MA-QC-2022: “Methodologies and Application of Quantum Computing in Cyber Terrorism and Security Framework ” |
Website | https://sites.google.com/view/avcbook2021/methods-and-app-of-quantum-computing-in-cyber-terrorism-security-framewo |
Submission link | https://easychair.org/conferences/?conf=maqc2022 |
MA-QC-2022
About the topic
Machine learning, deep learning, probabilistic neural networks, blockchain, and other new technologies all demand extremely high processing speeds. A quantum computer is an example of such a system. The quantum computers may be accessed over the internet. This technology poses a significant risk, since quantum terrorists(Cyber Criminals ) might bring the future internet to a halt. The principles of quantum mechanics might be used by evil users to destroy quantum information on a global scale, and an entire class of suspicious codes could destroy data or eavesdrop on communication. However, quantum physics safeguards against data eavesdropping. A significant amount of money is being invested in developing and testing a quantum version of the Internet that will eliminate eavesdropping and make communication nearly impenetrable to cyber attacks. The simultaneous activation of quantum terrorists (organized crime) can lead to significant danger by attackers introducing quantum information into the network, breaking the global quantum state and preventing the system from returning to its starting state. Without signs of identifying information and real-time communication data, such vulnerabilities are very hard to discover. Terrorists' synchronized and coordinated acts have an impact on security by sparking a cyber assault in a fraction of a second.
About the book
The encryption is used by cyber criminal groups with the genuine, nefarious, and terrible motives of killing innocent people or stealing money. In the hands of criminals and codes, cryptography is a dangerous and formidable weapon. Small amounts of digital information are hidden in a code string that translates into an image on the screen, making it impossible for the human eye to identify a coded picture from its uncoded equivalents. To steal the cryptographic key necessary to read people's credit card data or banking information, cyber thieves employ installed encryption techniques, human mistakes, keyboard loggers, and computer malware. Quantum-enabled encryption, according to some security experts, does not address other types of risks such as phishing, bribery, or physical theft. The biggest fear expressed, however, was the security services' inability to intercept data supplied by criminals and terrorist groups. Money, data, and identity theft, information theft for bribery, system shutdowns, and financial market manipulation may all be possible if quantum computing technology is abused. The use of quantum-enabled encryption to conceal criminal activities is being used by terrorists (such as terrorist attack plans), organized criminals (international criminal networks), online pornography, paedophiles (transferring images), and tax evaders to transfer information and data for nefarious purposes (transferring money to tax havens).
Important Dates
All chapters must be original and not simultaneously submitted toanother book project, journal or conference. The following importantdates will be considered for the submissions:
Full Chapter Submission Deadline: June. 15, 2022
Review Reports: June. 20, 2022
Revised Full Chapter Submission: June. 28, 2022
Tentative Topics but not limited to:
-
· Quantum theory and Cyber crime Analytics.
-
· Quantum Machine learning applications for Cryptography and Information Security
-
· Quantum Neural Network framework for Quantum threat
-
· Dark Side of Quantum Computing
-
· Quantum terrorists threat for Military
-
· Cyber threat modeling and hacking of Secure applications
-
· Military activity tracing and Anti-submarine warfare
-
· Quantum Cryptography and Security for Communication and Measurement
-
· transactions of quantum money for Illicit events
-
· Quantum Forensics for Algorithms and computing
-
· Quantum computing terrorist at ocean
-
· Quantum computing applications in cyber terrorism and security.
-
· Quantum Inspired Community Detection in Social Networks Analytics
-
· Future Directions in Quantum Computing
-
· Quantum machine learning for intrusion detection and Prevention system
-
· Quantum models to detect distributed denial of service attacks.
-
· Cyber Criminals attack for quantum internet
-
· Quantum-powered attacks by Digital Weapon
-
· Quantum Communication Network and terrorist crime organization
-
· Quantum simulation for analyzing criminals activities and behavior analysis
-
· Quantum Computing Power Malware Attacks
-
· Hardware Triggered Threats
Keywords
• Quantum theory
• Cyber crime
• Artificial Intelligence
• Quantum Machine Learning
• Quantum Neural Network
• Cryptography and Information Security
• Internet of Thing
• Quantum Computer
• Quantum computing threat
• Dark Side of Quantum Computing
• Quantum terrorists
• Quantum magnetometer
• Anti-submarine warfare
• Quantum anomalies
• Quantum Cryptography and Security
• Quantum Communication and Measurement
• Quantum Technology and Submarine
• quantum attacks
• Quantum information technologies
• Quantum cryptography
• transactions of quantum money
• Quantum Forensics
• Algorithms and computing
• Quantum communications
• Post-quantum cryptography
• post-quantum security
• Quantum Communication Network
• Quantum terrorist crime
• quantum-powered attacks
• Military Quantum computing
• Quantum key distribution
• Quantum cryptanalysis
• Quantum sensors
• Digital Weapon
• Quantum simulation
• Terrorist at ocean
• Cyber threat intelligence
• Cyber-warfare
• quantum message
• Quantum Hacking
Submission Guidelines
All papers must be original and not simultaneously submitted to another journal or conference. The following paper categories are welcome:
Important Guidelines for Chapter Preparation
Chapter Template - https://www.scrivenerpublishing.com/guidelines.php
Note that all chapters will be put through similarity software and publisher’s guidelines are an overall similarity index of less than 15% (with maximum 3% from any single source). Each Chapter should have Minimum of 18 Pages.
Reviewing Policy: The editor(s) will engage 2 single blind peer-reviewers to assess originality, clarity, usefulness, and adherence to scope of project.
All Chapters must be original and not simultaneously submitted to another journal or conference.
Editor Details
- Romil Rawat, Assistant Professor, Shri Vaishnav Vidyapeeth Vishwavidyalaya, Indore India - rawat.romil@gmail.com
Publication
MA-QC-2022 - The book will be published under the Wiley-Scrivener imprint and will be indexed by Scopus and offered to Web of Science.
Contact
All questions about submissions should be emailed to ... rawat.romil@gmail.com