Artificial Intelligence for Security (Record no. 88426)

000 -LEADER
fixed length control field 05222nam a22005775i 4500
001 - CONTROL NUMBER
control field 978-3-031-57452-8
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20240730172615.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 240629s2024 sz | s |||| 0|eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
ISBN 9783031574528
-- 978-3-031-57452-8
082 04 - CLASSIFICATION NUMBER
Call Number 005.8
082 04 - CLASSIFICATION NUMBER
Call Number 323.448
245 10 - TITLE STATEMENT
Title Artificial Intelligence for Security
Sub Title Enhancing Protection in a Changing World /
250 ## - EDITION STATEMENT
Edition statement 1st ed. 2024.
300 ## - PHYSICAL DESCRIPTION
Number of Pages XVIII, 366 p. 83 illus., 51 illus. in color.
505 0# - FORMATTED CONTENTS NOTE
Remark 2 Part I Methodological Fundamentals of Artificial Intelligence -- Chapter.1.Safeguarding the Future of Artificial Intelligence: An AI Blueprint -- Chapter.2.Cybersecurity and the AI Silver Bullet.-Chapter.3.Artificial Intelligence and Differential Privacy - Review of Protection Estimate Models -- Chapter.4.To Know What You Do Not Know: Challenges for Explainable AI for Security and Threat Intelligence -- Chapter.5.Securing the Future: The Role of Knowledge Discovery Frameworks -- Chapter.6.Who Guards the Guardians? On Robustness of Deep Neural Networks.-Part II Artificial Intelligence for Critical Infrastructure Protection -- Chapter.7.Opportunities and Challenges of Using Artificial Intelligence in Securing Cyber-Physical System -- Chapter.8.Artificial Intelligence Working to Secure Small Enterprises -- Chapter.9.On the Cyber Security of Logistics in the Age of Artificial Intelligence.-Chapter.10.Fuzzy Machine Learning for Smart Grid Instability Detection -- Chapter.11.On Protection of the Next-Generation Mobile Networks against Adversarial Examples -- Chapter.12.Designing and Implementing an Interactive Cloud Platform for Teaching Machine Learning with Medical Data -- Part III Artificial Intelligence for Anomaly Detection -- Chapter.13.Machine Learning and Anomaly Detection for an Automated Monitoring of Log Data -- Chapter.14.Detecting Web Application DAST Attacks in Large-scale Event.-Chapter15.Enhancing IoT Intrusion Detection Using Hybrid DAIDS-RNN Mode.
520 ## - SUMMARY, ETC.
Summary, etc This book discusses the use of artificial intelligence (AI) for security purposes. It is divided into three parts: methodological fundamentals of AI, use of AI for critical infrastructure protection and anomaly detection. The first section describes the latest knowledge for creating safe AIs and using them to enhance protection. This book also presents various domains and examples of AI-driven security. The chapters describe potential methods, demonstrate use cases and discuss the challenges of the evolving field. This includes topics such as defensive use of AI to detect threats. It discusses the offensive use of AI to better understand the future threat landscape, the use of AI for automation in critical infrastructure and overall challenges of AI usage for critical tasks. As new threats emerge, the use of AI technologies to protect the world one lives in is topical. New technologies in this space have advanced rapidly, and subsequently, their use in enhancing protection is an evident development. To this effect, this book brings together a group of international researchers and professionals who present their views on how to create security through AI. This book targets postgraduate students, researchers and professionals who want to understand the use of AI for security. Understanding latest advancements in this field will also be useful to those who want to comprehend modern cybersecurity in detail and who want to follow research and latest trends. .
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1
General subdivision Law and legislation.
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1
General subdivision Security measures.
700 1# - AUTHOR 2
Author 2 Sipola, Tuomo.
700 1# - AUTHOR 2
Author 2 Alatalo, Janne.
700 1# - AUTHOR 2
Author 2 Wolfmayr, Monika.
700 1# - AUTHOR 2
Author 2 Kokkonen, Tero.
856 40 - ELECTRONIC LOCATION AND ACCESS
Uniform Resource Identifier https://doi.org/10.1007/978-3-031-57452-8
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Koha item type eBooks
264 #1 -
-- Cham :
-- Springer Nature Switzerland :
-- Imprint: Springer,
-- 2024.
336 ## -
-- text
-- txt
-- rdacontent
337 ## -
-- computer
-- c
-- rdamedia
338 ## -
-- online resource
-- cr
-- rdacarrier
347 ## -
-- text file
-- PDF
-- rda
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Data protection
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Artificial intelligence.
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Computer networks
650 14 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Privacy.
650 24 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Artificial Intelligence.
650 24 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Mobile and Network Security.
912 ## -
-- ZDB-2-SCS
912 ## -
-- ZDB-2-SXCS

No items available.