Anomalies in Communication -- 25.1 Introduction -- 25.2 Significance of Quantum Computing -- 25.3 The Dark Side of Quantum Computing -- 25.4 Previous Works -- 25.5 Conclusion -- References.
505 8# - CONTENTS
Formatted contents note 26 Intrusion Detection System via Classical SVM and Quantum SVM: A Comparative Overview -- 26.1 Introduction -- 26.2 Related Work -- 26.3 Models for IDS -- 26.4 Conclusion -- References -- 27 Quantum Computing in Military Applications and Operations -- 27.1 Introduction -- 27.2 Literary Survey -- 27.3 Definition -- 27.4 Quantum Military Applications -- 27.5 Applications of QCRYP -- 27.6 Limitations -- 27.7 Conclusion -- References -- 28 Quantum Cryptography Techniques: Evaluation -- 28.1 Introduction -- 28.2 Quantum Technology (QTech) in Defence -- 28.3 The QKD Model -- 28.4 Related Work -- 28.5 Preliminaries -- 28.6 QKD Protocols Implementation -- 28.7 Risk Analysis -- 28.8 Applications of Quantum Cryptography -- 28.9 Challenges of Quantum Cryptography -- 28.10 Conclusion and Future Work -- References -- 29 Cyber Crime Attack Vulnerability Review for Quantum Computing -- 29.1 Introduction -- 29.2 Significance of Cyber Crime Attack for QC -- 29.3 Related Work -- 29.4 Proposed Methodology -- 29.5 Conclusion -- References -- About the Editors -- Index -- Also of Interest -- End User License Agreement.
520 ## - SUMMARY, ETC.
Summary, etc Machine learning, deep learning, probabilistic neural networks, blockchain, and other new technologies all demand extremely high processing speeds. A quantum computer is an example of such a system. Quantum computers may be accessed over the internet. This technology poses a significant risk, since quantum terrorists, or cyber criminals, coul be able to cause many problems, including bringing down the internet. The principles of quantum mechanics might be used by evil doers to destroy quantum information on a global scale, and an entire class of suspicious codes could destroy data or eavesdrop on communication.<br/><br/>Quantum physics, however, safeguards against data eavesdropping. A significant amount of money is being invested in developing and testing a quantum version of the internet that will eliminate eavesdropping and make communication nearly impenetrable to cyber-attacks. The simultaneous activation of quantum terrorists (organized crime) can lead to significant danger by attackers introducing quantum information into the network, breaking the global quantum state, and preventing the system from returning to its starting state. Without signs of identifying information and real-time communication data, such vulnerabilities are very hard to discover. Terrorists' synchronized and coordinated acts have an impact on security by sparking a cyber assault in a fraction of a second.<br/><br/>The encryption is used by cyber-criminal groups with the genuine, nefarious, and terrible motives of killing innocent people or stealing money. In the hands of criminals and codes, cryptography is a dangerous and formidable weapon. Small amounts of digital information are hidden in a code string that translates into an image on the screen, making it impossible for the human eye to identify a coded picture from its uncoded equivalents. To steal the cryptographic key necessary to read people's credit card data or banking information, cyber thieves employ installed encryption techniques, human mistakes, keyboard loggers, and computer malware.
545 0# - BIOGRAPHICAL OR HISTORICAL DATA
Biographical or historical note About the Author<br/>Romil Rawat, PhD, is an assistant professor at Shri Vaishnav Vidyapeeth Vishwavidyalaya, Indore. With over 12 years of teaching experience, he has published numerous papers in scholarly journals and conferences. He has also published book chapters and is a board member on two scientific journals. He has received several research grants and has hosted research events, workshops, and training programs. He also has several patents to his credit.<br/><br/>Rajesh Kumar Chakrawarti, PhD, is a professor and the Dean of the Department of Computer Science & Engineering, Sushila Devi Bansal College, Bansal Group of Institutions, India. He has over 20 years of industry and academic experience and has published over 100 research papers and chapters in books.<br/><br/>Sanjaya Kumar Sarangi, PhD, is an adjunct professor and coordinator at Utkal University, Coordinator and Adjunct Professor, Utkal University, Bhubaneswar, India. He has over 23 years of academic experience and has authored textbooks, book chapters, and papers for journals and conferences. He has been a visiting doctoral fellow at the University of California, USA, and he has more than 30 patents to his credit.<br/><br/>Jaideep Patel, PhD, is a professor in the Computer Science and Engineering Department at the Sagar Institute of Research and Technology, Bhopal, India. He holds five patents, and has published two books and one book chapter.<br/><br/>Vivek Bhardwaj, PhD, is an assistant professor at Manipal University Jaipur, Jaipur, India. He has over eight years of teaching and research experience, has filed five patents, and has published many articles in scientific journals and conferences.<br/><br/>Anjali Rawat is a consultant for Apostelle Overseas Education, and she has over five years of consulting, teaching, and research experience. She has chaired international conferences and hosted several research events, and she holds several patents and has published research articles.<br/><br/>Hitesh Rawat is a faculty member in the Management Department at the Sri Aurobindo Institute of Technology and Management, Indore, India. He has over six years of consulting, teaching, and research experience and has also chaired international conferences and hosted several research events.
588 ## - SOURCE OF DESCRIPTION NOTE
Source of description note Description based on online resource; title from digital title page (viewed on October 25, 2023).
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer security.
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer security.
Source of heading or term fast
Authority record control number (OCoLC)fst00872484
655 #7 - INDEX TERM--GENRE/FORM
Genre/form data or focus term Electronic books.
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Rawat, Romil,
Relator term editor.
856 ## - ELECTRONIC LOCATION AND ACCESS
Uniform Resource Identifier https://onlinelibrary.wiley.com/doi/book/10.1002/9781394167401
Link text Full text is available at Wiley Online Library Click here to view
942 ## - ADDED ENTRY ELEMENTS
Source of classification or shelving scheme
Item type EBOOK
Holdings
Withdrawn status Lost status Source of classification or shelving scheme Damaged status Not for loan Permanent Location Current Location Date acquired Full call number Date last seen Price effective from Item type
          COLLEGE LIBRARY COLLEGE LIBRARY 2025-08-03 005.80285 Q259 2023 2025-08-03 2025-08-03 EBOOK