MARC보기
LDR05481cmm u2200709Mi 4500
001000000340855
003EBZ
00520260127113013
006m e u
007cr bn||||m|||a
008250815s2026 pau fob 001 0 eng d
020 ▼a 9798337335537 ▼q (electronic bk.)
020 ▼z 9798337335513 ▼q print
0247 ▼a 10.4018/979-8-3373-3551-3 ▼2 doi
040 ▼a EBZ ▼b eng ▼c EBZ ▼d 248032
049 ▼a MAIN
050 4 ▼a QA76.9.A25 ▼b A383 2026e
08204 ▼a 005.8 ▼2 23
24500 ▼a Advancing cyber threat detection through quantum and edge computing / ▼c Shenson Joseph, Kishor Kumar Reddy C., Asegul Hulus, Tatjana Sibalija, editors.
260 ▼a Hershey, Pennsylvania (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA) : ▼b IGI Global Scientific Publishing, ▼c 2026.
300 ▼a 1 online resource (16 PDFs (376 pages)).
336 ▼a text ▼2 rdacontent
337 ▼a electronic ▼2 isbdmedia
338 ▼a online resource ▼2 rdacarrier
3410 ▼a textual ▼2 sapdv ▼3 EBSCOhost
4901 ▼a e-Book Collection
504 ▼a Includes bibliographic references and index.
5050 ▼a Preface -- Chapter 1. A Comprehensive Introduction to Cyber Threat Detection Through Quantum Computing and Comparative Study of Classical and Quantum-Enhanced Convolutional Neural Networks -- Chapter 2. Quantum AI for Cybersecurity and Threat Intelligence -- Chapter 3. Quantum-Enhanced Edge Computing for Robust Cyber Threat Detection -- Chapter 4. Guardians of the Grid: Navigating Ethical Dilemmas and Regulatory Frameworks in Cyber Threat Detection -- Chapter 5. Secure Healthcare Data Sharing Using Federated Learning, Blockchain, and Quantum Cryptography -- Chapter 6. Synergizing Edge AI and Quantum Machine Learning for Real-Time Cyber Threat Mitigation -- Chapter 7. Quantum-Enhanced Machine Learning for Next-Gen Cyber Defense -- Chapter 8. Anomaly Detection Using Quantum Neural Networks: A Quantum-Driven Approach to Cyber Threat Identification -- Chapter 9. Ethical Challenges and Regulatory Considerations in Quantum AI-Powered Cyber Threat Detection -- Chapter 10. QINN-Based Approach to Detect Anomalies in High-Dimensional Secure Data -- Compilation of References -- About the Contributors -- Index.
520 ▼a "As cyber threats grow in scale, sophistication, and frequency, traditional detection methods struggle to keep pace. To address this landscape, researchers and organizations turn to emerging technologies like quantum computing and edge computing. Quantum computing offers increased processing power, capable of analyzing complex data patterns and encryptions. Meanwhile, edge computing enables real-time threat detection and increases response times. By combining these two technologies, it creates smarter, faster, and more adaptive cybersecurity systems. Further exploration into how the convergence of quantum and edge computing can revolutionize cyber threat detection may pave the way for more resilient defense mechanisms in the digital age. Advancing Cyber Threat Detection Through Quantum and Edge Computing explores how quantum computing and artificial intelligence (AI) reshape the landscape of real-time anomaly detection, predictive analytics, and next-gen cybersecurity. It examines how quantum-enhanced AI models can detect patterns, adapt to emerging threats, and revolutionize security frameworks across industries, from finance and healthcare to national security and cloud infrastructure. This book covers topics such as blockchain, threat intelligence, and neural networks, and is a useful resource for computer engineers, security professionals, academicians, researchers, and data scientists."-- ▼c Provided by publisher.
532 0 ▼3 EBSCOhost ▼a "EBSCO evaluates our products based on the Web Content Accessibility Guidelines (WCAG) and the related Section 508 and EN 301 549 regulations in the US and EU. Most EBSCO products are substantially conformant with WCAG 2.2 level AA." Source: https://connect.ebsco.com/s/article/EBSCO-VPATs?language=en_US. Last accessed April 22, 2025.
588 ▼a Description based on title screen (IGI Global, viewed 08/15/2025).
590 ▼a Added to collection customer.56279.3
650 0 ▼a Computer security ▼x Technological innovations.
650 0 ▼a Information technology ▼x Security measures.
650 0 ▼a Artificial intelligence ▼x Security measures.
650 0 ▼a Edge computing.
650 0 ▼a Quantum computing.
653 ▼a Artificial intelligence.
653 ▼a Blockchain.
653 ▼a Cyber and Network Security.
653 ▼a Edge Computing.
653 ▼a Federated Learning.
653 ▼a Fraud Detection.
653 ▼a Large Language Models.
653 ▼a Machine Learning.
653 ▼a Neural Networks.
653 ▼a Pattern Recognition.
653 ▼a Quantum Computing.
653 ▼a Quantum Cryptography.
653 ▼a Threat Detection.
653 ▼a Threat Intelligence.
655 4 ▼a Electronic books.
7001 ▼a Sibalija, Tatjana, ▼e editor.
7001 ▼a Hulus, Asegul, ▼d 1995-, ▼e editor.
7001 ▼a C., Kishor Kumar Reddy, ▼e editor.
7001 ▼a Joseph, Shenson, ▼d 1984-, ▼e editor.
7102 ▼a IGI Global Scientific Publishing, ▼e publisher.
77608 ▼i Print version: ▼z 9798337335513
830 0 ▼a e-Book Collection.
85640 ▼3 EBSCOhost ▼u https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=4293916
938 ▼a IGI Global ▼b IGIG ▼n 00372664
938 ▼a EBSCOhost ▼b EBSC ▼n 4293916
990 ▼a 관리자