Language:
English
繁體中文
Help
回圖書館首頁
手機版館藏查詢
Login
Back
Switch To:
Labeled
|
MARC Mode
|
ISBD
Artificial intelligence and cybersec...
~
Kokkonen, Tero.
Linked to FindBook
Google Book
Amazon
博客來
Artificial intelligence and cybersecurity = theory and applications /
Record Type:
Electronic resources : Monograph/item
Title/Author:
Artificial intelligence and cybersecurity/ edited by Tuomo Sipola, Tero Kokkonen, Mika Karjalainen.
Reminder of title:
theory and applications /
other author:
Kokkonen, Tero.
Published:
Cham :Springer International Publishing : : 2023.,
Description:
x, 301 p. :ill. (some col.), digital ;24 cm.
[NT 15003449]:
Part I Cybersecurity Concerns -- Use of Artificial Intelligence in a Cybersecurity Environment -- Petri Vähäkainu and Martti Lehto -- A Review of Cyber Threat (Artificial) Intelligence in Security -- Management -- Martin Lundgren and Ali Padyab -- Model Based Resilience Engineering for Design and Assessment of -- Mission Critical Systems Containing AI Components -- Automation of CybersecurityWork -- Artificial Intelligence for Cybersecurity Education and Training -- Offensive Machine Learning Methods and the Cyber Kill Chain -- Defensive Machine Learning Methods and the Cyber Defence Chain -- Part II Privacy and Ethics -- Differential Privacy: An Umbrella Review -- AI in Cyber Operations: Ethical and Legal Considerations for End-Users -- Part III Applications -- Android Malware Detection Using Deep Learning -- Artificial Intelligence Enabled Radio Signal Intelligence -- Deep Learning Quantile Regression for Robustness, Confidence and -- Planning -- Model Fooling Threats Against Medical Imaging.
Contained By:
Springer Nature eBook
Subject:
Artificial intelligence - Industrial applications. -
Online resource:
https://doi.org/10.1007/978-3-031-15030-2
ISBN:
9783031150302
Artificial intelligence and cybersecurity = theory and applications /
Artificial intelligence and cybersecurity
theory and applications /[electronic resource] :edited by Tuomo Sipola, Tero Kokkonen, Mika Karjalainen. - Cham :Springer International Publishing :2023. - x, 301 p. :ill. (some col.), digital ;24 cm.
Part I Cybersecurity Concerns -- Use of Artificial Intelligence in a Cybersecurity Environment -- Petri Vähäkainu and Martti Lehto -- A Review of Cyber Threat (Artificial) Intelligence in Security -- Management -- Martin Lundgren and Ali Padyab -- Model Based Resilience Engineering for Design and Assessment of -- Mission Critical Systems Containing AI Components -- Automation of CybersecurityWork -- Artificial Intelligence for Cybersecurity Education and Training -- Offensive Machine Learning Methods and the Cyber Kill Chain -- Defensive Machine Learning Methods and the Cyber Defence Chain -- Part II Privacy and Ethics -- Differential Privacy: An Umbrella Review -- AI in Cyber Operations: Ethical and Legal Considerations for End-Users -- Part III Applications -- Android Malware Detection Using Deep Learning -- Artificial Intelligence Enabled Radio Signal Intelligence -- Deep Learning Quantile Regression for Robustness, Confidence and -- Planning -- Model Fooling Threats Against Medical Imaging.
This book discusses artificial intelligence (AI) and cybersecurity from multiple points of view. The diverse chapters reveal modern trends and challenges related to the use of artificial intelligence when considering privacy, cyber-attacks and defense as well as applications from malware detection to radio signal intelligence. The chapters are contributed by an international team of renown researchers and professionals in the field of AI and cybersecurity. During the last few decades the rise of modern AI solutions that surpass humans in specific tasks has occurred. Moreover, these new technologies provide new methods of automating cybersecurity tasks. In addition to the privacy, ethics and cybersecurity concerns, the readers learn several new cutting edge applications of AI technologies. Researchers working in AI and cybersecurity as well as advanced level students studying computer science and electrical engineering with a focus on AI and Cybersecurity will find this book useful as a reference. Professionals working within these related fields will also want to purchase this book as a reference.
ISBN: 9783031150302
Standard No.: 10.1007/978-3-031-15030-2doiSubjects--Topical Terms:
653318
Artificial intelligence
--Industrial applications.
LC Class. No.: TA347.A78 / A77 2023
Dewey Class. No.: 006.3
Artificial intelligence and cybersecurity = theory and applications /
LDR
:03163nmm a2200325 a 4500
001
2314159
003
DE-He213
005
20221207104914.0
006
m d
007
cr nn 008mamaa
008
230902s2023 sz s 0 eng d
020
$a
9783031150302
$q
(electronic bk.)
020
$a
9783031150296
$q
(paper)
024
7
$a
10.1007/978-3-031-15030-2
$2
doi
035
$a
978-3-031-15030-2
040
$a
GP
$c
GP
041
0
$a
eng
050
4
$a
TA347.A78
$b
A77 2023
072
7
$a
UYQ
$2
bicssc
072
7
$a
COM004000
$2
bisacsh
072
7
$a
UYQ
$2
thema
082
0 4
$a
006.3
$2
23
090
$a
TA347.A78
$b
A791 2023
245
0 0
$a
Artificial intelligence and cybersecurity
$h
[electronic resource] :
$b
theory and applications /
$c
edited by Tuomo Sipola, Tero Kokkonen, Mika Karjalainen.
260
$a
Cham :
$b
Springer International Publishing :
$b
Imprint: Springer,
$c
2023.
300
$a
x, 301 p. :
$b
ill. (some col.), digital ;
$c
24 cm.
505
0
$a
Part I Cybersecurity Concerns -- Use of Artificial Intelligence in a Cybersecurity Environment -- Petri Vähäkainu and Martti Lehto -- A Review of Cyber Threat (Artificial) Intelligence in Security -- Management -- Martin Lundgren and Ali Padyab -- Model Based Resilience Engineering for Design and Assessment of -- Mission Critical Systems Containing AI Components -- Automation of CybersecurityWork -- Artificial Intelligence for Cybersecurity Education and Training -- Offensive Machine Learning Methods and the Cyber Kill Chain -- Defensive Machine Learning Methods and the Cyber Defence Chain -- Part II Privacy and Ethics -- Differential Privacy: An Umbrella Review -- AI in Cyber Operations: Ethical and Legal Considerations for End-Users -- Part III Applications -- Android Malware Detection Using Deep Learning -- Artificial Intelligence Enabled Radio Signal Intelligence -- Deep Learning Quantile Regression for Robustness, Confidence and -- Planning -- Model Fooling Threats Against Medical Imaging.
520
$a
This book discusses artificial intelligence (AI) and cybersecurity from multiple points of view. The diverse chapters reveal modern trends and challenges related to the use of artificial intelligence when considering privacy, cyber-attacks and defense as well as applications from malware detection to radio signal intelligence. The chapters are contributed by an international team of renown researchers and professionals in the field of AI and cybersecurity. During the last few decades the rise of modern AI solutions that surpass humans in specific tasks has occurred. Moreover, these new technologies provide new methods of automating cybersecurity tasks. In addition to the privacy, ethics and cybersecurity concerns, the readers learn several new cutting edge applications of AI technologies. Researchers working in AI and cybersecurity as well as advanced level students studying computer science and electrical engineering with a focus on AI and Cybersecurity will find this book useful as a reference. Professionals working within these related fields will also want to purchase this book as a reference.
650
0
$a
Artificial intelligence
$x
Industrial applications.
$3
653318
650
0
$a
Computer security.
$3
540555
650
1 4
$a
Artificial Intelligence.
$3
769149
650
2 4
$a
Privacy.
$3
528582
650
2 4
$a
Cryptology.
$3
3382308
650
2 4
$a
Mobile and Network Security.
$3
3382377
700
1
$a
Kokkonen, Tero.
$3
3625357
700
1
$a
Karjalainen, Mika.
$3
3625358
700
1
$a
Sipola, Tuomo.
$3
3625356
710
2
$a
SpringerLink (Online service)
$3
836513
773
0
$t
Springer Nature eBook
856
4 0
$u
https://doi.org/10.1007/978-3-031-15030-2
950
$a
Computer Science (SpringerNature-11645)
based on 0 review(s)
Location:
ALL
電子資源
Year:
Volume Number:
Items
1 records • Pages 1 •
1
Inventory Number
Location Name
Item Class
Material type
Call number
Usage Class
Loan Status
No. of reservations
Opac note
Attachments
W9450409
電子資源
11.線上閱覽_V
電子書
EB TA347.A78 A77 2023
一般使用(Normal)
On shelf
0
1 records • Pages 1 •
1
Multimedia
Reviews
Add a review
and share your thoughts with other readers
Export
pickup library
Processing
...
Change password
Login