AI in Cybersecurity AI in Cybersecurity
Intelligent Systems Reference Library

AI in Cybersecurity

    • 5.0 • 1 Rating
    • $149.99
    • $149.99

Publisher Description

This book presents a collection of state-of-the-art AI approaches to cybersecurity and cyberthreat intelligence, offering strategic defense mechanisms for malware, addressing cybercrime, and assessing vulnerabilities to yield proactive rather than reactive countermeasures. The current variety and scope of cybersecurity threats far exceed the capabilities of even the most skilled security professionals. In addition, analyzing yesterday’s security incidents no longer enables experts to predict and prevent tomorrow’s attacks, which necessitates approaches that go far beyond identifying known threats.

Nevertheless, there are promising avenues: complex behavior matching can isolate threats based on the actions taken, while machine learning can help detect anomalies, prevent malware infections, discover signs of illicit activities, and protect assets from hackers. In turn, knowledge representation enables automated reasoning over network data, helping achieve cybersituational awareness. Bringing together contributions by high-caliber experts, this book suggests new research directions in this critical and rapidly growing field.

GENRE
Computers & Internet
RELEASED
2018
September 17
LANGUAGE
EN
English
LENGTH
222
Pages
PUBLISHER
Springer International Publishing
SELLER
Springer Nature B.V.
SIZE
4.5
MB
Attacks and Defenses for the Internet-of-Things Attacks and Defenses for the Internet-of-Things
2022
Distributed Computing and Intelligent Technology Distributed Computing and Intelligent Technology
2023
Proceedings of the International Conference on Big Data, IoT, and Machine Learning Proceedings of the International Conference on Big Data, IoT, and Machine Learning
2021
Data Science in Cybersecurity and Cyberthreat Intelligence Data Science in Cybersecurity and Cyberthreat Intelligence
2020
Cybersecurity Teaching in Higher Education Cybersecurity Teaching in Higher Education
2023
Provenance in Data Science Provenance in Data Science
2021
Metaheuristics for Data Clustering and Image Segmentation Metaheuristics for Data Clustering and Image Segmentation
2018
Engineering Research Methodology Engineering Research Methodology
2018
Internet of Things and Big Data Analytics for Smart Generation Internet of Things and Big Data Analytics for Smart Generation
2018
Outlier Detection: Techniques and Applications Outlier Detection: Techniques and Applications
2019
Decision and Inhibitory Trees and Rules for Decision Tables with Many-valued Decisions Decision and Inhibitory Trees and Rules for Decision Tables with Many-valued Decisions
2019
Intelligent Decision Support Systems—A Journey to Smarter Healthcare Intelligent Decision Support Systems—A Journey to Smarter Healthcare
2019