語系:
繁體中文
English
說明(常見問題)
回圖書館首頁
手機版館藏查詢
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Predictive data security using AI = ...
~
Thakkar, Hiren Kumar.
FindBook
Google Book
Amazon
博客來
Predictive data security using AI = insights and issues of blockchain, IoT, and DevOps /
紀錄類型:
書目-電子資源 : Monograph/item
正題名/作者:
Predictive data security using AI/ edited by Hiren Kumar Thakkar, Mayank Swarnkar, Robin Singh Bhadoria.
其他題名:
insights and issues of blockchain, IoT, and DevOps /
其他作者:
Thakkar, Hiren Kumar.
出版者:
Singapore :Springer Nature Singapore : : 2023.,
面頁冊數:
xii, 216 p. :ill., digital ;24 cm.
內容註:
Introduction to Data Security with Machine Learning: Traditional Methods vs Recent Trends -- Data Security and Predictive Informatics: Issues, Challenges, and Opportunities -- Data Security Analytics using Machine Learning: Supervised and Unsupervised Approaches -- Data Security in Data Servers: Implementation of Security in Data Servers, Content Delivery Network Servers and Proxy Servers -- Data Security in Multimedia using AI: Perspective and Practices -- Data Security in Blockchain: Data Generation, Analysis and Predictions.
Contained By:
Springer Nature eBook
標題:
Computer security. -
電子資源:
https://doi.org/10.1007/978-981-19-6290-5
ISBN:
9789811962905
Predictive data security using AI = insights and issues of blockchain, IoT, and DevOps /
Predictive data security using AI
insights and issues of blockchain, IoT, and DevOps /[electronic resource] :edited by Hiren Kumar Thakkar, Mayank Swarnkar, Robin Singh Bhadoria. - Singapore :Springer Nature Singapore :2023. - xii, 216 p. :ill., digital ;24 cm. - Studies in computational intelligence,v. 10651860-9503 ;. - Studies in computational intelligence ;v. 1065..
Introduction to Data Security with Machine Learning: Traditional Methods vs Recent Trends -- Data Security and Predictive Informatics: Issues, Challenges, and Opportunities -- Data Security Analytics using Machine Learning: Supervised and Unsupervised Approaches -- Data Security in Data Servers: Implementation of Security in Data Servers, Content Delivery Network Servers and Proxy Servers -- Data Security in Multimedia using AI: Perspective and Practices -- Data Security in Blockchain: Data Generation, Analysis and Predictions.
This contributed volume consists of 11 chapters that specifically cover the security aspects of the latest technologies such as Blockchain, IoT, and DevOps, and how to effectively deal with them using Intelligent techniques. Moreover, machine learning (ML) and deep learning (DL) algorithms are also not secured and often manipulated by attackers for data stealing. This book also discusses the types of attacks and offers novel solutions to counter the attacks on ML and DL algorithms. This book describes the concepts and issues with figures and the supporting arguments with facts and charts. In addition to that, the book provides the comparison of different security solutions in terms of experimental results with tables and charts. Besides, the book also provides the future directions for each chapter and novel alternative approaches, wherever applicable. Often the existing literature provides domain-specific knowledge such as the description of security aspects. However, the readers find it difficult to understand how to tackle the application-specific security issues. This book takes one step forward and offers the security issues, current trends, and technologies supported by alternate solutions. Moreover, the book provides thorough guidance on the applicability of ML and DL algorithms to deal with application-specific security issues followed by novel approaches to counter threats to ML and DL algorithms. The book includes contributions from academicians, researchers, security experts, security architectures, and practitioners and provides an in-depth understanding of the mentioned issues.
ISBN: 9789811962905
Standard No.: 10.1007/978-981-19-6290-5doiSubjects--Topical Terms:
540555
Computer security.
LC Class. No.: QA76.9.A25
Dewey Class. No.: 005.8
Predictive data security using AI = insights and issues of blockchain, IoT, and DevOps /
LDR
:03335nmm a2200361 a 4500
001
2314737
003
DE-He213
005
20221201124235.0
006
m d
007
cr nn 008maaau
008
230902s2023 si s 0 eng d
020
$a
9789811962905
$q
(electronic bk.)
020
$a
9789811962899
$q
(paper)
024
7
$a
10.1007/978-981-19-6290-5
$2
doi
035
$a
978-981-19-6290-5
040
$a
GP
$c
GP
$e
rda
041
0
$a
eng
050
4
$a
QA76.9.A25
072
7
$a
UR
$2
bicssc
072
7
$a
UTN
$2
bicssc
072
7
$a
COM053000
$2
bisacsh
072
7
$a
UR
$2
thema
072
7
$a
UTN
$2
thema
082
0 4
$a
005.8
$2
23
090
$a
QA76.9.A25
$b
P923 2023
245
0 0
$a
Predictive data security using AI
$h
[electronic resource] :
$b
insights and issues of blockchain, IoT, and DevOps /
$c
edited by Hiren Kumar Thakkar, Mayank Swarnkar, Robin Singh Bhadoria.
260
$a
Singapore :
$b
Springer Nature Singapore :
$b
Imprint: Springer,
$c
2023.
300
$a
xii, 216 p. :
$b
ill., digital ;
$c
24 cm.
490
1
$a
Studies in computational intelligence,
$x
1860-9503 ;
$v
v. 1065
505
0
$a
Introduction to Data Security with Machine Learning: Traditional Methods vs Recent Trends -- Data Security and Predictive Informatics: Issues, Challenges, and Opportunities -- Data Security Analytics using Machine Learning: Supervised and Unsupervised Approaches -- Data Security in Data Servers: Implementation of Security in Data Servers, Content Delivery Network Servers and Proxy Servers -- Data Security in Multimedia using AI: Perspective and Practices -- Data Security in Blockchain: Data Generation, Analysis and Predictions.
520
$a
This contributed volume consists of 11 chapters that specifically cover the security aspects of the latest technologies such as Blockchain, IoT, and DevOps, and how to effectively deal with them using Intelligent techniques. Moreover, machine learning (ML) and deep learning (DL) algorithms are also not secured and often manipulated by attackers for data stealing. This book also discusses the types of attacks and offers novel solutions to counter the attacks on ML and DL algorithms. This book describes the concepts and issues with figures and the supporting arguments with facts and charts. In addition to that, the book provides the comparison of different security solutions in terms of experimental results with tables and charts. Besides, the book also provides the future directions for each chapter and novel alternative approaches, wherever applicable. Often the existing literature provides domain-specific knowledge such as the description of security aspects. However, the readers find it difficult to understand how to tackle the application-specific security issues. This book takes one step forward and offers the security issues, current trends, and technologies supported by alternate solutions. Moreover, the book provides thorough guidance on the applicability of ML and DL algorithms to deal with application-specific security issues followed by novel approaches to counter threats to ML and DL algorithms. The book includes contributions from academicians, researchers, security experts, security architectures, and practitioners and provides an in-depth understanding of the mentioned issues.
650
0
$a
Computer security.
$3
540555
650
0
$a
Artificial intelligence
$x
Security measures.
$3
3595924
650
0
$a
Internet of things
$x
Security measures.
$3
3217048
650
1 4
$a
Data and Information Security.
$3
3538510
650
2 4
$a
Internet of Things.
$3
3538511
650
2 4
$a
Artificial Intelligence.
$3
769149
700
1
$a
Thakkar, Hiren Kumar.
$3
3625375
700
1
$a
Swarnkar, Mayank.
$3
3626420
700
1
$a
Bhadoria, Robin Singh.
$3
3626421
710
2
$a
SpringerLink (Online service)
$3
836513
773
0
$t
Springer Nature eBook
830
0
$a
Studies in computational intelligence ;
$v
v. 1065.
$3
3626422
856
4 0
$u
https://doi.org/10.1007/978-981-19-6290-5
950
$a
Engineering (SpringerNature-11647)
筆 0 讀者評論
館藏地:
全部
電子資源
出版年:
卷號:
館藏
1 筆 • 頁數 1 •
1
條碼號
典藏地名稱
館藏流通類別
資料類型
索書號
使用類型
借閱狀態
預約狀態
備註欄
附件
W9450987
電子資源
11.線上閱覽_V
電子書
EB QA76.9.A25
一般使用(Normal)
在架
0
1 筆 • 頁數 1 •
1
多媒體
評論
新增評論
分享你的心得
Export
取書館
處理中
...
變更密碼
登入