000 | 04924nam a22005175i 4500 | ||
---|---|---|---|
001 | 978-3-031-54497-2 | ||
003 | DE-He213 | ||
005 | 20240730171949.0 | ||
007 | cr nn 008mamaa | ||
008 | 240428s2024 sz | s |||| 0|eng d | ||
020 |
_a9783031544972 _9978-3-031-54497-2 |
||
024 | 7 |
_a10.1007/978-3-031-54497-2 _2doi |
|
050 | 4 | _aTK5105.59 | |
072 | 7 |
_aUTN _2bicssc |
|
072 | 7 |
_aCOM043050 _2bisacsh |
|
072 | 7 |
_aUTN _2thema |
|
082 | 0 | 4 |
_a005.8 _223 |
100 | 1 |
_aSarker, Iqbal H. _eauthor. _4aut _4http://id.loc.gov/vocabulary/relators/aut _9101132 |
|
245 | 1 | 0 |
_aAI-Driven Cybersecurity and Threat Intelligence _h[electronic resource] : _bCyber Automation, Intelligent Decision-Making and Explainability / _cby Iqbal H. Sarker. |
250 | _a1st ed. 2024. | ||
264 | 1 |
_aCham : _bSpringer Nature Switzerland : _bImprint: Springer, _c2024. |
|
300 |
_aXVII, 200 p. 43 illus., 29 illus. in color. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
505 | 0 | _aPart I Preliminaries -- 1. Introduction to AI-Driven Cybersecurity and Threat Intelligence -- 2. Cybersecurity Background Knowledge: Terminologies, Attack Frameworks and Security Life Cycle -- Part II AI/XAI Methods and Emerging Technologies -- 3. Learning Technologies: Towards Machine Learning and Deep Learning for Cybersecurity -- 4. Detecting Anomalies and Multi-Attacks through Cyber Learning: An Experimental Analysis -- 5. Generative AI for Cybersecurity -- 6. Cybersecurity Data Science: Towards Advanced Analytics, Knowledge and Rule Discovery for Explainable AI Modeling -- Part III Real-World Application Areas with Research Issues -- 7. AI-Enabled Cybersecurity for IoT and Smart City Applications -- 8. AI for Enhancing ICS/OT Cybersecurity -- 9. AI for Critical Infrastructure Protection and Resilience -- 10. CyberAI: A Comprehensive Summary of AI Variants, Explainable and Responsible AI for Cybersecurity. | |
520 | _aThis book explores the dynamics of how AI (Artificial Intelligence) technology intersects with cybersecurity challenges and threat intelligence as they evolve. Integrating AI into cybersecurity not only offers enhanced defense mechanisms, but this book introduces a paradigm shift illustrating how one conceptualize, detect and mitigate cyber threats. An in-depth exploration of AI-driven solutions is presented, including machine learning algorithms, data science modeling, generative AI modeling, threat intelligence frameworks and Explainable AI (XAI) models. As a roadmap or comprehensive guide to leveraging AI/XAI to defend digital ecosystems against evolving cyber threats, this book provides insights, modeling, real-world applications and research issues. Throughout this journey, the authors discover innovation, challenges, and opportunities. It provides a holistic perspective on the transformative role of AI in securing the digital world. Overall, the use of AI can transform the way one detects, responds and defends against threats, by enabling proactive threat detection, rapid response and adaptive defense mechanisms. AI-driven cybersecurity systems excel at analyzing vast datasets rapidly, identifying patterns that indicate malicious activities, detecting threats in real time as well as conducting predictive analytics for proactive solution. Moreover, AI enhances the ability to detect anomalies, predict potential threats, and respond swiftly, preventing risks from escalated. As cyber threats become increasingly diverse and relentless, incorporating AI/XAI into cybersecurity is not just a choice, but a necessity for improving resilience and staying ahead of ever-changing threats. This book targets advanced-level students in computer science as a secondary textbook. Researchers and industry professionals working in various areas, such as Cyber AI, Explainable and Responsible AI, Human-AI Collaboration, Automation and Intelligent Systems, Adaptive and Robust Security Systems, Cybersecurity Data Science and Data-Driven Decision Making will also find this book useful as reference book. | ||
650 | 0 |
_aComputer networks _xSecurity measures. _93969 |
|
650 | 0 |
_aArtificial intelligence. _93407 |
|
650 | 0 |
_aMachine learning. _91831 |
|
650 | 1 | 4 |
_aMobile and Network Security. _933624 |
650 | 2 | 4 |
_aArtificial Intelligence. _93407 |
650 | 2 | 4 |
_aMachine Learning. _91831 |
710 | 2 |
_aSpringerLink (Online service) _9101137 |
|
773 | 0 | _tSpringer Nature eBook | |
776 | 0 | 8 |
_iPrinted edition: _z9783031544965 |
776 | 0 | 8 |
_iPrinted edition: _z9783031544989 |
776 | 0 | 8 |
_iPrinted edition: _z9783031544996 |
856 | 4 | 0 | _uhttps://doi.org/10.1007/978-3-031-54497-2 |
912 | _aZDB-2-SCS | ||
912 | _aZDB-2-SXCS | ||
942 | _cEBK | ||
999 |
_c87921 _d87921 |