Artificial Intelligence for Security (Record no. 88426)
[ view plain ]
000 -LEADER | |
---|---|
fixed length control field | 05222nam a22005775i 4500 |
001 - CONTROL NUMBER | |
control field | 978-3-031-57452-8 |
005 - DATE AND TIME OF LATEST TRANSACTION | |
control field | 20240730172615.0 |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION | |
fixed length control field | 240629s2024 sz | s |||| 0|eng d |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
ISBN | 9783031574528 |
-- | 978-3-031-57452-8 |
082 04 - CLASSIFICATION NUMBER | |
Call Number | 005.8 |
082 04 - CLASSIFICATION NUMBER | |
Call Number | 323.448 |
245 10 - TITLE STATEMENT | |
Title | Artificial Intelligence for Security |
Sub Title | Enhancing Protection in a Changing World / |
250 ## - EDITION STATEMENT | |
Edition statement | 1st ed. 2024. |
300 ## - PHYSICAL DESCRIPTION | |
Number of Pages | XVIII, 366 p. 83 illus., 51 illus. in color. |
505 0# - FORMATTED CONTENTS NOTE | |
Remark 2 | Part I Methodological Fundamentals of Artificial Intelligence -- Chapter.1.Safeguarding the Future of Artificial Intelligence: An AI Blueprint -- Chapter.2.Cybersecurity and the AI Silver Bullet.-Chapter.3.Artificial Intelligence and Differential Privacy - Review of Protection Estimate Models -- Chapter.4.To Know What You Do Not Know: Challenges for Explainable AI for Security and Threat Intelligence -- Chapter.5.Securing the Future: The Role of Knowledge Discovery Frameworks -- Chapter.6.Who Guards the Guardians? On Robustness of Deep Neural Networks.-Part II Artificial Intelligence for Critical Infrastructure Protection -- Chapter.7.Opportunities and Challenges of Using Artificial Intelligence in Securing Cyber-Physical System -- Chapter.8.Artificial Intelligence Working to Secure Small Enterprises -- Chapter.9.On the Cyber Security of Logistics in the Age of Artificial Intelligence.-Chapter.10.Fuzzy Machine Learning for Smart Grid Instability Detection -- Chapter.11.On Protection of the Next-Generation Mobile Networks against Adversarial Examples -- Chapter.12.Designing and Implementing an Interactive Cloud Platform for Teaching Machine Learning with Medical Data -- Part III Artificial Intelligence for Anomaly Detection -- Chapter.13.Machine Learning and Anomaly Detection for an Automated Monitoring of Log Data -- Chapter.14.Detecting Web Application DAST Attacks in Large-scale Event.-Chapter15.Enhancing IoT Intrusion Detection Using Hybrid DAIDS-RNN Mode. |
520 ## - SUMMARY, ETC. | |
Summary, etc | This book discusses the use of artificial intelligence (AI) for security purposes. It is divided into three parts: methodological fundamentals of AI, use of AI for critical infrastructure protection and anomaly detection. The first section describes the latest knowledge for creating safe AIs and using them to enhance protection. This book also presents various domains and examples of AI-driven security. The chapters describe potential methods, demonstrate use cases and discuss the challenges of the evolving field. This includes topics such as defensive use of AI to detect threats. It discusses the offensive use of AI to better understand the future threat landscape, the use of AI for automation in critical infrastructure and overall challenges of AI usage for critical tasks. As new threats emerge, the use of AI technologies to protect the world one lives in is topical. New technologies in this space have advanced rapidly, and subsequently, their use in enhancing protection is an evident development. To this effect, this book brings together a group of international researchers and professionals who present their views on how to create security through AI. This book targets postgraduate students, researchers and professionals who want to understand the use of AI for security. Understanding latest advancements in this field will also be useful to those who want to comprehend modern cybersecurity in detail and who want to follow research and latest trends. . |
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
General subdivision | Law and legislation. |
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
General subdivision | Security measures. |
700 1# - AUTHOR 2 | |
Author 2 | Sipola, Tuomo. |
700 1# - AUTHOR 2 | |
Author 2 | Alatalo, Janne. |
700 1# - AUTHOR 2 | |
Author 2 | Wolfmayr, Monika. |
700 1# - AUTHOR 2 | |
Author 2 | Kokkonen, Tero. |
856 40 - ELECTRONIC LOCATION AND ACCESS | |
Uniform Resource Identifier | https://doi.org/10.1007/978-3-031-57452-8 |
942 ## - ADDED ENTRY ELEMENTS (KOHA) | |
Koha item type | eBooks |
264 #1 - | |
-- | Cham : |
-- | Springer Nature Switzerland : |
-- | Imprint: Springer, |
-- | 2024. |
336 ## - | |
-- | text |
-- | txt |
-- | rdacontent |
337 ## - | |
-- | computer |
-- | c |
-- | rdamedia |
338 ## - | |
-- | online resource |
-- | cr |
-- | rdacarrier |
347 ## - | |
-- | text file |
-- | |
-- | rda |
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Data protection |
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Artificial intelligence. |
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Computer networks |
650 14 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Privacy. |
650 24 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Artificial Intelligence. |
650 24 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Mobile and Network Security. |
912 ## - | |
-- | ZDB-2-SCS |
912 ## - | |
-- | ZDB-2-SXCS |
No items available.