survey on face recognition methods with federated leaning | Huiting Sun, Jialiang Peng and Zhaogong Zhang -- 6. Artificial intelligence-based biometric authentication using ECG signal | Kiran Kumar Patro, Jaya Prakash Allam, Babji Prasad Chapa, P Lalitha Kumari and Mohamed Hammad -- 7. A comparative analysis of email phishing detection methods: a deep learning perspective | Cong Khoa Truong, Phuc Hao Do and Tran Duc Le -- 8. Securing hardware coprocessors against piracy using biometrics for secured IoT systems | Aditya Anshul, Rahul Chaurasia and Anirban Sengupta -- 9. Intelligent authentication system using graphical one-time passwords | Adarsha Sigdel, Kheng Cher Yeo, Yassine Maleh and Mamoun Alazab -- 10. Role of AI in social cybersecurity: real-world case studies | Mudasir Ahmad Wani, Mohamed Hammad and Ahmed A. Abd El-Latif -- 11. Ethical and privacy concerns and challenges | Mohamed Hammad, Mudasir Ahmad Wani and Ahmed A. Abd El-Latif -- 12. Conclusion | Mohamed Hammad and Ahmed A. Abd El-Latif -- Index |