Preface xix 1 Cyber Quantum Computing (Security) Using Rectified Probabilistic Packet Mark for Big Data 1 Anil V. Turukmane and Ganesh Khekare 1.1 Introduction 2 1.2 Denial-of-Service Attacks 3 1.3 Related Work 5 1.4 Proposed Methodology 8 1.5 Trace Back Mechanism for Rectified Probabilistic Packet Marking 10 1.6 Conclusion 13 2 Secure Distinctive Data Transmission in Fog System Using Quantum Cryptography 17 Ambika N.
2.1 Introduction 18 2.2 Properties of Quantum Computing 19 2.3 Applications of Quantum Computing 22 2.4 Background 24 2.5 Literature Survey 25 2.6 Proposed Work 26 2.7 Analysis of the Study 27 2.
8 Conclusion 29 3 DDoS Attack and Defense Mechanism in a Server 33 Pranav Bhatnagar, Shreya Pai and Minhaj Khan 3.1 Introduction 34 3.2 DoS Attack 37 3.3 DDoS Attack 39 3.4 DDoS Mitigation 51 3.5 Conclusion 54 4 Dark Web Content Classification Using Quantum Encoding 57 Ashwini Dalvi, Soham Bhoir, Faruk Kazi and S. G. Bhirud 4.
1 Introduction 58 4.2 Related Work 61 4.3 Proposed Approach 65 4.4 Result and Discussion 70 4.5 Conclusion 76 5 Secure E-Voting Scheme Using Blockchain 81 Shrimoyee Banerjee and Umesh Bodkhe 5.1 Introduction 82 5.2 Literature Survey 87 5.3 Implementation and Methodology 89 5.
4 Result Analysis & Output 100 5.5 Conclusion and Future Directions 102 6 An Overview of Quantum Computing--Based Hidden Markov Models 105 B. Abhishek, Sathian D., Amit Kumar Tyagi and Deepshikha Agarwal 6.1 Introduction 105 6.2 Elaboration of Hidden Quantum Markov Model 107 6.3 Example of HQMMs (Isolated Word Recognition in Action) 115 6.4 Matching of State Observation Density 117 6.
5 Conclusion and Results 118 7 Artificial Intelligence and Qubit--Based Operating Systems: Current Progress and Future Perspectives 121 Tejashwa Agarwal and Amit Kumar Tyagi 7.1 Introduction to OS, AI and ML 122 7.2 Learning Configurations 123 7.3 Building ML Models 124 7.4 Work Done in Improving Process Scheduling 124 7.5 Artificial Intelligence in Distributed Operating Systems 128 7.6 Current Progress 129 7.7 Quantum Artificial Intelligence 133 7.
8 Conclusion 135 8 Techno-Nationalism and Techno-Globalization: A Perspective from the National Security Act 137 Hepi Suthar, Hitesh Rawat, Gayathri M. and K. Chidambarathanu 8.1 Introduction 138 8.2 Conclusion 161 9 Quantum Computing Based on Cybersecurity 165 P. William, Vivek Parganiha and D.B. Pardeshi 9.
1 Introduction 166 9.2 Preliminaries 166 9.3 Threat Landscape 168 9.4 Defensive Measurements, Countermeasures, and Best Practises 170 9.5 Conclusion 171 10 Quantum Cryptography for the Future Internet and the Security Analysis 175 P. William, A.B. Pawar and M.
A. Jawale 10.1 Introduction 175 10.2 Related Works 177 10.3 Preliminaries 178 10.4 Quantum Cryptography for Future Internet 180 10.5 Conclusion 185 11 Security Aspects of Quantum Cryptography 189 P. William, Siddhartha Choubey and Abha Choubey 11.
1 Introduction 189 11.2 Literature Survey 190 11.3 Quantum Key Distribution 192 11.4 Cryptography 193 11.5 Quantum Cryptography with Faint Laser Pulses 195 11.6 Eavesdropping 196 11.7 Conclusion 198 12 Security Aspects of Quantum Machine Learning: Opportunities, Threats and Defenses 201 P. William, Vivek Parganiha and D.
B. Pardeshi 12.1 Introduction 201 12.2 Quantum Computing Basics 202 12.3 Security Applications 206 12.4 Quantum Machine Learning 210 12.5 Conclusion 213 13 Cyber Forensics and Cybersecurity: Threat Analysis, Research Statement and Opportunities for the Future 217 Nirav Bhatt and Amit Kumar Tyagi 13.1 Introduction 218 13.
2 Background 219 13.3 Scope of this Work 220 13.4 Methodology and Analysis of Simulation Results 222 13.5 Quantum-Based Cybersecurity and Forensics 228 13.6 Conclusion and Future Works 230 14 Quantum Computing: A Software Engineering Approach 233 Mradul Agrawal, Aviral Jain, Rudraksh Thorat and Shivam Sharma 14.1 Introduction 234 14.2 Background of Research Area 235 14.3 Why Cryptography? 235 14.
4 Classical Cryptography 238 14.5 Quantum Cryptography (QCr) 239 14.6 Quantum Key Distribution 240 14.7 Cryptanalysis 242 14.8 Entanglement 242 14.9 Quantum Teleportation 243 14.10 Applications of QCr in Cybersecurity 243 14.11 Quantum Key Distribution Protocols Implementation 244 14.
12 Research and Work 244 14.13 Challenges Faced by QC 245 14.14 Limitations 245 14.15 Conclusion 246 15 Quantum Computing to the Advantage of Neural Network 249 Aditya Maltare, Ishita Jain, Keshav Agrawal and Tanya Rawat 15.1 Introduction 250 15.2 Significance of Quantum Computers in Machine Learning 251 15.3 Related Work 252 15.4 Proposed Methodology 255 15.
5 Result and Analysis 258 15.6 Conclusion 258 16 Image Filtering Based on VQA with Quantum Security 263 Avni Burman, Bhushan Bawaskar, Harsh Dindorkar and Hrithik Surjan 16.1 Introduction 263 16.2 Related Work 267 16.3 Problem Statement 269 16.4 Working 269 16.5 Proposed Methodology Solution 270 16.6 Result Analysis 272 16.
7 Conclusion 272 17 Quantum Computing Techniques Assessment and Representation 275 Dewansh Khandelwal, Nimish Vyas, Priyanshi Skaktawat, Vaidehi Anwekar, Om Kumar C.U. and D. Jeyakumar 17.1 Introduction 276 17.2 Fundamentals of QC 278 17.3 Properties of QC 278 17.4 Topography of QC 280 17.
5 The Architecture of QC 281 17.6 Quantum Algorithm 283 17.7 Design Limitations of Quantum Computer 284 17.8 Different Categories of Quantum Computer 286 17.9 Advantages of QC 287 17.10 Disadvantages of QC 287 17.11 Applications of QC 288 17.12 Major Challenges in QC 290 17.
13 Conclusion 291 18 Quantum Computing Technological Design Along with Its Dark Side 295 Divyam Pithawa, Sarthak Nahar, Vivek Bhardwaj, Romil Rawat, Ruchi Dronawat and Anjali Rawat 18.1 Introduction 296 18.2 Related Work 297 18.3 History and Evolution of QCOM 298 18.4 Components & Concepts that Make QCOM Possible 300 18.5 Plans for the Future Development of Quantum Computer 302 18.6 Dark Side of QCOM 306 18.7 Plans for Protection in Quantum Era 309 18.
8 Conclusion 310 19 Quantum Technology for Military Applications 313 Sarthak Nahar, Divyam Pithawa, Vivek Bhardwaj, Romil Rawat, Anjali Rawat and Kiran Pachlasiya 19.1 Introduction 314 19.2 Related Work 317 19.3 Overview of QTECH 318 19.4 QTECH in Defence 325 19.5 Military Applications of QTECH 327 19.6 Challenges and Consequences of Quantum Warfare 331 19.7 Conclusion 332 20 Potential Threats and Ethical Risks of Quantum Computing 335 Apurva Namdev, Darshan Patni, Balwinder Kaur Dhaliwal, Sunil Parihar, Shrikant Telang and Anjali Rawat 20.
1 Introduction 335 20.2 Research Design & Methodology 339 20.3 Brief In-Depth Overview of Possible Vulnerabilities 341 20.4 New Risks to be Created 349 20.5 Futuristic Picture of Quantum Ethics 350 20.6 Conclusion 352 21 Is Quantum Computing a Cybersecurity Threat? 353 Akshat Maheshwari, Manan Jain, Vindhya Tiwari, Mandakini Ingle and Ashish Chourey 21.1 Introduction 354 21.2 How QCom Threatens Cybersecurity 360 21.
3 How QCom could Improve Cybersecurity 361 21.4 Quantum Cryptography and Its Applications 362 21.5 Proposed Methodology 363 21.6 Background/Objective 366 21.7 Conclusion 366 References 367 22 Quantum Computing in Data Security: A Critical Assessment 369 Sadullah Khan, Chintan Jain, Sudhir Rathi, Prakash Kumar Maravi, Arun Jhapate and Divyani Joshi 22.1 Introduction 370 22.2 Present Cryptographic Algorithms and Systems 371 22.3 Comparing Traditional Computing and Quantum Computing 373 22.
4 Post--Quantum Cryptography (PQC) 377 22.5 Quantum Cryptography and Its Applications 378 22.6 Corporate Competitions Towards Quantum Computing 383 22.7 Threats Posed to Critical Infrastructure and Mechanisms 384 22.8 Conclusion 388 23 Quantum Computing and Security Aspects of Attention-Based Visual Question Answering with Long Short-Term Memory 395 Madhav Shrivastava, Rajat Patil, Vivek Bhardwaj, Romil Rawat, Shrikant Telang and Anjali Rawat 23.1 Introduction 396 23.2 Literature Review 399 23.3 Problem Statement 401 23.
4 Problem Elaboration 401 23.5 Proposed Methodology 402 23.6 Methods 404 23.7 Solution Approach 407 23.8 Expected Results 407 23.9 Conclusion 409 23.10 Abbreviations 410 24 Quantum Cryptography -- A Security Architecture 413 Sunandani Sharma, Sneha Agrawal, Sneha Baldeva, Diya Dabhade, Parikshi.