Digital Immune System: Principles and Practices

Author:   Sujata Priyambada Dash (Birla Institute of Technology, Jharkhand, India) ,  Vaibhav Mishra (ICFAI Business School Hyderabad, Telangana, India) ,  Bijeta Shaw (ICFAI Business School Hyderabad, Telangana, India) ,  Sandeep Kumar Panda (ICFAI Foundation for Higher Education, Telangana, India)
Publisher:   John Wiley & Sons Inc
ISBN:  

9781394383757


Pages:   416
Publication Date:   24 November 2025
Format:   Hardback
Availability:   Out of stock   Availability explained
The supplier is temporarily out of stock of this item. It will be ordered for you on backorder and shipped when it becomes available.

Our Price $373.95 Quantity:  
Add to Cart

Share |

Digital Immune System: Principles and Practices


Overview

Full Product Details

Author:   Sujata Priyambada Dash (Birla Institute of Technology, Jharkhand, India) ,  Vaibhav Mishra (ICFAI Business School Hyderabad, Telangana, India) ,  Bijeta Shaw (ICFAI Business School Hyderabad, Telangana, India) ,  Sandeep Kumar Panda (ICFAI Foundation for Higher Education, Telangana, India)
Publisher:   John Wiley & Sons Inc
Imprint:   Wiley-Scrivener
ISBN:  

9781394383757


ISBN 10:   1394383754
Pages:   416
Publication Date:   24 November 2025
Audience:   Professional and scholarly ,  Professional & Vocational
Format:   Hardback
Publisher's Status:   Active
Availability:   Out of stock   Availability explained
The supplier is temporarily out of stock of this item. It will be ordered for you on backorder and shipped when it becomes available.

Table of Contents

Series Preface xxi Preface xxiii Acknowledgements xxvii Part 1: Digital Immune System: Principles 1 1 Digital Immune System Approach Toward the Impact of Gig Faculty on Organizational Learning Within Higher Education Institutes 3 Nimisha Singh, Sonam Gupta and Anshu Yadav 1.1 Introduction 4 1.2 Literature Review 5 1.3 Methodology 8 1.4 Discussion and Conclusion 15 1.5 Conclusion: Underinvestment in Training, Professional Development, and Quality Assurance 16 1.6 Future Scope 17 References 20 2 The Economics of Implementing Digital Immune Systems 23 Ritesh Kumar Dubey and Prince Bhatia 2.1 Introduction 24 2.2 Economics of Implementing a Digital Immune System 27 2.3 Evolving Landscape of Digital Immune Systems 31 2.4 Conclusion 34 References 36 3 Blockchain-Based Digital Immune System for IoT Security with Adaptive Threat Detection and Automated Response 37 Chandra Priya Jayabal and Sujata Priyambada Dash 3.1 Introduction 38 3.2 Essential DIS Core Concepts 38 3.3 Related Works 40 3.4 Methodology 41 3.5 Experimental Setup 52 3.6 Conclusion and Future Scope 56 References 57 4 Blockchain Technology’s Potential Use in Decentralized Financial Services 59 Dileep Kumar Murala 4.1 Introduction 60 4.2 Related Works 64 4.3 Decentralized Finance Promises 68 4.4 The Main Business Models in Decentralized Finance 70 4.5 Tools, Methods, Services, and Blockchain-Based Financial Services Applications 73 4.6 Research Proposition 78 4.7 Limitations and Feature Scope 85 4.8 Conclusion 87 References 88 5 A Self-Tuning Digital Immune Cybersecurity Model for Manufacturing Industry 4.0 93 Vasamsheti Adarsh, Sashikala Parimi and Vaibhav Mishra 5.1 Introduction: Cybersecurity and Manufacturing Industry 4.0 in the Fourth Industrial Revolution 94 5.2 Significant Cybersecurity Challenges in Manufacturing Industry 4.0 95 5.3 Increased Attack Surface 96 5.4 Legacy Systems and Insecure Networks 96 5.5 Third Industrial Revolution Machine Control Systems – Industrial Control Systems and Supervisory Control and Data Acquisition Security 97 5.6 Supply Chain Vulnerabilities 98 5.7 Virus 98 5.8 Types of Malwares 98 5.9 Data Privacy and Intellectual Property Protection 99 5.10 Insider Threats 100 5.11 Challenging Stint for Cybersecurity in Manufacturing Industry 4.0 100 5.12 Self-Tuning Model 101 5.13 Self-Tuning Model Application and Functionality 103 5.14 Self-Tuning Model and Industry 4.0 103 5.15 Applications for Self-Tuning Models in Manufacturing Industry 4.0 105 5.16 Self-Tuning Model and Cybersecurity 105 5.17 Digital Immune System 107 5.18 Key Roles of Cybersecurity in the Digital Immune System 109 5.19 Self-Tuning Model Integrated into a Digital Immune System 110 5.20 Proposed Digital Immune Model 112 5.21 Conceptual Model Integrating Digital Immune Systems, Self-Tuning Models, Cybersecurity, and Manufacturing Industry 4.0 113 5.22 Interdependence of Cybersecurity, Self-Tuning Model, and Digital Immune System 114 5.23 Conclusion 116 References 116 Part 2: Digital Immune System: Applications 121 6 Integrating GANs for Enhanced Phishing Detection in Digital Immune Systems 123 Sherwin Akshay J. G., Hari Varshan S. R., Radhika G. and Radhika N. 6.1 Introduction 124 6.2 Literature Review 127 6.3 Rise of Machine Learning in Cybersecurity 130 6.4 Proposed Methodology 131 6.5 Comparative Analysis with Traditional Methods 133 6.6 Performance Evaluation and Benchmarking 135 6.7 Challenges and Future Trends 139 6.8 Results and Discussion 141 6.9 Conclusion 143 References 143 7 Managing Complexity in Cybersecurity: The Necessity of Human Oversight in Digital Immune Systems from Behavioral Forensic Perspective 145 Bhartrihari Pandiya and Prasad Kulkarni 7.1 Introduction 146 7.2 Literature Review 148 7.3 Case Studies Highlighting Human Oversight 151 7.4 Proposed Model 156 7.5 Conclusion 159 7.6 Managerial Implications 161 References 164 8 Ontologically Structured Methods for Evaluating Semantic Textual Similarity in Security Applications 167 Atul Gupta, Rohit Saxena, Vishal Nagar and Satyasundara Mahapatra 8.1 Introduction 168 8.2 Related Work Based on Topological Methodology 169 8.3 Methods of Semantic Similarity Computation 170 8.4 Hybrid Approach 173 8.5 String-Based Similarity 174 8.6 Similarity Based on Terms 175 8.7 Proposed Methodology 176 8.8 Results 178 8.9 Software Used for Computing Semantic Similarity 178 8.10 Conclusion 179 References 179 9 Building Human-Centric Cyber Resilience – The Role of HR Practices 183 Preshita Neha Tudu, Aparna Rani, Steffi L. and Chavali Akhila 9.1 Introduction 183 9.2 Cybersecurity and Cyber Resilience – Different or Same? 186 9.3 Does Cyber Resilience Bolster an Organization’s Cybersecurity? 188 9.4 The Evolving Role of Human Resources in Cyber Resilience and Data Protection 190 9.5 The Role of Human Resources in Building Cyber Resilient Organizations 193 9.6 The Future and Challenges of Human Resources and Cyber Resilience 203 9.7 Conclusion 206 References 207 10 Blockchain-Based Cybersecurity: A New Era of Data Protection 211 Sagiraju Harinadharaju, Manjunadh Muvva, Bvv Satyanarayana, Rithish Abinav and Pooja Mishra 10.1 Introduction 211 10.2 Fundamentals of Blockchain Technology 213 10.3 Blockchain for Data Security 216 10.4 Real-World Case Studies and Applications 218 10.5 Integration with Emerging Technologies 220 10.6 Economic, Environmental, and Social Implications 220 10.7 Regulatory, Legal, and Compliance Considerations 222 10.8 Challenges and Future Research Directions 222 10.9 Conclusions and Future Outlooks 223 References 225 Part 3: Digital Immune System: Novel Practices 229 11 Blockchain Technology and Intelligent Networking for the Metaverse 231 Dileep Kumar Murala, Pradosh Kumar Gantayat, Sandeep Kumar Panda and K. Vara Prasada Rao 11.1 Introduction 232 11.2 Blockchain for the Metaverse 233 11.3 Review of Existing Literature 240 11.4 Smart Network Architecture Using Blockchain 245 11.5 Blockchain Meets Intelligent Networking in the Metaverse 251 11.6 Challenges and Future Scope 256 11.7 Conclusion 258 References 259 12 Role of AI in Digital Immune Systems 269 Sanjay Fuloria 12.1 Introduction 270 12.2 Origin of Digital Immune Systems 271 12.3 Underlying Principles of Digital Immune Systems 272 12.4 Artificial Intelligence’s Expanding Role in Cybersecurity 273 12.5 Key Machine Learning Approaches in Digital Immune Systems 275 12.6 Deep Learning and Advanced Threat Identification 276 12.7 Artificial Immune Systems and Intrusion Detection 277 12.8 Real-Time Threat Intelligence and Automated Orchestration 278 12.9 Practical Examples and Case Studies 279 12.10 Core Implementation Challenges 280 12.11 Regulatory Constraints 281 12.12 Emerging Horizons and Research Directions 282 12.13 Federated Learning and Edge-Based AI 282 12.14 Harmonizing Automated Systems and Human Expertise 283 References 286 13 AI-Powered Cybersecurity for Next-Generation Threats 289 Suryadeep Kumar Mahto, Bharat Singh, Nidhi Kushwaha and Rajiv Kumar 13.1 Introduction 290 13.2 Overview of Digital Immune Systems 290 13.3 Key Machine Learning Algorithms for Digital Immunity 294 13.4 Key Artificial Intelligence-Driven Capabilities in Digital Immune Systems 296 13.5 Case Studies: Machine Learning-Powered Intrusion Detection Systems 300 13.6 Conclusion 302 References 302 14 Building Adaptive Digital Immune Systems: A Framework for Large‐Scale Organizational Resilience 305 Shikha Gupta, Rajeev Kumar Ray, Amit Singh and Anuj Pal Kapoor 14.1 Introduction 306 14.2 Framework to Outcomes: Measuring Digital Immune Systems Effectiveness 307 14.3 Dimensions of Scalability in Digital Immune Systems 309 14.4 Architectural Principles for Scalable Digital Immune Systems 310 14.5 Data Governance and Analytics at Scale 312 14.6 Organizational Structures and Governance for Scaled Digital Immune Systems 314 14.7 Implementation Strategies for Enterprise-Scale Digital Immune Systems 316 14.8 Adapting Digital Immune Systems to Future Challenges and Technological Shifts 318 14.9 Conclusion 319 References 320 15 Blockchain-Based Drug Authentication: Leveraging zk-SNARKs and IPFS for Enhanced Security 323 R. M. Sabriesh Ram Kumar, L.R.S. Harjith, Binil Rohaan, Raghul Gandhi and Pooja Mishra 15.1 Introduction 324 15.2 Understanding Blockchain 325 15.3 Security in Digital Systems 327 15.4 Data Security in Blockchain 327 15.5 Introduction to Interplanetary File Systems 328 15.6 Introduction to Zero-Knowledge Succinct Non-Interactive Arguments of Knowledge 329 15.7 Need for Blockchain in Drug Traceability 331 15.8 Implementation of Blockchain-Based Drug Traceability System 332 15.9 Advantages and Challenges of Blockchain in Drug Traceability 337 15.10 Future Scope 339 References 340 16 Privacy-Preserving and Scalable Authentication Using zk-SNARK‐Based ZKP Blockchain PKI 343 Amrutanshu Panigrahi, Bibhuprasad Sahu, Abhilash Pati and Subrata Chowdhury 16.1 Introduction 344 16.2 Literature Survey 346 16.3 Background Study 350 16.4 Proposed Methodology 356 16.5 Workflow of the Proposed Public Key Infrastructure 359 16.6 Result and Analysis 362 16.7 Conclusion 365 References 366 Index 369

Reviews

Author Information

Sujata Priyambada Dash, PhD is an Assistant Professor in the Department of Management at the Birla Institute of Technology, Mesra, Ranchi, Jharkhand, India. She has published one edited book, several book chapters, and numerous articles in international journals and conferences. Vaibhav Mishra, PhD is an Associate Professor at the ICFAI Business School Hyderabad, Telangana, India. He has published research articles in international journals of repute and edited books on blockchain, AI, and machine learning. Bijeta Shaw, PhD is an Assistant Professor in the Operations and IT Department at ICFAI Business School Hyderabad, Telangana, India. She has authored numerous research articles in international journals and coordinated conferences. Sandeep Kumar Panda, PhD is a Professor and the Associate Dean in the School of Science and Technology at the ICFAI Foundation for Higher Education Hyderabad, Telangana, India. He has published six edited books, several book chapters, and more than 80 articles in international journals and conferences. S. Balamurugan, PhD is the Director of Research and Development at Intelligent Research Consultancy Services. He has published about 50 books, more than 300 articles in international journals and conferences, and 55 patents.

Tab Content 6

Author Website:  

Countries Available

All regions
Latest Reading Guide

NOV RG 20252

 

Shopping Cart
Your cart is empty
Shopping cart
Mailing List