Description

Book Synopsis

As cyberattacks continue to grow in complexity and number, computational intelligence is helping under-resourced security analysts stay one step ahead of threats. Drawing on threat intelligence from millions of studies, blogs, and news articles, computational intelligence techniques such as machine learning and automatic natural language processing quickly provide the means to identify real threats and dramatically reduce response times.

The book collects and reports on recent high-quality research addressing different cybersecurity challenges. It:

  • explores the newest developments in the use of computational intelligence and AI for cybersecurity applications
  • provides several case studies related to computational intelligence techniques for cybersecurity in a wide range of applications (smart health care, blockchain, cyber-physical system, etc.)
  • integrates theoretical and practical aspects of computational intelligence for cyb

    Table of Contents

    Section 1

    Big Data and Computational Intelligence for Cybersecurity Management and Applications

    Chapter 1

    Applications of Big Data and Blockchain for Cybersecurity Management Challenges and Solutions - Swathi Lakkineni, Lo’ai Tawalbeh, and Izzat Alsmadi

    Chapter 2

    Deep Learning Techniques for Cybersecurity Applications - Balakrishnan S, Aswin G, Mohan Babu Chowdary, V. Arulkumar

    Chapter 3

    Deep Learning Techniques for Malware Classification - Mustapha Belaissaoui, Yassine Maleh, Soufyane Mounir

    Section 2

    Computational Intelligence for Cybersecurity Applications

    Chapter 4

    Machine Learning and Blockchain for Security Management in Banking System - Oshin Sharma, Nidhi Pandey

    Chapter 5

    Machine Learning Techniques for Fault Tolerance Management - Harinahalli Lokesh Gururaj, Francesco Flammini, Beekanahalli Harish Swathi, Nandini Nagaraj, and Sunil Kumar Byalaru Ramesh

    Chapter 6

    An efficient approach of Image Detection and Recognition using Artificial Intelligence in Cyber-Physical System - Musarrat Saberin Nipun, Rejwan Bin Sulaiman and Amer Kareem

    Section 3

    Blockchain and Computational Intelligence for Cybersecurity Applications

    Chapter 7

    Artificial Intelligence Incorporated in Business Analytics and Blockchain to Enhance Security - Mamata Rath, Subhranshu Sekhar Tripathy,Niva Tripathy, Chhabi Rani Panigrahi, Bibudhendu Pati

    Chapter 8

    Blockchain solutions for Security and Privacy issues in Smart Healthcare - Pinky Bai, Sushil Kumar, Upasana Dohare

    Chapter 9

    Algorithm for Trust in Ewom for Digital Systems - B.H. Khoi, B.V.Quang, N.V.T.Truong

    Chapter 10

    Study of IoT Security for blockchain management: An application to data backup - Cédric Tala Kuate, Franklin Tchakounte, Jean Claude Kamgang

    Chapter 11

    Blockchain Application for Cybersecurity in Cyber-physical Systems - Soufyane Mounir and Yassine Maleh

    Compilation of References

    About the Authors

    Index

Computational Intelligence for Cybersecurity

Product form

£94.99

Includes FREE delivery

RRP £99.99 – you save £5.00 (5%)

Order before 4pm today for delivery by Sat 13 Dec 2025.

A Hardback by Yassine Maleh, Mamoun Alazab, Soufyane Mounir

1 in stock


    View other formats and editions of Computational Intelligence for Cybersecurity by Yassine Maleh

    Publisher: Taylor & Francis Ltd
    Publication Date: 4/28/2023 12:00:00 AM
    ISBN13: 9781032335032, 978-1032335032
    ISBN10: 1032335033

    Description

    Book Synopsis

    As cyberattacks continue to grow in complexity and number, computational intelligence is helping under-resourced security analysts stay one step ahead of threats. Drawing on threat intelligence from millions of studies, blogs, and news articles, computational intelligence techniques such as machine learning and automatic natural language processing quickly provide the means to identify real threats and dramatically reduce response times.

    The book collects and reports on recent high-quality research addressing different cybersecurity challenges. It:

    • explores the newest developments in the use of computational intelligence and AI for cybersecurity applications
    • provides several case studies related to computational intelligence techniques for cybersecurity in a wide range of applications (smart health care, blockchain, cyber-physical system, etc.)
    • integrates theoretical and practical aspects of computational intelligence for cyb

      Table of Contents

      Section 1

      Big Data and Computational Intelligence for Cybersecurity Management and Applications

      Chapter 1

      Applications of Big Data and Blockchain for Cybersecurity Management Challenges and Solutions - Swathi Lakkineni, Lo’ai Tawalbeh, and Izzat Alsmadi

      Chapter 2

      Deep Learning Techniques for Cybersecurity Applications - Balakrishnan S, Aswin G, Mohan Babu Chowdary, V. Arulkumar

      Chapter 3

      Deep Learning Techniques for Malware Classification - Mustapha Belaissaoui, Yassine Maleh, Soufyane Mounir

      Section 2

      Computational Intelligence for Cybersecurity Applications

      Chapter 4

      Machine Learning and Blockchain for Security Management in Banking System - Oshin Sharma, Nidhi Pandey

      Chapter 5

      Machine Learning Techniques for Fault Tolerance Management - Harinahalli Lokesh Gururaj, Francesco Flammini, Beekanahalli Harish Swathi, Nandini Nagaraj, and Sunil Kumar Byalaru Ramesh

      Chapter 6

      An efficient approach of Image Detection and Recognition using Artificial Intelligence in Cyber-Physical System - Musarrat Saberin Nipun, Rejwan Bin Sulaiman and Amer Kareem

      Section 3

      Blockchain and Computational Intelligence for Cybersecurity Applications

      Chapter 7

      Artificial Intelligence Incorporated in Business Analytics and Blockchain to Enhance Security - Mamata Rath, Subhranshu Sekhar Tripathy,Niva Tripathy, Chhabi Rani Panigrahi, Bibudhendu Pati

      Chapter 8

      Blockchain solutions for Security and Privacy issues in Smart Healthcare - Pinky Bai, Sushil Kumar, Upasana Dohare

      Chapter 9

      Algorithm for Trust in Ewom for Digital Systems - B.H. Khoi, B.V.Quang, N.V.T.Truong

      Chapter 10

      Study of IoT Security for blockchain management: An application to data backup - Cédric Tala Kuate, Franklin Tchakounte, Jean Claude Kamgang

      Chapter 11

      Blockchain Application for Cybersecurity in Cyber-physical Systems - Soufyane Mounir and Yassine Maleh

      Compilation of References

      About the Authors

      Index

    Recently viewed products

    © 2025 Book Curl

      • American Express
      • Apple Pay
      • Diners Club
      • Discover
      • Google Pay
      • Maestro
      • Mastercard
      • PayPal
      • Shop Pay
      • Union Pay
      • Visa

      Login

      Forgot your password?

      Don't have an account yet?
      Create account