• Contact

  • Newsletter

  • About us

  • Delivery options

  • News

  • 0
    Artificial Intelligence for Blockchain and Cybersecurity Powered IoT Applications

    Artificial Intelligence for Blockchain and Cybersecurity Powered IoT Applications by Ouaissa, Mariya; Ouaissa, Mariyam; Boulouard, Zakaria;

      • GET 10% OFF

      • The discount is only available for 'Alert of Favourite Topics' newsletter recipients.
      • Publisher's listprice GBP 110.00
      • The price is estimated because at the time of ordering we do not know what conversion rates will apply to HUF / product currency when the book arrives. In case HUF is weaker, the price increases slightly, in case HUF is stronger, the price goes lower slightly.

        55 671 Ft (53 020 Ft + 5% VAT)
      • Discount 10% (cc. 5 567 Ft off)
      • Discounted price 50 104 Ft (47 718 Ft + 5% VAT)

    55 671 Ft

    db

    Availability

    Estimated delivery time: In stock at the publisher, but not at Prospero's office. Delivery time approx. 3-5 weeks.
    Not in stock at Prospero.

    Why don't you give exact delivery time?

    Delivery time is estimated on our previous experiences. We give estimations only, because we order from outside Hungary, and the delivery time mainly depends on how quickly the publisher supplies the book. Faster or slower deliveries both happen, but we do our best to supply as quickly as possible.

    Short description:

    The objective of this book is to exhibit recent solutions and to discuss the opportunities that AI, Blockchain, and even their combinations can present to solve the issue of IoT security. 

    More

    Long description:

    The objective of this book is to showcase recent solutions and discuss the opportunities that AI, blockchain, and even their combinations can present to solve the issue of Internet of Things (IoT) security. It delves into cuttingedge technologies and methodologies, illustrating how these innovations can fortify IoT ecosystems against security threats. The discussion includes a comprehensive analysis of AI techniques such as machine learning and deep learning, which can detect and respond to security breaches in real time. The role of blockchain in ensuring data integrity, transparency, and tamper- proof transactions is also thoroughly examined. Furthermore, this book will present solutions that will help analyze complex patterns in user data and ultimately improve productivity.

    More

    Table of Contents:

    1.  Foundations models in cybersecurity: A comprehensive review and future direction


    Amine Idelhaj, Zakaria Abou El Houda, and Lyes Khoukhi


    2.  Security, privacy, and trust in IoT networks


    Zineb Nadifi, Mariyam Ouaissa, Mariya Ouaissa, Mohamed Alhyan, Ali Kartit


    3.  Challenges and countermeasures using machine learning, artificial intelligence in blockchain and IoT applications


    Latifa Er-Rajy, My Ahmed El Kiram, Oussama Lachihab, and Mohamed El Ghazouani


    4.  Blockchain-enabled cyber security: Applications, limitations, and challenges


    Yasir Khan


    5.  The revolution and future of blockchain technology in cybersecurity: A comprehensive analysis


    T. Monika Singh, C. Kishor Kumar Reddy, and Kari Lippert


    6.  Empowering IoT networks: A study on machine learning and deep learning for DDoS attack


    Mohammad Zahid and  Taran Singh Bharati 


    7.  A systematic review of cybersecurity in internet of vehicles


    Mohamed Alhyan, Mariya Ouaissa, Mariyam Ouaissa, Zineb Nadifi, Ali Kartit


    8.  AI-driven cloud storage service for securing IoT data


    Garima Sharma, Jaspreet Singh, and Priyanka Maan


    9.  Blockchain technology-based biometric system


    Mariya Ouaissa, Mariyam Ouaissa, and  A. Prasanth


    10.  Exploring the integration of artificial intelligence and blockchain for enhanced face detection and human tracking in IoT


    Oussama Lachihab, My Ahmed El Kiram, Latifa Er-Rajy


    11.  Education and training revolution: AR, VR, and IoT integration


    Sahiti Mummadi, C. Kishor Kumar Reddy, D. Manoj Kumar Reddy, and Srinath Doss


    12.  IoMT-blockchain based secured remote patient monitoring framework for neuro-stimulation devices


    Md Sakib Ullah Sourav, Mohammad Sultan Mahmud, Md Simul Hasan Talukder, and Rejwan Bin Sulaiman


    13.  Exploring generative intelligence systems for sustainability in transformative healthcare 6.0


    Thota Akshitha, C. Kishor Kumar Reddy, D. Manoj Kumar Reddy, and Srinath Doss


    14.  Healthcare 6.0 utilizing sleeping disorders through intelligent systems


    Veeramalla Anitha, C. Kishor Kumar Reddy, Ch. Sumalakshmi, and Srinath Doss

    More