LEADER 09750nam 2200469 450 001 9910749001103321 005 20231104003242.0 010 $a1-394-16740-7 010 $a1-394-16738-5 035 $a(MiAaPQ)EBC30800250 035 $a(CKB)28530707300041 035 $a(Au-PeEL)EBL30800250 035 $a(EXLCZ)9928530707300041 100 $a20231104d2023 uy 0 101 0 $aeng 135 $aurcnu|||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 00$aQuantum Computing in Cybersecurity /$fedited by Romil Rawat [and six others] 205 $aFirst edition. 210 1$aHoboken, NJ :$cJohn Wiley & Sons, Inc.,$d[2023] 210 4$d©2023 215 $a1 online resource (471 pages) 311 $a9781394166336 320 $aIncludes bibliographical references and index. 327 $aIntro -- Table of Contents -- Series Page -- Title Page -- Copyright Page -- Preface -- 1 Cyber Quantum Computing (Security) Using Rectified Probabilistic Packet Mark for Big Data -- 1.1 Introduction -- 1.2 Denial-of-Service Attacks -- 1.3 Related Work -- 1.4 Proposed Methodology -- 1.5 Trace Back Mechanism for Rectified Probabilistic Packet Marking -- 1.6 Conclusion -- References -- 2 Secure Distinctive Data Transmission in Fog System Using Quantum Cryptography -- 2.1 Introduction -- 2.2 Properties of Quantum Computing -- 2.3 Applications of Quantum Computing -- 2.4 Background -- 2.5 Literature Survey -- 2.6 Proposed Work -- 2.7 Analysis of the Study -- 2.8 Conclusion -- References -- 3 DDoS Attack and Defense Mechanism in a Server -- 3.1 Introduction -- 3.2 DoS Attack -- 3.3 DDoS Attack -- 3.4 DDoS Mitigation -- 3.5 Conclusion -- Acknowledgement -- References -- 4 Dark Web Content Classification Using Quantum Encoding -- 4.1 Introduction -- 4.2 Related Work -- 4.3 Proposed Approach -- 4.4 Result and Discussion -- 4.5 Conclusion -- References -- 5 Secure E-Voting Scheme Using Blockchain -- 5.1 Introduction -- 5.2 Literature Survey -- 5.3 Implementation and Methodology -- 5.4 Result Analysis & -- Output -- 5.5 Conclusion and Future Directions -- References -- 6 An Overview of Quantum Computingâ?"Based Hidden Markov Models -- 6.1 Introduction -- 6.2 Elaboration of Hidden Quantum Markov Model -- 6.3 Example of HQMMs (Isolated Word Recognition in Action) -- 6.4 Matching of State Observation Density -- 6.5 Conclusion and Results -- References -- 7 Artificial Intelligence and Qubit-Based Operating Systems: Current Progress and Future Perspectives -- 7.1 Introduction to OS, AI and ML -- 7.2 Learning Configurations -- 7.3 Building ML Models -- 7.4 Work Done in Improving Process Scheduling. 327 $a7.5 Artificial Intelligence in Distributed Operating Systems -- 7.6 Current Progress -- 7.7 Quantum Artificial Intelligence -- 7.8 Conclusion -- References -- 8 Techno-Nationalism and Techno-Globalization: A Perspective from the National Security Act -- 8.1 Introduction -- 8.2 Conclusion -- Acknowledgement -- References -- 9 Quantum Computing Based on Cybersecurity -- 9.1 Introduction -- 9.2 Preliminaries -- 9.3 Threat Landscape -- 9.4 Defensive Measurements, Countermeasures, and Best Practises -- 9.5 Conclusion -- References -- 10 Quantum Cryptography for the Future Internet and the Security Analysis -- 10.1 Introduction -- 10.2 Related Works -- 10.3 Preliminaries -- 10.4 Quantum Cryptography for Future Internet -- 10.5 Conclusion -- References -- 11 Security Aspects of Quantum Cryptography -- 11.1 Introduction -- 11.2 Literature Survey -- 11.3 Quantum Key Distribution -- 11.4 Cryptography -- 11.5 Quantum Cryptography with Faint Laser Pulses -- 11.6 Eavesdropping -- 11.7 Conclusion -- References -- 12 Security Aspects of Quantum Machine Learning: Opportunities, Threats and Defenses -- 12.1 Introduction -- 12.2 Quantum Computing Basics -- 12.3 Security Applications -- 12.4 Quantum Machine Learning -- 12.5 Conclusion -- References -- 13 Cyber Forensics and Cybersecurity: Threat Analysis, Research Statement and Opportunities for the Future -- 13.1 Introduction -- 13.2 Background -- 13.3 Scope of this Work -- 13.4 Methodology and Analysis of Simulation Results -- 13.5 Quantum-Based Cybersecurity and Forensics -- 13.6 Conclusion and Future Works -- References -- 14 Quantum Computing: A Software Engineering Approach -- 14.1 Introduction -- 14.2 Background of Research Area -- 14.3 Why Cryptography? -- 14.4 Classical Cryptography -- 14.5 Quantum Cryptography (QCr) -- 14.6 Quantum Key Distribution -- 14.7 Cryptanalysis -- 14.8 Entanglement. 327 $a14.9 Quantum Teleportation -- 14.10 Applications of QCr in Cybersecurity -- 14.11 Quantum Key Distribution Protocols Implementation -- 14.12 Research and Work -- 14.13 Challenges Faced by QC -- 14.14 Limitations -- 14.15 Conclusion -- References -- 15 Quantum Computing to the Advantage of Neural Network -- 15.1 Introduction -- 15.2 Significance of Quantum Computers in Machine Learning -- 15.3 Related Work -- 15.4 Proposed Methodology -- 15.5 Result and Analysis -- 15.6 Conclusion -- Glossary -- References -- 16 Image Filtering Based on VQA with Quantum Security -- 16.1 Introduction -- 16.2 Related Work -- 16.3 Problem Statement -- 16.4 Working -- 16.5 Proposed Methodology Solution -- 16.6 Result Analysis -- 16.7 Conclusion -- References -- 17 Quantum Computing Techniques Assessment and Representation -- 17.1 Introduction -- 17.2 Fundamentals of QC -- 17.3 Properties of QC -- 17.4 Topography of QC -- 17.5 The Architecture of QC -- 17.6 Quantum Algorithm -- 17.7 Design Limitations of Quantum Computer -- 17.8 Different Categories of Quantum Computer -- 17.9 Advantages of QC -- 17.10 Disadvantages of QC -- 17.11 Applications of QC -- 17.12 Major Challenges in QC -- 17.13 Conclusion -- References -- 18 Quantum Computing Technological Design Along with Its Dark Side -- 18.1 Introduction -- 18.2 Related Work -- 18.3 History and Evolution of QCOM -- 18.4 Components & -- Concepts that Make QCOM Possible -- 18.5 Plans for the Future Development of Quantum Computer -- 18.6 Dark Side of QCOM -- 18.7 Plans for Protection in Quantum Era -- 18.8 Conclusion -- References -- 19 Quantum Technology for Military Applications -- 19.1 Introduction -- 19.2 Related Work -- 19.3 Overview of QTECH -- 19.4 QTECH in Defence -- 19.5 Military Applications of QTECH -- 19.6 Challenges and Consequences of Quantum Warfare -- 19.7 Conclusion -- References. 327 $a20 Potential Threats and Ethical Risks of Quantum Computing -- 20.1 Introduction -- 20.2 Research Design & -- Methodology -- 20.3 Brief In-Depth Overview of Possible Vulnerabilities -- 20.4 New Risks to be Created -- 20.5 Futuristic Picture of Quantum Ethics -- 20.6 Conclusion -- References -- 21 Is Quantum Computing a Cybersecurity Threat? -- 21.1 Introduction -- 21.2 How QCom Threatens Cybersecurity -- 21.3 How QCom could Improve Cybersecurity -- 21.4 Quantum Cryptography and Its Applications -- 21.5 Proposed Methodology -- 21.6 Background/Objective -- 21.7 Conclusion -- References -- 22 Quantum Computing in Data Security: A Critical Assessment -- 22.1 Introduction -- 22.2 Present Cryptographic Algorithms and Systems -- 22.3 Comparing Traditional Computing and Quantum Computing -- 22.4 Post-Quantum Cryptography (PQC) -- 22.5 Quantum Cryptography and Its Applications -- 22.6 Corporate Competitions Towards Quantum Computing -- 22.7 Threats Posed to Critical Infrastructure and Mechanisms -- 22.8 Conclusion -- References -- 23 Quantum Computing and Security Aspects of Attention-Based Visual Question Answering with Long Short-Term Memory -- 23.1 Introduction -- 23.2 Literature Review -- 23.3 Problem Statement -- 23.4 Problem Elaboration -- 23.5 Proposed Methodology -- 23.6 Methods -- 23.7 Solution Approach -- 23.8 Expected Results -- 23.9 Conclusion -- 23.10 Abbreviations -- References -- 24 Quantum Cryptography â?" A Security Architecture -- 24.1 Introduction -- 24.2 Related Work -- 24.3 Properties of Quantum Information -- 24.4 Methodology -- 24.5 Supported Explanation -- 24.6 Conclusion -- References -- 25 Quantum Computing Anomalies in Communication -- 25.1 Introduction -- 25.2 Significance of Quantum Computing -- 25.3 The Dark Side of Quantum Computing -- 25.4 Previous Works -- 25.5 Conclusion -- References. 327 $a26 Intrusion Detection System via Classical SVM and Quantum SVM: A Comparative Overview -- 26.1 Introduction -- 26.2 Related Work -- 26.3 Models for IDS -- 26.4 Conclusion -- References -- 27 Quantum Computing in Military Applications and Operations -- 27.1 Introduction -- 27.2 Literary Survey -- 27.3 Definition -- 27.4 Quantum Military Applications -- 27.5 Applications of QCRYP -- 27.6 Limitations -- 27.7 Conclusion -- References -- 28 Quantum Cryptography Techniques: Evaluation -- 28.1 Introduction -- 28.2 Quantum Technology (QTech) in Defence -- 28.3 The QKD Model -- 28.4 Related Work -- 28.5 Preliminaries -- 28.6 QKD Protocols Implementation -- 28.7 Risk Analysis -- 28.8 Applications of Quantum Cryptography -- 28.9 Challenges of Quantum Cryptography -- 28.10 Conclusion and Future Work -- References -- 29 Cyber Crime Attack Vulnerability Review for Quantum Computing -- 29.1 Introduction -- 29.2 Significance of Cyber Crime Attack for QC -- 29.3 Related Work -- 29.4 Proposed Methodology -- 29.5 Conclusion -- References -- About the Editors -- Index -- Also of Interest -- End User License Agreement. 606 $aComputer security 615 0$aComputer security. 676 $a005.8 702 $aRawat$b Romil 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910749001103321 996 $aQuantum Computing in Cybersecurity$93586017 997 $aUNINA