Call for Chapters
Edited Book on
“Quantum Computing in Cybersecurity
”
The Publisher will send the Book for Indexing: Scopus and offered to Web of Science
Published
https://onlinelibrary.wiley.com/doi/book/10.1002/9781394167401
Call for Chapters
Edited Book on
“Quantum Computing in Cybersecurity
”
The Publisher will send the Book for Indexing: Scopus and offered to Web of Science
Published
https://onlinelibrary.wiley.com/doi/book/10.1002/9781394167401
Mail your full Chapter at - rawat.romil@gmail.com
The book will be published under the Wiley-Scrivener imprint and will be indexed by Scopus and offered to Web of Science.
Important Guidelines for Chapter Preparation
Chapter Template - https://www.scrivenerpublishing.com/guidelines.php
Note that all chapters will be put through similarity software and publisher’s guidelines are an overall similarity index of less than 15% (with maximum 3% from any single source). Each Chapter should have Minimum of 18 Pages.
Reviewing Policy: The editor(s) will engage 2 single blind peer-reviewers to assess originality, clarity, usefulness, and adherence to scope of project.
Details
About the topic
Machine learning, deep learning, probabilistic neural networks, blockchain, and other new technologies all demand extremely high processing speeds. A quantum computer is an example of such a system. The quantum computers may be accessed over the internet. This technology poses a significant risk, since quantum terrorists(Cyber Criminals ) might bring the future internet to a halt. The principles of quantum mechanics might be used by evil users to destroy quantum information on a global scale, and an entire class of suspicious codes could destroy data or eavesdrop on communication. However, quantum physics safeguards against data eavesdropping. A significant amount of money is being invested in developing and testing a quantum version of the Internet that will eliminate eavesdropping and make communication nearly impenetrable to cyber attacks. The simultaneous activation of quantum terrorists (organized crime) can lead to significant danger by attackers introducing quantum information into the network, breaking the global quantum state and preventing the system from returning to its starting state. Without signs of identifying information and real-time communication data, such vulnerabilities are very hard to discover. Terrorists' synchronized and coordinated acts have an impact on security by sparking a cyber assault in a fraction of a second.
About the book
The encryption is used by cyber criminal groups with the genuine, nefarious, and terrible motives of killing innocent people or stealing money. In the hands of criminals and codes, cryptography is a dangerous and formidable weapon. Small amounts of digital information are hidden in a code string that translates into an image on the screen, making it impossible for the human eye to identify a coded picture from its uncoded equivalents. To steal the cryptographic key necessary to read people's credit card data or banking information, cyber thieves employ installed encryption techniques, human mistakes, keyboard loggers, and computer malware. Quantum-enabled encryption, according to some security experts, does not address other types of risks such as phishing, bribery, or physical theft. The biggest fear expressed, however, was the security services' inability to intercept data supplied by criminals and terrorist groups. Money, data, and identity theft, information theft for bribery, system shutdowns, and financial market manipulation may all be possible if quantum computing technology is abused. The use of quantum-enabled encryption to conceal criminal activities is being used by terrorists (such as terrorist attack plans), organized criminals (international criminal networks), online pornography, paedophiles (transferring images), and tax evaders to transfer information and data for nefarious purposes (transferring money to tax havens).
Need for the book
The book focused on quantum computing methodologies and applications in cyber terrorism and security, Quantum Inspired Community Detection in Social Networks Analytics, Future Directions in Quantum Computing, Quantum machine learning for intrusion detection, quantum models to detect distributed denial of service attacks, cyber terrorism for quantum internet, cryptography, and cyber criminals' quantum communication networks.
Quantum technologies have the potential to improve, in an unprecedented way, the security and efficiency of communications in network infrastructures. Written as a complete and comprehensive course text, this book works through mathematically rigorous material using a clear and practical approach that facilitates student engagement. This book provides a straightforward, step-by-step explanation of quantum computing in the context of cybercrime and forensics.Improved cyber crime prevention, investigation, and mitigation must be based on a deeper understanding of the human and social aspects of relevant societal challenges, such as child sexual exploitation, violent radicalization, human trafficking, disinformation and fake news, corruption, and cyber criminality, as well as victim support. Quantum computing-based technologies and applications that use machine learning and artificial intelligence to evaluate enormous amounts of data in near-real time to prevent criminal activity or battle misinformation and false news with security concerns. This will aid security agencies in incorporating such information into the operational activities of police authorities in order to combat crime, including cybercrime and terrorism, as well as various forms of serious and organized crime (such as smuggling, money laundering, identity theft, counterfeiting of products, trafficking of illicit drugs and falsified or substandard medicines, environmental crime, or illicit trafficking of cultural goods).
Quantum Computing Power Malware Attacks
Advanced technologies, such as machine learning algorithms, are used by cyber criminals to create and transmit lethal malware based on enormous data sets. Cyber attackers can take advantage of quantum computing powers to devise a revolutionary method of breaching cyber security, allowing them to swiftly evaluate enormous datasets before launching a complex assault on a large number of networks and devices.
Authors can submit any number of chapters and can use Chapter topic of their work, relating towards Book Theme.
Tentative Topics but not limited to:
· Quantum theory and Cyber crime Analytics.
· Quantum Machine learning applications for Cryptography and Information Security
· Quantum Neural Network framework for Quantum threat
· Dark Side of Quantum Computing
· Quantum terrorists threat for Military
· Cyber threat modeling and hacking of Secure applications
· Military activity tracing and Anti-submarine warfare
· Quantum Cryptography and Security for Communication and Measurement
· transactions of quantum money for Illicit events
· Quantum Forensics for Algorithms and computing
· Quantum computing terrorist at ocean
· Quantum computing applications in cyber terrorism and security.
· Quantum Inspired Community Detection in Social Networks Analytics
· Future Directions in Quantum Computing
· Quantum machine learning for intrusion detection and Prevention system
· Quantum models to detect distributed denial of service attacks.
· Cyber Criminals attack for quantum internet
· Quantum-powered attacks by Digital Weapon
· Quantum Communication Network and terrorist crime organization
· Quantum simulation for analyzing criminals activities and behavior analysis
· Quantum Computing Power Malware Attacks
· Hardware Triggered Threats
Key words
• Quantum theory
• Cyber crime
• Artificial Intelligence
• Quantum Machine Learning
• Quantum Neural Network
• Cryptography and Information Security
• Internet of Thing
• Quantum Computer
• Quantum computing threat
• Dark Side of Quantum Computing
• Quantum terrorists
• Quantum magnetometer
• Anti-submarine warfare
• Quantum anomalies
• Quantum Cryptography and Security
• Quantum Communication and Measurement
• Quantum Technology and Submarine
• quantum attacks
• Quantum information technologies
• Quantum cryptography
• transactions of quantum money
• Quantum Forensics
• Algorithms and computing
• Quantum communications
• Post-quantum cryptography
• post-quantum security
• Quantum Communication Network
• Quantum terrorist crime
• quantum-powered attacks
• Military Quantum computing
• Quantum key distribution
• Quantum cryptanalysis
• Quantum sensors
• Digital Weapon
• Quantum simulation
• Terrorist at ocean
• Cyber threat intelligence
• Cyber-warfare
• quantum message
• Quantum Hacking
Editors
(1) Romil Rawat, Assistant Professor, Shri Vaishnav Vidyapeeth Vishwavidyalaya, Indore - India - rawat.romil@gmail.com
(2) Rajesh Kumar Chakrawarti ,Dean & Professor, Department of Computer Science & Engineering,Sushila Devi Bansal College(SDBC), Bansal Group of Institutions(BGI), Indore(MP) - India -dean.cse@sdbc.ac.in , rajesh_kr_chakra@yahoo.com
(3) Sanjaya Kumar Sarangi, Utkal University, Coordinator and Adjunct Professor, Utkal University, Bhubaneswar -India
sanjaya.res.cs@utkaluniversity.ac.in
(4) Dr.Jaideep Patel ,Professor, Department of Computer Science & Engineering, Sagar Institute of Research & Technology (SIRT) ,Bhopal, India
(5) Dr. Vivek Bhardwaj , Assistant Professor , Manipal University Jaipur, Jaipur, India ,Manipal University Jaipur, Dehmi Kalan, Off Jaipur-Ajmer Expressway, Jaipur, (Raj.) Rajasthan 303007 - India. vivek.bhardwaj@outlook.in
(6) AAAAAA
Inquires:
Editor Details
(1) Romil Rawat
https://www.linkedin.com/in/romil-rawat-537331175/
Shri Vaishnav Vidyapeeth Vishwavidyalaya, Indore, India
Romil Rawat is currently working as Assistant Professor in Shri Vaishnav Vidyapeeth Vishwavidyalaya, Indore, India. He attended several research programs and received research grants from USA, Germany, Italy and UK. The Author has research alignment towards Cyber Security, IoT, Dark Web Crime analysis and investigation techniques, and working towards tracing of illicit anonymous contents of cyber terrorism and criminal activities. He also chaired International Conferences and Hosted several research events including National and International Research Schools, PhD colloquium,Workshops, training programs. He also published several Research Patents.
(2) Dr. Rajesh Kumar Chakrawarti
Dean & Professor, Department of Computer Science & Engineering,Sushila Devi Bansal College(SDBC), Bansal Group of Institutions(BGI), Indore(MP) - India
Dr. Rajesh Kumar Chakrawarti is working as an Dean & Professor, Department of Computer Science & Engineering,Sushila Devi Bansal College(SDBC), Bansal Group of Institutions(BGI), Indore(MP) - India. He has a professional experience of over 20+ years that includes in Academia and Industry. He is involved in teaching courses at both Undergraduate and Post Graduate levels. He is always involved in Teaching, Training, Research, Department, Institution, and University development activities. He has guided 17 Post-Graduate Dissertations and 01 is ongoing. He has organized nearly 100+ Seminars/ Workshops/ FDPs/ SDPs/ Conferences/ Certifications. He has attended around 100+ Seminars/ Workshops/ FDPs/ Conferences/ Certifications and presented/ published/ 100+ Research papers/chapters in books/ abstracts in National/ International Conferences/ Journals. He has worked as Remote Centre Coordinator, Workshop Coordinator, Aakash Project Coordinator, and Spoken Tutorial RESOURCE Centre Coordinator for NMEICT-Project MHRD Govt. of India New Delhi Conducted by IIT-Bombay and IIT-Kharagpur in duration 2012-14 for Remote Centre Shri Vaishnav Institute of Technology and Science (RCID-1117), Indore. His main research interest includes Compiler Design, Natural Language Processing, Computational Linguistics, Machine Translation, & Word-Sense Disambiguation.
(3) Sanjaya Kumar Sarangi ,Utkal University, Coordinator and Adjunct Professor , Utkal University, Bhubaneswar, INDIA
sanjaya.res.cs@utkaluniversity.ac.in
Adjunct Professor and Coordinator at Utkal University, distinguished background in Academic, Research, and Industry sectors combined with 23 years of experience in the knowledge towards achieving the institution's objectives through skill, knowledge, and nourishing the global educational system. He is a qualified GATE and holds a Master of Technology in Comp. Sc & Engg. and Ph.D. degree in Computer Science. He was the Research Fellow in Science and Technology, at UGC, Govt of India, and visiting Doctoral Fellow at the University of California, USA. His research findings are in Wireless Ad hoc and Sensor Networks, IDS, Mobile Communications, Cloud Computing, Geospatial Science and Remote Sensing, Climate Change, and Disaster prediction system. He has a number of publications in Journals and Conferences. He has authored many textbooks and book chapters. He has more than 30 National and International Patents. He is an active member and Life member in many associations and also Editor, Technical Program Committee member, and reviewer in reputed journals and conferences. He is a successful coordinator for the NMICT project conducted by IIT, Bombay, and Kharagpur. His Contributed Digital Resources dedicated to Govt. of Odisha, IGNOU, and CSTA, USA. Academic coordinator in administration to various components of the Internationalization of higher education and international profile-building of university and academic exchange agreements with international universities. Managing International Student and Scholar Services with visibility of the international community and promoting educational and cultural exchange programs as International Student Advisor. Taking care of Information and Communication Technology (ICT) to enhance and optimize the information and worldwide research that can lead to improved student learning and teaching methods. Also undertakes ICT-based support for the smooth functioning of e-learning systems for the university.
(4) Dr. Jaideep Patel ,Professor, Department of Computer Science & Engineering, Sagar Institute of Research & Technology (SIRT) ,Bhopal, India
Dr Jaideep patel is a Professor in computer science and engineering department at SIRT Bhopal.His area of interest is computer network,compiler design ,cyber security etc.he has published 5 patents,2 books, one book chapter etc.
(5) Dr. Vivek Bhardwaj , Assistant Professor , Manipal University Jaipur, Jaipur, India ,Manipal University Jaipur, Dehmi Kalan, Off Jaipur-Ajmer Expressway, Jaipur, (Raj.) Rajasthan 303007.
Vivek Bhardwaj, PhD, is a certified RPA trainer and working as an assistant professor in department of Computer Science and Engineering Manipal University Jaipur, Rajasthan. He has 8+ years of teaching and research experience, filed 5 patents, and published many articles in international journals and conferences. His current areas of research interest include Robotic Process Automation, and Speech recognition.
(6) AAAAAA