語系:
繁體中文
English
說明(常見問題)
回圖書館首頁
手機版館藏查詢
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Demystifying AI and ML for cyber-thr...
~
Yang, Ming.
FindBook
Google Book
Amazon
博客來
Demystifying AI and ML for cyber-threat intelligence
紀錄類型:
書目-電子資源 : Monograph/item
正題名/作者:
Demystifying AI and ML for cyber-threat intelligence/ edited by Ming Yang ... [et al.].
其他作者:
Yang, Ming.
出版者:
Cham :Springer Nature Switzerland : : 2025.,
面頁冊數:
xi, 628 p. :ill. (some col.), digital ;24 cm.
內容註:
A Comprehensive Review on the Detection Capabilities of IDS using Deep Learning Techniques -- Next-Generation Intrusion Detection Framework with Active Learning-Driven Neural Networks for DDoS Defense -- Ensemble Learning-based Intrusion Detection System for RPL-based IoT Networks -- Advancing Detection of Man-in-the-Middle Attacks through Possibilistic C-Means Clustering -- CNN-Based IDS for Internet of Vehicles Using Transfer Learning -- Real-Time Network Intrusion Detection System using Machine Learning -- OpIDS-DL : OPTIMIZING INTRUSION DETECTION IN IoT NETWORKS: A DEEP LEARNING APPROACH WITH REGULARIZATION AND DROPOUT FOR ENHANCED CYBERSECURITY -- ML-Powered Sensitive Data Loss Prevention Firewall for Generative AI Applications -- Enhancing Data Integrity: Unveiling the Potential of Reversible Logic for Error Detection and Correction -- Enhancing Cyber security through Reversible Logic -- Beyond Passwords: Enhancing Security with Continuous Behavioral Biometrics and Passive Authentication.
Contained By:
Springer Nature eBook
標題:
Artificial intelligence - Security measures. -
電子資源:
https://doi.org/10.1007/978-3-031-90723-4
ISBN:
9783031907234
Demystifying AI and ML for cyber-threat intelligence
Demystifying AI and ML for cyber-threat intelligence
[electronic resource] /edited by Ming Yang ... [et al.]. - Cham :Springer Nature Switzerland :2025. - xi, 628 p. :ill. (some col.), digital ;24 cm. - Information systems engineering and management,v. 433004-9598 ;. - Information systems engineering and management ;v. 43..
A Comprehensive Review on the Detection Capabilities of IDS using Deep Learning Techniques -- Next-Generation Intrusion Detection Framework with Active Learning-Driven Neural Networks for DDoS Defense -- Ensemble Learning-based Intrusion Detection System for RPL-based IoT Networks -- Advancing Detection of Man-in-the-Middle Attacks through Possibilistic C-Means Clustering -- CNN-Based IDS for Internet of Vehicles Using Transfer Learning -- Real-Time Network Intrusion Detection System using Machine Learning -- OpIDS-DL : OPTIMIZING INTRUSION DETECTION IN IoT NETWORKS: A DEEP LEARNING APPROACH WITH REGULARIZATION AND DROPOUT FOR ENHANCED CYBERSECURITY -- ML-Powered Sensitive Data Loss Prevention Firewall for Generative AI Applications -- Enhancing Data Integrity: Unveiling the Potential of Reversible Logic for Error Detection and Correction -- Enhancing Cyber security through Reversible Logic -- Beyond Passwords: Enhancing Security with Continuous Behavioral Biometrics and Passive Authentication.
This book simplifies complex AI and ML concepts, making them accessible to security analysts, IT professionals, researchers, and decision-makers. Cyber threats have become increasingly sophisticated in the ever-evolving digital landscape, making traditional security measures insufficient to combat modern attacks. Artificial intelligence (AI) and machine learning (ML) have emerged as transformative tools in cybersecurity, enabling organizations to detect, prevent, and respond to threats with greater efficiency. This book is a comprehensive guide, bridging the gap between cybersecurity and AI/ML by offering clear, practical insights into their role in threat intelligence. Readers will gain a solid foundation in key AI and ML principles, including supervised and unsupervised learning, deep learning, and natural language processing (NLP) while exploring real-world applications such as intrusion detection, malware analysis, and fraud prevention. Through hands-on insights, case studies, and implementation strategies, it provides actionable knowledge for integrating AI-driven threat intelligence into security operations. Additionally, it examines emerging trends, ethical considerations, and the evolving role of AI in cybersecurity. Unlike overly technical manuals, this book balances theoretical concepts with practical applications, breaking down complex algorithms into actionable insights. Whether a seasoned professional or a beginner, readers will find this book an essential roadmap to navigating the future of cybersecurity in an AI-driven world. This book empowers its audience to stay ahead of cyber adversaries and embrace the next generation of intelligent threat detection.
ISBN: 9783031907234
Standard No.: 10.1007/978-3-031-90723-4doiSubjects--Topical Terms:
3595924
Artificial intelligence
--Security measures.
LC Class. No.: TA347.A78
Dewey Class. No.: 006.3
Demystifying AI and ML for cyber-threat intelligence
LDR
:03800nmm a2200337 a 4500
001
2414288
003
DE-He213
005
20250816130156.0
006
m d
007
cr nn 008maaau
008
260205s2025 sz s 0 eng d
020
$a
9783031907234
$q
(electronic bk.)
020
$a
9783031907227
$q
(paper)
024
7
$a
10.1007/978-3-031-90723-4
$2
doi
035
$a
978-3-031-90723-4
040
$a
GP
$c
GP
041
0
$a
eng
050
4
$a
TA347.A78
072
7
$a
UYQ
$2
bicssc
072
7
$a
COM004000
$2
bisacsh
072
7
$a
UYQ
$2
thema
082
0 4
$a
006.3
$2
23
090
$a
TA347.A78
$b
D389 2025
245
0 0
$a
Demystifying AI and ML for cyber-threat intelligence
$h
[electronic resource] /
$c
edited by Ming Yang ... [et al.].
260
$a
Cham :
$b
Springer Nature Switzerland :
$b
Imprint: Springer,
$c
2025.
300
$a
xi, 628 p. :
$b
ill. (some col.), digital ;
$c
24 cm.
490
1
$a
Information systems engineering and management,
$x
3004-9598 ;
$v
v. 43
505
0
$a
A Comprehensive Review on the Detection Capabilities of IDS using Deep Learning Techniques -- Next-Generation Intrusion Detection Framework with Active Learning-Driven Neural Networks for DDoS Defense -- Ensemble Learning-based Intrusion Detection System for RPL-based IoT Networks -- Advancing Detection of Man-in-the-Middle Attacks through Possibilistic C-Means Clustering -- CNN-Based IDS for Internet of Vehicles Using Transfer Learning -- Real-Time Network Intrusion Detection System using Machine Learning -- OpIDS-DL : OPTIMIZING INTRUSION DETECTION IN IoT NETWORKS: A DEEP LEARNING APPROACH WITH REGULARIZATION AND DROPOUT FOR ENHANCED CYBERSECURITY -- ML-Powered Sensitive Data Loss Prevention Firewall for Generative AI Applications -- Enhancing Data Integrity: Unveiling the Potential of Reversible Logic for Error Detection and Correction -- Enhancing Cyber security through Reversible Logic -- Beyond Passwords: Enhancing Security with Continuous Behavioral Biometrics and Passive Authentication.
520
$a
This book simplifies complex AI and ML concepts, making them accessible to security analysts, IT professionals, researchers, and decision-makers. Cyber threats have become increasingly sophisticated in the ever-evolving digital landscape, making traditional security measures insufficient to combat modern attacks. Artificial intelligence (AI) and machine learning (ML) have emerged as transformative tools in cybersecurity, enabling organizations to detect, prevent, and respond to threats with greater efficiency. This book is a comprehensive guide, bridging the gap between cybersecurity and AI/ML by offering clear, practical insights into their role in threat intelligence. Readers will gain a solid foundation in key AI and ML principles, including supervised and unsupervised learning, deep learning, and natural language processing (NLP) while exploring real-world applications such as intrusion detection, malware analysis, and fraud prevention. Through hands-on insights, case studies, and implementation strategies, it provides actionable knowledge for integrating AI-driven threat intelligence into security operations. Additionally, it examines emerging trends, ethical considerations, and the evolving role of AI in cybersecurity. Unlike overly technical manuals, this book balances theoretical concepts with practical applications, breaking down complex algorithms into actionable insights. Whether a seasoned professional or a beginner, readers will find this book an essential roadmap to navigating the future of cybersecurity in an AI-driven world. This book empowers its audience to stay ahead of cyber adversaries and embrace the next generation of intelligent threat detection.
650
0
$a
Artificial intelligence
$x
Security measures.
$3
3595924
650
1 4
$a
Computational Intelligence.
$3
1001631
650
2 4
$a
Data and Information Security.
$3
3538510
650
2 4
$a
Data Engineering.
$3
3409361
650
2 4
$a
Artificial Intelligence.
$3
769149
700
1
$a
Yang, Ming.
$3
1030658
710
2
$a
SpringerLink (Online service)
$3
836513
773
0
$t
Springer Nature eBook
830
0
$a
Information systems engineering and management ;
$v
v. 43.
$3
3790896
856
4 0
$u
https://doi.org/10.1007/978-3-031-90723-4
950
$a
Intelligent Technologies and Robotics (SpringerNature-42732)
筆 0 讀者評論
館藏地:
全部
電子資源
出版年:
卷號:
館藏
1 筆 • 頁數 1 •
1
條碼號
典藏地名稱
館藏流通類別
資料類型
索書號
使用類型
借閱狀態
預約狀態
備註欄
附件
W9519743
電子資源
11.線上閱覽_V
電子書
EB TA347.A78
一般使用(Normal)
在架
0
1 筆 • 頁數 1 •
1
多媒體
評論
新增評論
分享你的心得
Export
取書館
處理中
...
變更密碼
登入