H L / M / A V | Artificial Intelligence for Military Applications with Blockchain | Buch | 978-1-032-71270-3 | sack.de

Buch, Englisch, 256 Seiten, Format (B × H): 156 mm x 234 mm, Gewicht: 540 g

H L / M / A V

Artificial Intelligence for Military Applications with Blockchain


1. Auflage 2025
ISBN: 978-1-032-71270-3
Verlag: Taylor & Francis Ltd (Sales)

Buch, Englisch, 256 Seiten, Format (B × H): 156 mm x 234 mm, Gewicht: 540 g

ISBN: 978-1-032-71270-3
Verlag: Taylor & Francis Ltd (Sales)


In an era where advanced technology plays a critical role in maintaining national security, Artificial Intelligence for Military Applications with Blockchain investigates how combining AI and blockchain could transform military operations. This comprehensive guide offers creative answers for contemporary military problems while addressing the most important defense-related concerns, from data security to decision-making.

It explores constrained networking middleware for defense applications, guaranteeing smooth communication under critical circumstances. This book starts with an in-depth examination of blockchain’s potential to improve document management across defense departments, then moves to a detailed discussion of security and privacy in military applications. The integration of AI and blockchain in military context is then the main topic of discussion, along with its advantages, disadvantages, and real-time applications.

The potential of blockchain and AI to protect data and streamline operations is also explored, providing readers with insights into the military and healthcare sectors. This book offers a thorough examination of the military’s current and future use of AI, as well as a breakdown of cybersecurity issues and how blockchain technology is being used to improve military cybersecurity. A dedicated chapter examines the ways in which blockchain technology is being used by computational intelligence to transform the defense environment.

Key features:

- Examines privacy and security issues in military blockchain applications

- Investigates military operations using constrained networking middleware

- Discusses integrating AI and blockchain technology for military applications

- Includes case studies of blockchain and AI uses in the military and healthcare

- Thoroughly examines cybersecurity issues and how blockchain technology can help

This book is essential for military personnel, defense academics, and cybersecurity specialists interested in the use of AI and blockchain for defense. It presents real-world examples and case studies together with an outlook on how these technologies will influence future military operations.

H L / M / A V Artificial Intelligence for Military Applications with Blockchain jetzt bestellen!

Zielgruppe


Academic, Postgraduate, Professional Reference, and Undergraduate Advanced

Weitere Infos & Material


1 Security and privacy in military application using blockchain

JANARDHANA D R, SHIVANNA K, MANU A P, AND BOUZIANE BRIK

2 Document management across departments in defense using blockchain technology

ANUPAMA B S, SUNITHA N R, YADLAPALLI RANGANADH, JAYA KRISHNA, RAGA DEEPTHI JUTURU, MURALIDHAR, AND THEJAS G S

3 Constrained networking middleware for military operations

KIRAN, SUNIL KUMAR D S, PRABHAVATHI K, ARUNA B, BHARATHESH PATEL N, NAVEEN KUMAR H N, AND VINAYAKUMAR RAVI

4 Artificial intelligence for military applications with blockchain

ARSH KRISHANATER, GURURAJ H L, GOWTHAM M, AND HONG LIN

5 Blockchain for military applications: Opportunities, challenges, and its applications

SUDEEP J, SHIVASHANKARA S, ANANTH G S, GIRISH S C, AND HONG LIN

6 Role of ubiquitous AI and blockchain security for military & healthcare

MAHESH M, DEEPAK P, KUSUM SHARMA, MAHADEVASWAMY J G, AND FRANCESCO FLAMMINIE

7 Current applications and future direction of artificial intelligence using blockchain for military application

SUHAS K C, MAHESH N, ASIFULLAKHAN, KOTRESH NAIK D, AND FRANCESCO FLAMMINIE

8 Integration of AI principles with blockchain technology for effective applications

PREETI SATISH, DAKSHAYINI M, AND DALIBOR DOBRILOVIC

9 AI in military applications: Case studies

TEJ PRATAP, SURYA SRIRAM DUVVURI, SAHASTRANSH PRATAP SINGH, GURURAJ H L, GOWTHAM M, AND NOOR ZAMAN JHANJHI

10 Analysis of various cyber security challenges, issues, and counter measures in military application

SASHI PRITAM MANANDI ANAND, VIBHA KAREN DSOUZA, GURURAJ H L, GOWTHAM M, AND DALIBOR DOBRILOVIC

11 Harnessing blockchain to fortify military cyber security in the era of AI

HARSHITHA K S, RAJESHWARI D, PRASANNA KUMAR G, AND BOUZIANE BRIK

12 Computational intelligence in military applications with blockchain techniques

KIRANKUMAR KATARAKI, VISHWAS D B, AND NOOR ZAMAN JHANJHI


Gururaj H L is currently working as an Associate Professor in the Department of Information Technology at the Manipal Institute of Technology, MAHE, Bengaluru, India. He earned his PhD in Computer Science and Engineering from Visveswaraya Technological University, Belagavi, India in 2019. He is a professional member of ACM and worked has been a ACM Distinguish Speaker since 2018. He is the founder of Wireless Internetworking Group (WiNG). He is a senior member of IEEE and lifetime member of ISTE and CSI. Gururaj H L received the Young Scientist Award from SERB, DST, and Government of India in December 2016. He has 9 years of teaching experience at both undergraduate and postgraduate level. His research interests include Block Chain Technology, Cyber Security, Wireless Senor Network, Ad-hoc networks, IoT, Data Mining, Cloud Computing and Machine Learning. He is an Editorial Board member of the International Journal of Block chains and Cryptocurrencies (Inderscience Publishers) and Special Editor of EAI publishers. He has published more than 75 research papers as wells as authored a book on Network Simulator.

Gowtham M is currently working as an Assistant Professor in the Department of Computer Science and Engineering at The National Institute of Engineering, Mysuru, India. He earned his PhD in Computer Science and Engineering at Visvesvaraya Technological University. He has 10 years of teaching experience at both undergraduate and postgraduate level. His research interests include Network Security, Wireless Senor Network, Ad-hoc networks, Machine Learning, IoT and cryptography. He has published more than 30 research papers, authored 7 book chapters, and edited 4 books.

Ajay A V received his B.E. and M. Tech. degrees in Computer Science & Engineering from Visvesvaraya Technological University, Belagavi, India, in 2014 and 2016 respectively and is currently pursuing his PhD in Computer Science & Engineering from Visvesvaraya Technological University, Belagavi. He is an Assistant Professor in the Department of Computer Science & Engineering at The National Institute of Engineering, Mysuru, Karnataka. He has authored and co-authored more than 7 Papers in refereed international journal and conferences, and contributed to 4 chapters in books publications. His current research interests include Network Security, Cryptography, Machine Learning and Internet of Things.

Pramod H B is currently working as an Associate Professor in the Department of Information Science and Engineering, Adichunchanagiri Institute of Technology, Chikkamagaluru, Affiliated to Visvesvaraya Technological University, Belgaum Karnataka, India. He has published more than 26 research articles in peer-reviewed journals as well as 3 edited books.

He received a Bachelor of Engineering degree in Computer Science and Engineering from the Visvesvaraya Technological University in 2007, and a Master of Technology degree in Computer Science from University of Mysore, in 2012. He earned his PhD in the field of Wireless sensor Networks from the Department of Computer Science and Engineering, Shri Venkateshwara University, Uttar Pradesh in the year of 2018. His research area includes Wireless sensor networks, Machine Learning, and data Intelligence and analytics.



Ihre Fragen, Wünsche oder Anmerkungen
Vorname*
Nachname*
Ihre E-Mail-Adresse*
Kundennr.
Ihre Nachricht*
Lediglich mit * gekennzeichnete Felder sind Pflichtfelder.
Wenn Sie die im Kontaktformular eingegebenen Daten durch Klick auf den nachfolgenden Button übersenden, erklären Sie sich damit einverstanden, dass wir Ihr Angaben für die Beantwortung Ihrer Anfrage verwenden. Selbstverständlich werden Ihre Daten vertraulich behandelt und nicht an Dritte weitergegeben. Sie können der Verwendung Ihrer Daten jederzeit widersprechen. Das Datenhandling bei Sack Fachmedien erklären wir Ihnen in unserer Datenschutzerklärung.