Leveraging futuristic machine learning and next-generational security for e-governance:
"In an era defined by rapid technological advancement and a pressing need for effective governance, the intersection of machine learning and cybersecurity has emerged as a pivotal area of exploration and innovation. E-governance serves as a vital framework for enhancing the delivery of public s...
Saved in:
Other Authors: | , , , , |
---|---|
Format: | Electronic eBook |
Language: | English |
Published: |
Hershey, Pennsylvania (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA)
IGI Global
2025.
|
Series: | Advances in electronic government, digital divide, and regional development (AEGDDRD) book series.
|
Subjects: | |
Online Access: | DE-862 DE-863 |
Summary: | "In an era defined by rapid technological advancement and a pressing need for effective governance, the intersection of machine learning and cybersecurity has emerged as a pivotal area of exploration and innovation. E-governance serves as a vital framework for enhancing the delivery of public services, increasing governmental transparency, and fostering citizen engagement. However, as governments increasingly rely on digital infrastructures, they expose themselves to a myriad of cyber threats that can undermine public trust and security. The contemporary landscape of e-governance must not only adapt to the wave of new digital tools but also ensure the security and integrity of the data that underpins them. Leveraging Futuristic Machine Learning and Next-Generational Security for e-Governance brings together a comprehensive collection of insights and research from leading experts in the fields of artificial intelligence, cybersecurity, and public administration. The contributions to this volume encompass theoretical frameworks, case studies, and practical applications that showcase the transformative potential of integrating machine learning with next-generation security solutions. With this resource, researchers, practitioners, and academics can work toward a new age where e-governance thrives at the nexus of machine learning and cybersecurity."-- |
Physical Description: | 18 PDFs (356 Seiten) Also available in print. |
Format: | Mode of access: World Wide Web. |
Bibliography: | Includes bibliographical references and index. |
ISBN: | 9798369378854 |
Access: | Restricted to subscribers or individual electronic text purchasers. |
Staff View
MARC
LEADER | 00000nam a2200000 i 4500 | ||
---|---|---|---|
001 | ZDB-98-IGB-00349576 | ||
003 | IGIG | ||
005 | 20241209134413.0 | ||
006 | m eo d | ||
007 | cr bn||||m|||a | ||
008 | 241209s2025 pau fob 001 0 eng d | ||
020 | |a 9798369378854 |q PDF | ||
020 | |z 9798369378830 |q print | ||
024 | 7 | |a 10.4018/979-8-3693-7883-0 |2 doi | |
035 | |a (CaBNVSL)slc00007222 | ||
035 | |a (OCoLC)1479494569 | ||
040 | |a CaBNVSL |b eng |e rda |c CaBNVSL |d CaBNVSL | ||
050 | 4 | |a Q325.73 |b .L48 2025e | |
082 | 7 | |a 352.3/8028558 |2 23 | |
245 | 0 | 0 | |a Leveraging futuristic machine learning and next-generational security for e-governance |c Rajeev Kumar, Abu Bakar Abdul Hamid, Noor Inayah Binti Ya'akub, Tadiwa Elisha Nyamasvisva, Rajesh Kumar Tiwari, editors. |
264 | 1 | |a Hershey, Pennsylvania (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA) |b IGI Global |c 2025. | |
300 | |a 18 PDFs (356 Seiten) | ||
336 | |a text |2 rdacontent | ||
337 | |a electronic |2 isbdmedia | ||
338 | |a online resource |2 rdacarrier | ||
490 | 1 | |a Advances in electronic government, digital divide, and regional development (AEGDDRD) book series | |
504 | |a Includes bibliographical references and index. | ||
505 | 0 | |a Preface -- Chapter 1. Bridging E-Governance and Sustainability: Unveiling Synergies for a Sustainable Future -- Chapter 2. The Next Generation of Greentech Trends and Innovations Shaping Sustainable E-Governance -- Chapter 3. A Primer for Governance -- Chapter 4. Machine Learning for Traffic Management, Object Detection, and Collision Avoidance in Autonomous Driving for Smart City Governance -- Chapter 5. Cutting-Edge Deep Learning Approaches for Human Pose Estimation and Activity Recognition in Smart Cities -- Chapter 6. Approaches of Deep Learning Used in Cyber Security and Cyber-Crime -- Chapter 7. Cybersecurity Affected Social Life Using Online Transactions in India -- Chapter 8. Cyber-Physical Systems for Enhancement in Security While Using Cyber -- Chapter 9. Security of Linear Regression Models -- Chapter 10. Optimizing Image Encryption Efficiency Through Advanced Deep Learning Architectures and Techniques -- Chapter 11. Machine Learning for Healthcare Fraud Detection: A Comprehensive Review Literature -- Chapter 12. Impact of the COVID-19 Pandemic on Healthcare Fraud: A Comprehensive Literature Review -- Compilation of References -- About the Contributors -- Index. | |
506 | |a Restricted to subscribers or individual electronic text purchasers. | ||
520 | 3 | |a "In an era defined by rapid technological advancement and a pressing need for effective governance, the intersection of machine learning and cybersecurity has emerged as a pivotal area of exploration and innovation. E-governance serves as a vital framework for enhancing the delivery of public services, increasing governmental transparency, and fostering citizen engagement. However, as governments increasingly rely on digital infrastructures, they expose themselves to a myriad of cyber threats that can undermine public trust and security. The contemporary landscape of e-governance must not only adapt to the wave of new digital tools but also ensure the security and integrity of the data that underpins them. Leveraging Futuristic Machine Learning and Next-Generational Security for e-Governance brings together a comprehensive collection of insights and research from leading experts in the fields of artificial intelligence, cybersecurity, and public administration. The contributions to this volume encompass theoretical frameworks, case studies, and practical applications that showcase the transformative potential of integrating machine learning with next-generation security solutions. With this resource, researchers, practitioners, and academics can work toward a new age where e-governance thrives at the nexus of machine learning and cybersecurity."-- |c Provided by publisher. | |
530 | |a Also available in print. | ||
538 | |a Mode of access: World Wide Web. | ||
588 | |a Description based on title screen (IGI Global, viewed 12/09/2024). | ||
650 | 0 | |a Computer security. | |
650 | 0 | |a Deep learning (Machine learning) |x Industrial applications. | |
653 | |a Activity Recognition. | ||
653 | |a Blockchain. | ||
653 | |a Cyber Crime. | ||
653 | |a Cyber Physical System. | ||
653 | |a Cyber Security. | ||
653 | |a Deep Learning. | ||
653 | |a Exogenous Determinants. | ||
653 | |a Greentech Trends. | ||
653 | |a Machine Learning. | ||
653 | |a Object Detection. | ||
653 | |a Online Transactions. | ||
653 | |a Optimizing Image Encryption Efficiency. | ||
653 | |a Skill Development. | ||
653 | |a Smart Cities. | ||
653 | |a Sustainable E-Governance. | ||
655 | 4 | |a Electronic books. | |
700 | 1 | |a Abdul Hamid, Abu Bakar |d 1967- |e editor. | |
700 | 1 | |a Kumar, Rajeev |e editor. | |
700 | 1 | |a Nyamasvisva, Tadiwa Elisha |e editor. | |
700 | 1 | |a Tiwari, Rajesh Kumar |e editor. | |
700 | 1 | |a Ya'akub, Noor Inayah Binti |e editor. | |
710 | 2 | |a IGI Global, |e publisher. | |
776 | 0 | 8 | |i Print version: |z 9798369378830 |
830 | 0 | |a Advances in electronic government, digital divide, and regional development (AEGDDRD) book series. | |
966 | 4 | 0 | |l DE-862 |p ZDB-98-IGB |q FWS_PDA_IGB |u https://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/979-8-3693-7883-0 |3 Volltext |
966 | 4 | 0 | |l DE-863 |p ZDB-98-IGB |q FWS_PDA_IGB |u https://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/979-8-3693-7883-0 |3 Volltext |
912 | |a ZDB-98-IGB | ||
049 | |a DE-862 | ||
049 | |a DE-863 |
Record in the Search Index
DE-BY-FWS_katkey | ZDB-98-IGB-00349576 |
---|---|
_version_ | 1826942604109938688 |
adam_text | |
any_adam_object | |
author2 | Abdul Hamid, Abu Bakar 1967- Kumar, Rajeev Nyamasvisva, Tadiwa Elisha Tiwari, Rajesh Kumar Ya'akub, Noor Inayah Binti |
author2_role | edt edt edt edt edt |
author2_variant | h a b a hab haba r k rk t e n te ten r k t rk rkt n i b y nib niby |
author_facet | Abdul Hamid, Abu Bakar 1967- Kumar, Rajeev Nyamasvisva, Tadiwa Elisha Tiwari, Rajesh Kumar Ya'akub, Noor Inayah Binti |
building | Verbundindex |
bvnumber | localFWS |
callnumber-first | Q - Science |
callnumber-label | Q325 |
callnumber-raw | Q325.73 .L48 2025e |
callnumber-search | Q325.73 .L48 2025e |
callnumber-sort | Q 3325.73 L48 42025E |
callnumber-subject | Q - General Science |
collection | ZDB-98-IGB |
contents | Preface -- Chapter 1. Bridging E-Governance and Sustainability: Unveiling Synergies for a Sustainable Future -- Chapter 2. The Next Generation of Greentech Trends and Innovations Shaping Sustainable E-Governance -- Chapter 3. A Primer for Governance -- Chapter 4. Machine Learning for Traffic Management, Object Detection, and Collision Avoidance in Autonomous Driving for Smart City Governance -- Chapter 5. Cutting-Edge Deep Learning Approaches for Human Pose Estimation and Activity Recognition in Smart Cities -- Chapter 6. Approaches of Deep Learning Used in Cyber Security and Cyber-Crime -- Chapter 7. Cybersecurity Affected Social Life Using Online Transactions in India -- Chapter 8. Cyber-Physical Systems for Enhancement in Security While Using Cyber -- Chapter 9. Security of Linear Regression Models -- Chapter 10. Optimizing Image Encryption Efficiency Through Advanced Deep Learning Architectures and Techniques -- Chapter 11. Machine Learning for Healthcare Fraud Detection: A Comprehensive Review Literature -- Chapter 12. Impact of the COVID-19 Pandemic on Healthcare Fraud: A Comprehensive Literature Review -- Compilation of References -- About the Contributors -- Index. |
ctrlnum | (CaBNVSL)slc00007222 (OCoLC)1479494569 |
dewey-full | 352.3/8028558 |
dewey-hundreds | 300 - Social sciences |
dewey-ones | 352 - General considerations of public administration |
dewey-raw | 352.3/8028558 |
dewey-search | 352.3/8028558 |
dewey-sort | 3352.3 78028558 |
dewey-tens | 350 - Public administration and military science |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>05295nam a2200685 i 4500</leader><controlfield tag="001">ZDB-98-IGB-00349576</controlfield><controlfield tag="003">IGIG</controlfield><controlfield tag="005">20241209134413.0</controlfield><controlfield tag="006">m eo d </controlfield><controlfield tag="007">cr bn||||m|||a</controlfield><controlfield tag="008">241209s2025 pau fob 001 0 eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9798369378854</subfield><subfield code="q">PDF</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">9798369378830</subfield><subfield code="q">print</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.4018/979-8-3693-7883-0</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(CaBNVSL)slc00007222</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1479494569</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">CaBNVSL</subfield><subfield code="b">eng</subfield><subfield code="e">rda</subfield><subfield code="c">CaBNVSL</subfield><subfield code="d">CaBNVSL</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">Q325.73</subfield><subfield code="b">.L48 2025e</subfield></datafield><datafield tag="082" ind1="7" ind2=" "><subfield code="a"> 352.3/8028558</subfield><subfield code="2">23</subfield></datafield><datafield tag="245" ind1="0" ind2="0"><subfield code="a">Leveraging futuristic machine learning and next-generational security for e-governance </subfield><subfield code="c">Rajeev Kumar, Abu Bakar Abdul Hamid, Noor Inayah Binti Ya'akub, Tadiwa Elisha Nyamasvisva, Rajesh Kumar Tiwari, editors.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Hershey, Pennsylvania (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA) </subfield><subfield code="b">IGI Global</subfield><subfield code="c">2025.</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">18 PDFs (356 Seiten)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">electronic</subfield><subfield code="2">isbdmedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">Advances in electronic government, digital divide, and regional development (AEGDDRD) book series</subfield></datafield><datafield tag="504" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index.</subfield></datafield><datafield tag="505" ind1="0" ind2=" "><subfield code="a">Preface -- Chapter 1. Bridging E-Governance and Sustainability: Unveiling Synergies for a Sustainable Future -- Chapter 2. The Next Generation of Greentech Trends and Innovations Shaping Sustainable E-Governance -- Chapter 3. A Primer for Governance -- Chapter 4. Machine Learning for Traffic Management, Object Detection, and Collision Avoidance in Autonomous Driving for Smart City Governance -- Chapter 5. Cutting-Edge Deep Learning Approaches for Human Pose Estimation and Activity Recognition in Smart Cities -- Chapter 6. Approaches of Deep Learning Used in Cyber Security and Cyber-Crime -- Chapter 7. Cybersecurity Affected Social Life Using Online Transactions in India -- Chapter 8. Cyber-Physical Systems for Enhancement in Security While Using Cyber -- Chapter 9. Security of Linear Regression Models -- Chapter 10. Optimizing Image Encryption Efficiency Through Advanced Deep Learning Architectures and Techniques -- Chapter 11. Machine Learning for Healthcare Fraud Detection: A Comprehensive Review Literature -- Chapter 12. Impact of the COVID-19 Pandemic on Healthcare Fraud: A Comprehensive Literature Review -- Compilation of References -- About the Contributors -- Index.</subfield></datafield><datafield tag="506" ind1=" " ind2=" "><subfield code="a">Restricted to subscribers or individual electronic text purchasers.</subfield></datafield><datafield tag="520" ind1="3" ind2=" "><subfield code="a">"In an era defined by rapid technological advancement and a pressing need for effective governance, the intersection of machine learning and cybersecurity has emerged as a pivotal area of exploration and innovation. E-governance serves as a vital framework for enhancing the delivery of public services, increasing governmental transparency, and fostering citizen engagement. However, as governments increasingly rely on digital infrastructures, they expose themselves to a myriad of cyber threats that can undermine public trust and security. The contemporary landscape of e-governance must not only adapt to the wave of new digital tools but also ensure the security and integrity of the data that underpins them. Leveraging Futuristic Machine Learning and Next-Generational Security for e-Governance brings together a comprehensive collection of insights and research from leading experts in the fields of artificial intelligence, cybersecurity, and public administration. The contributions to this volume encompass theoretical frameworks, case studies, and practical applications that showcase the transformative potential of integrating machine learning with next-generation security solutions. With this resource, researchers, practitioners, and academics can work toward a new age where e-governance thrives at the nexus of machine learning and cybersecurity."--</subfield><subfield code="c">Provided by publisher.</subfield></datafield><datafield tag="530" ind1=" " ind2=" "><subfield code="a">Also available in print.</subfield></datafield><datafield tag="538" ind1=" " ind2=" "><subfield code="a">Mode of access: World Wide Web.</subfield></datafield><datafield tag="588" ind1=" " ind2=" "><subfield code="a">Description based on title screen (IGI Global, viewed 12/09/2024).</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer security.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Deep learning (Machine learning)</subfield><subfield code="x">Industrial applications.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Activity Recognition.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Blockchain.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Cyber Crime.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Cyber Physical System.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Cyber Security.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Deep Learning.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Exogenous Determinants.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Greentech Trends.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Machine Learning.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Object Detection.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Online Transactions.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Optimizing Image Encryption Efficiency.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Skill Development.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Smart Cities.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Sustainable E-Governance.</subfield></datafield><datafield tag="655" ind1=" " ind2="4"><subfield code="a">Electronic books.</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Abdul Hamid, Abu Bakar</subfield><subfield code="d">1967-</subfield><subfield code="e">editor.</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Kumar, Rajeev</subfield><subfield code="e">editor.</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Nyamasvisva, Tadiwa Elisha</subfield><subfield code="e">editor.</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Tiwari, Rajesh Kumar</subfield><subfield code="e">editor.</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Ya'akub, Noor Inayah Binti</subfield><subfield code="e">editor.</subfield></datafield><datafield tag="710" ind1="2" ind2=" "><subfield code="a">IGI Global,</subfield><subfield code="e">publisher.</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Print version:</subfield><subfield code="z">9798369378830</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">Advances in electronic government, digital divide, and regional development (AEGDDRD) book series.</subfield></datafield><datafield tag="966" ind1="4" ind2="0"><subfield code="l">DE-862</subfield><subfield code="p">ZDB-98-IGB</subfield><subfield code="q">FWS_PDA_IGB</subfield><subfield code="u">https://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/979-8-3693-7883-0</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="4" ind2="0"><subfield code="l">DE-863</subfield><subfield code="p">ZDB-98-IGB</subfield><subfield code="q">FWS_PDA_IGB</subfield><subfield code="u">https://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/979-8-3693-7883-0</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-98-IGB</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-862</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-863</subfield></datafield></record></collection> |
genre | Electronic books. |
genre_facet | Electronic books. |
id | ZDB-98-IGB-00349576 |
illustrated | Not Illustrated |
indexdate | 2025-03-18T14:30:39Z |
institution | BVB |
isbn | 9798369378854 |
language | English |
oclc_num | 1479494569 |
open_access_boolean | |
owner | DE-862 DE-BY-FWS DE-863 DE-BY-FWS |
owner_facet | DE-862 DE-BY-FWS DE-863 DE-BY-FWS |
physical | 18 PDFs (356 Seiten) Also available in print. |
psigel | ZDB-98-IGB FWS_PDA_IGB ZDB-98-IGB |
publishDate | 2025 |
publishDateSearch | 2025 |
publishDateSort | 2025 |
publisher | IGI Global |
record_format | marc |
series | Advances in electronic government, digital divide, and regional development (AEGDDRD) book series. |
series2 | Advances in electronic government, digital divide, and regional development (AEGDDRD) book series |
spelling | Leveraging futuristic machine learning and next-generational security for e-governance Rajeev Kumar, Abu Bakar Abdul Hamid, Noor Inayah Binti Ya'akub, Tadiwa Elisha Nyamasvisva, Rajesh Kumar Tiwari, editors. Hershey, Pennsylvania (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA) IGI Global 2025. 18 PDFs (356 Seiten) text rdacontent electronic isbdmedia online resource rdacarrier Advances in electronic government, digital divide, and regional development (AEGDDRD) book series Includes bibliographical references and index. Preface -- Chapter 1. Bridging E-Governance and Sustainability: Unveiling Synergies for a Sustainable Future -- Chapter 2. The Next Generation of Greentech Trends and Innovations Shaping Sustainable E-Governance -- Chapter 3. A Primer for Governance -- Chapter 4. Machine Learning for Traffic Management, Object Detection, and Collision Avoidance in Autonomous Driving for Smart City Governance -- Chapter 5. Cutting-Edge Deep Learning Approaches for Human Pose Estimation and Activity Recognition in Smart Cities -- Chapter 6. Approaches of Deep Learning Used in Cyber Security and Cyber-Crime -- Chapter 7. Cybersecurity Affected Social Life Using Online Transactions in India -- Chapter 8. Cyber-Physical Systems for Enhancement in Security While Using Cyber -- Chapter 9. Security of Linear Regression Models -- Chapter 10. Optimizing Image Encryption Efficiency Through Advanced Deep Learning Architectures and Techniques -- Chapter 11. Machine Learning for Healthcare Fraud Detection: A Comprehensive Review Literature -- Chapter 12. Impact of the COVID-19 Pandemic on Healthcare Fraud: A Comprehensive Literature Review -- Compilation of References -- About the Contributors -- Index. Restricted to subscribers or individual electronic text purchasers. "In an era defined by rapid technological advancement and a pressing need for effective governance, the intersection of machine learning and cybersecurity has emerged as a pivotal area of exploration and innovation. E-governance serves as a vital framework for enhancing the delivery of public services, increasing governmental transparency, and fostering citizen engagement. However, as governments increasingly rely on digital infrastructures, they expose themselves to a myriad of cyber threats that can undermine public trust and security. The contemporary landscape of e-governance must not only adapt to the wave of new digital tools but also ensure the security and integrity of the data that underpins them. Leveraging Futuristic Machine Learning and Next-Generational Security for e-Governance brings together a comprehensive collection of insights and research from leading experts in the fields of artificial intelligence, cybersecurity, and public administration. The contributions to this volume encompass theoretical frameworks, case studies, and practical applications that showcase the transformative potential of integrating machine learning with next-generation security solutions. With this resource, researchers, practitioners, and academics can work toward a new age where e-governance thrives at the nexus of machine learning and cybersecurity."-- Provided by publisher. Also available in print. Mode of access: World Wide Web. Description based on title screen (IGI Global, viewed 12/09/2024). Computer security. Deep learning (Machine learning) Industrial applications. Activity Recognition. Blockchain. Cyber Crime. Cyber Physical System. Cyber Security. Deep Learning. Exogenous Determinants. Greentech Trends. Machine Learning. Object Detection. Online Transactions. Optimizing Image Encryption Efficiency. Skill Development. Smart Cities. Sustainable E-Governance. Electronic books. Abdul Hamid, Abu Bakar 1967- editor. Kumar, Rajeev editor. Nyamasvisva, Tadiwa Elisha editor. Tiwari, Rajesh Kumar editor. Ya'akub, Noor Inayah Binti editor. IGI Global, publisher. Print version: 9798369378830 Advances in electronic government, digital divide, and regional development (AEGDDRD) book series. |
spellingShingle | Leveraging futuristic machine learning and next-generational security for e-governance Advances in electronic government, digital divide, and regional development (AEGDDRD) book series. Preface -- Chapter 1. Bridging E-Governance and Sustainability: Unveiling Synergies for a Sustainable Future -- Chapter 2. The Next Generation of Greentech Trends and Innovations Shaping Sustainable E-Governance -- Chapter 3. A Primer for Governance -- Chapter 4. Machine Learning for Traffic Management, Object Detection, and Collision Avoidance in Autonomous Driving for Smart City Governance -- Chapter 5. Cutting-Edge Deep Learning Approaches for Human Pose Estimation and Activity Recognition in Smart Cities -- Chapter 6. Approaches of Deep Learning Used in Cyber Security and Cyber-Crime -- Chapter 7. Cybersecurity Affected Social Life Using Online Transactions in India -- Chapter 8. Cyber-Physical Systems for Enhancement in Security While Using Cyber -- Chapter 9. Security of Linear Regression Models -- Chapter 10. Optimizing Image Encryption Efficiency Through Advanced Deep Learning Architectures and Techniques -- Chapter 11. Machine Learning for Healthcare Fraud Detection: A Comprehensive Review Literature -- Chapter 12. Impact of the COVID-19 Pandemic on Healthcare Fraud: A Comprehensive Literature Review -- Compilation of References -- About the Contributors -- Index. Computer security. Deep learning (Machine learning) Industrial applications. |
title | Leveraging futuristic machine learning and next-generational security for e-governance |
title_auth | Leveraging futuristic machine learning and next-generational security for e-governance |
title_exact_search | Leveraging futuristic machine learning and next-generational security for e-governance |
title_full | Leveraging futuristic machine learning and next-generational security for e-governance Rajeev Kumar, Abu Bakar Abdul Hamid, Noor Inayah Binti Ya'akub, Tadiwa Elisha Nyamasvisva, Rajesh Kumar Tiwari, editors. |
title_fullStr | Leveraging futuristic machine learning and next-generational security for e-governance Rajeev Kumar, Abu Bakar Abdul Hamid, Noor Inayah Binti Ya'akub, Tadiwa Elisha Nyamasvisva, Rajesh Kumar Tiwari, editors. |
title_full_unstemmed | Leveraging futuristic machine learning and next-generational security for e-governance Rajeev Kumar, Abu Bakar Abdul Hamid, Noor Inayah Binti Ya'akub, Tadiwa Elisha Nyamasvisva, Rajesh Kumar Tiwari, editors. |
title_short | Leveraging futuristic machine learning and next-generational security for e-governance |
title_sort | leveraging futuristic machine learning and next generational security for e governance |
topic | Computer security. Deep learning (Machine learning) Industrial applications. |
topic_facet | Computer security. Deep learning (Machine learning) Industrial applications. Electronic books. |
work_keys_str_mv | AT abdulhamidabubakar leveragingfuturisticmachinelearningandnextgenerationalsecurityforegovernance AT kumarrajeev leveragingfuturisticmachinelearningandnextgenerationalsecurityforegovernance AT nyamasvisvatadiwaelisha leveragingfuturisticmachinelearningandnextgenerationalsecurityforegovernance AT tiwarirajeshkumar leveragingfuturisticmachinelearningandnextgenerationalsecurityforegovernance AT yaakubnoorinayahbinti leveragingfuturisticmachinelearningandnextgenerationalsecurityforegovernance AT igiglobal leveragingfuturisticmachinelearningandnextgenerationalsecurityforegovernance |