語系:
繁體中文
English
說明(常見問題)
回圖書館首頁
手機版館藏查詢
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Artificial intelligence and cybersec...
~
Kokkonen, Tero.
FindBook
Google Book
Amazon
博客來
Artificial intelligence and cybersecurity = theory and applications /
紀錄類型:
書目-電子資源 : Monograph/item
正題名/作者:
Artificial intelligence and cybersecurity/ edited by Tuomo Sipola, Tero Kokkonen, Mika Karjalainen.
其他題名:
theory and applications /
其他作者:
Kokkonen, Tero.
出版者:
Cham :Springer International Publishing : : 2023.,
面頁冊數:
x, 301 p. :ill. (some col.), digital ;24 cm.
內容註:
Part I Cybersecurity Concerns -- Use of Artificial Intelligence in a Cybersecurity Environment -- Petri Vähäkainu and Martti Lehto -- A Review of Cyber Threat (Artificial) Intelligence in Security -- Management -- Martin Lundgren and Ali Padyab -- Model Based Resilience Engineering for Design and Assessment of -- Mission Critical Systems Containing AI Components -- Automation of CybersecurityWork -- Artificial Intelligence for Cybersecurity Education and Training -- Offensive Machine Learning Methods and the Cyber Kill Chain -- Defensive Machine Learning Methods and the Cyber Defence Chain -- Part II Privacy and Ethics -- Differential Privacy: An Umbrella Review -- AI in Cyber Operations: Ethical and Legal Considerations for End-Users -- Part III Applications -- Android Malware Detection Using Deep Learning -- Artificial Intelligence Enabled Radio Signal Intelligence -- Deep Learning Quantile Regression for Robustness, Confidence and -- Planning -- Model Fooling Threats Against Medical Imaging.
Contained By:
Springer Nature eBook
標題:
Artificial intelligence - Industrial applications. -
電子資源:
https://doi.org/10.1007/978-3-031-15030-2
ISBN:
9783031150302
Artificial intelligence and cybersecurity = theory and applications /
Artificial intelligence and cybersecurity
theory and applications /[electronic resource] :edited by Tuomo Sipola, Tero Kokkonen, Mika Karjalainen. - Cham :Springer International Publishing :2023. - x, 301 p. :ill. (some col.), digital ;24 cm.
Part I Cybersecurity Concerns -- Use of Artificial Intelligence in a Cybersecurity Environment -- Petri Vähäkainu and Martti Lehto -- A Review of Cyber Threat (Artificial) Intelligence in Security -- Management -- Martin Lundgren and Ali Padyab -- Model Based Resilience Engineering for Design and Assessment of -- Mission Critical Systems Containing AI Components -- Automation of CybersecurityWork -- Artificial Intelligence for Cybersecurity Education and Training -- Offensive Machine Learning Methods and the Cyber Kill Chain -- Defensive Machine Learning Methods and the Cyber Defence Chain -- Part II Privacy and Ethics -- Differential Privacy: An Umbrella Review -- AI in Cyber Operations: Ethical and Legal Considerations for End-Users -- Part III Applications -- Android Malware Detection Using Deep Learning -- Artificial Intelligence Enabled Radio Signal Intelligence -- Deep Learning Quantile Regression for Robustness, Confidence and -- Planning -- Model Fooling Threats Against Medical Imaging.
This book discusses artificial intelligence (AI) and cybersecurity from multiple points of view. The diverse chapters reveal modern trends and challenges related to the use of artificial intelligence when considering privacy, cyber-attacks and defense as well as applications from malware detection to radio signal intelligence. The chapters are contributed by an international team of renown researchers and professionals in the field of AI and cybersecurity. During the last few decades the rise of modern AI solutions that surpass humans in specific tasks has occurred. Moreover, these new technologies provide new methods of automating cybersecurity tasks. In addition to the privacy, ethics and cybersecurity concerns, the readers learn several new cutting edge applications of AI technologies. Researchers working in AI and cybersecurity as well as advanced level students studying computer science and electrical engineering with a focus on AI and Cybersecurity will find this book useful as a reference. Professionals working within these related fields will also want to purchase this book as a reference.
ISBN: 9783031150302
Standard No.: 10.1007/978-3-031-15030-2doiSubjects--Topical Terms:
653318
Artificial intelligence
--Industrial applications.
LC Class. No.: TA347.A78 / A77 2023
Dewey Class. No.: 006.3
Artificial intelligence and cybersecurity = theory and applications /
LDR
:03163nmm a2200325 a 4500
001
2314159
003
DE-He213
005
20221207104914.0
006
m d
007
cr nn 008mamaa
008
230902s2023 sz s 0 eng d
020
$a
9783031150302
$q
(electronic bk.)
020
$a
9783031150296
$q
(paper)
024
7
$a
10.1007/978-3-031-15030-2
$2
doi
035
$a
978-3-031-15030-2
040
$a
GP
$c
GP
041
0
$a
eng
050
4
$a
TA347.A78
$b
A77 2023
072
7
$a
UYQ
$2
bicssc
072
7
$a
COM004000
$2
bisacsh
072
7
$a
UYQ
$2
thema
082
0 4
$a
006.3
$2
23
090
$a
TA347.A78
$b
A791 2023
245
0 0
$a
Artificial intelligence and cybersecurity
$h
[electronic resource] :
$b
theory and applications /
$c
edited by Tuomo Sipola, Tero Kokkonen, Mika Karjalainen.
260
$a
Cham :
$b
Springer International Publishing :
$b
Imprint: Springer,
$c
2023.
300
$a
x, 301 p. :
$b
ill. (some col.), digital ;
$c
24 cm.
505
0
$a
Part I Cybersecurity Concerns -- Use of Artificial Intelligence in a Cybersecurity Environment -- Petri Vähäkainu and Martti Lehto -- A Review of Cyber Threat (Artificial) Intelligence in Security -- Management -- Martin Lundgren and Ali Padyab -- Model Based Resilience Engineering for Design and Assessment of -- Mission Critical Systems Containing AI Components -- Automation of CybersecurityWork -- Artificial Intelligence for Cybersecurity Education and Training -- Offensive Machine Learning Methods and the Cyber Kill Chain -- Defensive Machine Learning Methods and the Cyber Defence Chain -- Part II Privacy and Ethics -- Differential Privacy: An Umbrella Review -- AI in Cyber Operations: Ethical and Legal Considerations for End-Users -- Part III Applications -- Android Malware Detection Using Deep Learning -- Artificial Intelligence Enabled Radio Signal Intelligence -- Deep Learning Quantile Regression for Robustness, Confidence and -- Planning -- Model Fooling Threats Against Medical Imaging.
520
$a
This book discusses artificial intelligence (AI) and cybersecurity from multiple points of view. The diverse chapters reveal modern trends and challenges related to the use of artificial intelligence when considering privacy, cyber-attacks and defense as well as applications from malware detection to radio signal intelligence. The chapters are contributed by an international team of renown researchers and professionals in the field of AI and cybersecurity. During the last few decades the rise of modern AI solutions that surpass humans in specific tasks has occurred. Moreover, these new technologies provide new methods of automating cybersecurity tasks. In addition to the privacy, ethics and cybersecurity concerns, the readers learn several new cutting edge applications of AI technologies. Researchers working in AI and cybersecurity as well as advanced level students studying computer science and electrical engineering with a focus on AI and Cybersecurity will find this book useful as a reference. Professionals working within these related fields will also want to purchase this book as a reference.
650
0
$a
Artificial intelligence
$x
Industrial applications.
$3
653318
650
0
$a
Computer security.
$3
540555
650
1 4
$a
Artificial Intelligence.
$3
769149
650
2 4
$a
Privacy.
$3
528582
650
2 4
$a
Cryptology.
$3
3382308
650
2 4
$a
Mobile and Network Security.
$3
3382377
700
1
$a
Kokkonen, Tero.
$3
3625357
700
1
$a
Karjalainen, Mika.
$3
3625358
700
1
$a
Sipola, Tuomo.
$3
3625356
710
2
$a
SpringerLink (Online service)
$3
836513
773
0
$t
Springer Nature eBook
856
4 0
$u
https://doi.org/10.1007/978-3-031-15030-2
950
$a
Computer Science (SpringerNature-11645)
筆 0 讀者評論
館藏地:
全部
電子資源
出版年:
卷號:
館藏
1 筆 • 頁數 1 •
1
條碼號
典藏地名稱
館藏流通類別
資料類型
索書號
使用類型
借閱狀態
預約狀態
備註欄
附件
W9450409
電子資源
11.線上閱覽_V
電子書
EB TA347.A78 A77 2023
一般使用(Normal)
在架
0
1 筆 • 頁數 1 •
1
多媒體
評論
新增評論
分享你的心得
Export
取書館
處理中
...
變更密碼
登入