Hiren Kumar Thakkar Mayank Swarnkar Robin Singh Bhadoria
This contributed volume consists of 11 chapters that specifically cover the security aspects of the latest technologies such as Blockchain, IoT, and DevOps, and how to effectively deal with them using Intelligent techniques. Moreover, machine learning (ML) and deep learning (DL) algorithms are also not secured and often manipulated by attackers for data stealing. This book also discusses the types of attacks and offers novel solutions to counter the attacks on ML and DL algorithms. This book describes the concepts and issues with figures and the supporting arguments with facts and charts. In...
This contributed volume consists of 11 chapters that specifically cover the security aspects of the latest technologies such as Blockchain, IoT, and D...