語系:
繁體中文
English
說明(常見問題)
回圖書館首頁
手機版館藏查詢
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Reshaping cybersecurity with generat...
~
Jhanjhi, Noor Zaman.
FindBook
Google Book
Amazon
博客來
Reshaping cybersecurity with generative AI techniques
紀錄類型:
書目-電子資源 : Monograph/item
正題名/作者:
Reshaping cybersecurity with generative AI techniques/ Noor Zaman Jhanjhi.
其他題名:
Reshaping cybersecurity with generative artificial intelligencee techniques
作者:
Jhanjhi, Noor Zaman.
出版者:
Hershey, Pennsylvania :IGI Global, : 2025.,
面頁冊數:
1 online resource (xxvii, 636 p.) :ill.
內容註:
Preface -- Chapter 1. Overview of Generative AI Techniques for Cybersecurity -- Chapter 2. Reinforcement Learning Approaches in Cyber Security -- Chapter 3. Generative AI in Network Security and Intrusion Detection -- Chapter 4. Reshaping Cybersecurity of Wireless Sensor Networks Using Energy-Optimized Approach Against Wormhole Attack -- Chapter 5. AI in 6G Network Security and Management -- Chapter 6. Blockchain and Generative AI for Securing Distributed Systems -- Chapter 7. Securing IoT Devices Using Generative AI Techniques -- Chapter 8. Reshaping Secure Coding Through Generative AI Approach to Minimizing Programming Challenges -- Chapter 9. Security Considerations in Generative AI for Web Applications -- Chapter 10. Generative AI for Secure User Interface (UI) Design -- Chapter 11. Reshaping Cybersecurity Practices by Optimizing Web Application Penetration Testing -- Chapter 12. Ethics and Transparency in Secure Web Model Generation -- Chapter 13. Future Trends and Trials in Cybersecurity and Generative AI -- Chapter 14. Future Trends and Challenges in Cybersecurity and Generative AI -- Compilation of References -- About the Contributors -- Index.
標題:
Computer security. -
電子資源:
https://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/979-8-3693-5415-5
ISBN:
9798369354179
Reshaping cybersecurity with generative AI techniques
Jhanjhi, Noor Zaman.
Reshaping cybersecurity with generative AI techniques
[electronic resource] /Reshaping cybersecurity with generative artificial intelligencee techniquesNoor Zaman Jhanjhi. - Hershey, Pennsylvania :IGI Global,2025. - 1 online resource (xxvii, 636 p.) :ill. - Advances in information security, privacy, and ethics (AISPE) book series. - Advances in information security, privacy, and ethics (AISPE) book series..
Includes bibliographical references and index.
Preface -- Chapter 1. Overview of Generative AI Techniques for Cybersecurity -- Chapter 2. Reinforcement Learning Approaches in Cyber Security -- Chapter 3. Generative AI in Network Security and Intrusion Detection -- Chapter 4. Reshaping Cybersecurity of Wireless Sensor Networks Using Energy-Optimized Approach Against Wormhole Attack -- Chapter 5. AI in 6G Network Security and Management -- Chapter 6. Blockchain and Generative AI for Securing Distributed Systems -- Chapter 7. Securing IoT Devices Using Generative AI Techniques -- Chapter 8. Reshaping Secure Coding Through Generative AI Approach to Minimizing Programming Challenges -- Chapter 9. Security Considerations in Generative AI for Web Applications -- Chapter 10. Generative AI for Secure User Interface (UI) Design -- Chapter 11. Reshaping Cybersecurity Practices by Optimizing Web Application Penetration Testing -- Chapter 12. Ethics and Transparency in Secure Web Model Generation -- Chapter 13. Future Trends and Trials in Cybersecurity and Generative AI -- Chapter 14. Future Trends and Challenges in Cybersecurity and Generative AI -- Compilation of References -- About the Contributors -- Index.
"The constantly changing digital environment of today makes cybersecurity an ever-increasing concern. With every technological advancement, cyber threats become more sophisticated and easily exploit system vulnerabilities. This unending attack barrage exposes organizations to data breaches, financial losses, and reputational harm. The traditional defense mechanisms, once dependable, now require additional support to keep up with the dynamic nature of modern attacks. Reshaping CyberSecurity With Generative AI Techniques offers a transformative solution to the pressing cybersecurity dilemma by harnessing the power of cutting-edge generative AI technologies. Bridging the gap between artificial intelligenceand cybersecurity presents a paradigm shift in defense strategies, empowering organizations to safeguard their digital assets proactively. Through a comprehensive exploration of generative AI techniques, readers gain invaluable insights into how these technologies can be leveraged to mitigate cyber threats, enhance defense capabilities, and reshape the cybersecurity paradigm."--
Mode of access: World Wide Web.
ISBN: 9798369354179Subjects--Topical Terms:
540555
Computer security.
Subjects--Index Terms:
AI-Enhanced Dynamic Defense Strategies.Index Terms--Genre/Form:
542853
Electronic books.
LC Class. No.: QA76.9.A25 / J43 2024eb
Dewey Class. No.: 005.8
Reshaping cybersecurity with generative AI techniques
LDR
:04463nmm a2200493 a 4500
001
2415604
006
m o d
007
cr nn |||muauu
008
260207s2025 paua ob 001 0 eng d
020
$a
9798369354179
$q
(ebook)
020
$z
9798369354155
$q
(hardback)
020
$z
9798369354162
$q
(paperback)
035
$a
(CaBNVSL)slc00006820
035
$a
(OCoLC)1459227644
035
$a
00339911
040
$a
CaBNVSL
$b
eng
$c
CaBNVSL
$d
CaBNVSL
041
0
$a
eng
050
4
$a
QA76.9.A25
$b
J43 2024eb
082
0 4
$a
005.8
$2
23
100
1
$a
Jhanjhi, Noor Zaman.
$3
3601594
245
1 0
$a
Reshaping cybersecurity with generative AI techniques
$h
[electronic resource] /
$c
Noor Zaman Jhanjhi.
246
3
$a
Reshaping cybersecurity with generative artificial intelligencee techniques
260
$a
Hershey, Pennsylvania :
$b
IGI Global,
$c
2025.
300
$a
1 online resource (xxvii, 636 p.) :
$b
ill.
490
1
$a
Advances in information security, privacy, and ethics (AISPE) book series
504
$a
Includes bibliographical references and index.
505
0
$a
Preface -- Chapter 1. Overview of Generative AI Techniques for Cybersecurity -- Chapter 2. Reinforcement Learning Approaches in Cyber Security -- Chapter 3. Generative AI in Network Security and Intrusion Detection -- Chapter 4. Reshaping Cybersecurity of Wireless Sensor Networks Using Energy-Optimized Approach Against Wormhole Attack -- Chapter 5. AI in 6G Network Security and Management -- Chapter 6. Blockchain and Generative AI for Securing Distributed Systems -- Chapter 7. Securing IoT Devices Using Generative AI Techniques -- Chapter 8. Reshaping Secure Coding Through Generative AI Approach to Minimizing Programming Challenges -- Chapter 9. Security Considerations in Generative AI for Web Applications -- Chapter 10. Generative AI for Secure User Interface (UI) Design -- Chapter 11. Reshaping Cybersecurity Practices by Optimizing Web Application Penetration Testing -- Chapter 12. Ethics and Transparency in Secure Web Model Generation -- Chapter 13. Future Trends and Trials in Cybersecurity and Generative AI -- Chapter 14. Future Trends and Challenges in Cybersecurity and Generative AI -- Compilation of References -- About the Contributors -- Index.
520
3
$a
"The constantly changing digital environment of today makes cybersecurity an ever-increasing concern. With every technological advancement, cyber threats become more sophisticated and easily exploit system vulnerabilities. This unending attack barrage exposes organizations to data breaches, financial losses, and reputational harm. The traditional defense mechanisms, once dependable, now require additional support to keep up with the dynamic nature of modern attacks. Reshaping CyberSecurity With Generative AI Techniques offers a transformative solution to the pressing cybersecurity dilemma by harnessing the power of cutting-edge generative AI technologies. Bridging the gap between artificial intelligenceand cybersecurity presents a paradigm shift in defense strategies, empowering organizations to safeguard their digital assets proactively. Through a comprehensive exploration of generative AI techniques, readers gain invaluable insights into how these technologies can be leveraged to mitigate cyber threats, enhance defense capabilities, and reshape the cybersecurity paradigm."--
$c
Provided by publisher.
538
$a
Mode of access: World Wide Web.
650
0
$a
Computer security.
$3
540555
650
0
$a
Artificial intelligence.
$3
516317
650
0
$a
Computer networks
$x
Security measures.
$3
579161
650
0
$a
Information technology
$x
Security measures.
$3
590547
653
$a
AI-Enhanced Dynamic Defense Strategies.
653
$a
Adversarial Attack Defense.
653
$a
Applications of Generative AI in Cybersecurity.
653
$a
Building Resilient Systems.
653
$a
Deep Learning for Threat Detection and Analysis.
653
$a
Enhancing Security Through Generative AI-Based Authentication.
653
$a
Ethical Considerations in Generative AI-Powered Cybersecurity.
653
$a
Federated Learning for Collaborative Cyber Defense.
653
$a
Generative AI for Threat Hunting and Behavior Analysis.
653
$a
Generative AI for Threat Intelligence and Information Sharing.
653
$a
Generative AI in Network Security and Intrusion Detection.
653
$a
Generative AI-Based Forensics and Incident Response.
653
$a
Generative Adversarial Networks (GANs) in Cybersecurity.
653
$a
Leveraging Generative AI for Secure Communication Protocols.
653
$a
Privacy-Preserving Techniques.
655
4
$a
Electronic books.
$2
lcsh
$3
542853
710
2
$a
IGI Global.
$3
1361470
776
0 8
$i
Print version:
$z
9798369354155
830
0
$a
Advances in information security, privacy, and ethics (AISPE) book series.
$3
3675641
856
4 0
$u
https://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/979-8-3693-5415-5
筆 0 讀者評論
館藏地:
全部
電子資源
出版年:
卷號:
館藏
1 筆 • 頁數 1 •
1
條碼號
典藏地名稱
館藏流通類別
資料類型
索書號
使用類型
借閱狀態
預約狀態
備註欄
附件
W9521049
電子資源
11.線上閱覽_V
電子書
EB QA76.9.A25 J43 2024eb
一般使用(Normal)
在架
0
1 筆 • 頁數 1 •
1
多媒體
評論
新增評論
分享你的心得
Export
取書館
處理中
...
變更密碼
登入