Artificial Intelligence for Cybersecurity Artificial Intelligence for Cybersecurity
Advances in Information Security

Artificial Intelligence for Cybersecurity

Mark Stamp and Others
    • $139.99
    • $139.99

Publisher Description

This book explores new and novel applications of machine learning, deep learning, and artificial intelligence that are related to major challenges in the field of cybersecurity. The provided research goes beyond simply applying AI techniques to datasets and instead delves into deeper issues that arise at the interface between deep learning and cybersecurity.This book also provides insight into the difficult "how" and "why" questions that arise in AI within the security domain. For example, this book includes chapters covering "explainable AI", "adversarial learning", "resilient AI", and a wide variety of related topics. It’s not limited to any specific cybersecurity subtopics and the chapters touch upon a wide range of cybersecurity domains, ranging from malware to biometrics and more.Researchers and advanced level students working and studying in the fields of cybersecurity (equivalently, information security) or artificial intelligence (including deep learning, machine learning, big data, and related fields) will want to purchase this book as a reference. Practitioners working within these fields will also be interested in purchasing this book.

GENRE
Science & Nature
RELEASED
2022
July 15
LANGUAGE
EN
English
LENGTH
396
Pages
PUBLISHER
Springer International Publishing
SELLER
Springer Nature B.V.
SIZE
52.6
MB
Information Security Information Security
2021
Machine Learning, Deep Learning and AI for Cybersecurity Machine Learning, Deep Learning and AI for Cybersecurity
2025
Introduction to Machine Learning with Applications in Information Security Introduction to Machine Learning with Applications in Information Security
2022
Malware Analysis Using Artificial Intelligence and Deep Learning Malware Analysis Using Artificial Intelligence and Deep Learning
2020
Handbook of Information and Communication Security Handbook of Information and Communication Security
2010
Practice Notes on Private Company Law Practice Notes on Private Company Law
2013
Identifying Malicious Code Through Reverse Engineering Identifying Malicious Code Through Reverse Engineering
2009
Cyber-security of SCADA and Other Industrial Control Systems Cyber-security of SCADA and Other Industrial Control Systems
2016
Security for Telecommunications Networks Security for Telecommunications Networks
2008
Data Warehousing and Data Mining Techniques for Cyber Security Data Warehousing and Data Mining Techniques for Cyber Security
2007
Cyber Defense and Situational Awareness Cyber Defense and Situational Awareness
2015
Network Security Policies and Procedures Network Security Policies and Procedures
2007