Artificial Intelligence and Cybersecurity (Record no. 176017)
[ view plain ]
000 -LEADER | |
---|---|
fixed length control field | 04277nam a22005895i 4500 |
001 - CONTROL NUMBER | |
control field | 978-3-031-15030-2 |
003 - CONTROL NUMBER IDENTIFIER | |
control field | DE-He213 |
005 - DATE AND TIME OF LATEST TRANSACTION | |
control field | 20240423125248.0 |
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION | |
fixed length control field | cr nn 008mamaa |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION | |
fixed length control field | 221207s2023 sz | s |||| 0|eng d |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
International Standard Book Number | 9783031150302 |
-- | 978-3-031-15030-2 |
024 7# - OTHER STANDARD IDENTIFIER | |
Standard number or code | 10.1007/978-3-031-15030-2 |
Source of number or code | doi |
050 #4 - LIBRARY OF CONGRESS CALL NUMBER | |
Classification number | Q334-342 |
050 #4 - LIBRARY OF CONGRESS CALL NUMBER | |
Classification number | TA347.A78 |
072 #7 - SUBJECT CATEGORY CODE | |
Subject category code | UYQ |
Source | bicssc |
072 #7 - SUBJECT CATEGORY CODE | |
Subject category code | COM004000 |
Source | bisacsh |
072 #7 - SUBJECT CATEGORY CODE | |
Subject category code | UYQ |
Source | thema |
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER | |
Classification number | 006.3 |
Edition number | 23 |
245 10 - TITLE STATEMENT | |
Title | Artificial Intelligence and Cybersecurity |
Medium | [electronic resource] : |
Remainder of title | Theory and Applications / |
Statement of responsibility, etc | edited by Tuomo Sipola, Tero Kokkonen, Mika Karjalainen. |
250 ## - EDITION STATEMENT | |
Edition statement | 1st ed. 2023. |
264 #1 - | |
-- | Cham : |
-- | Springer International Publishing : |
-- | Imprint: Springer, |
-- | 2023. |
300 ## - PHYSICAL DESCRIPTION | |
Extent | X, 301 p. 68 illus., 5 illus. in color. |
Other physical details | online resource. |
336 ## - | |
-- | text |
-- | txt |
-- | rdacontent |
337 ## - | |
-- | computer |
-- | c |
-- | rdamedia |
338 ## - | |
-- | online resource |
-- | cr |
-- | rdacarrier |
347 ## - | |
-- | text file |
-- | |
-- | rda |
505 0# - FORMATTED CONTENTS NOTE | |
Formatted contents note | Part I Cybersecurity Concerns -- Use of Artificial Intelligence in a Cybersecurity Environment -- Petri Vähäkainu and Martti Lehto -- A Review of Cyber Threat (Artificial) Intelligence in Security -- Management -- Martin Lundgren and Ali Padyab -- Model Based Resilience Engineering for Design and Assessment of -- Mission Critical Systems Containing AI Components -- Automation of CybersecurityWork -- Artificial Intelligence for Cybersecurity Education and Training -- Offensive Machine Learning Methods and the Cyber Kill Chain -- Defensive Machine Learning Methods and the Cyber Defence Chain -- Part II Privacy and Ethics -- Differential Privacy: An Umbrella Review -- AI in Cyber Operations: Ethical and Legal Considerations for End-Users -- Part III Applications -- Android Malware Detection Using Deep Learning -- Artificial Intelligence Enabled Radio Signal Intelligence -- Deep Learning Quantile Regression for Robustness, Confidence and -- Planning -- Model Fooling Threats Against Medical Imaging. |
520 ## - SUMMARY, ETC. | |
Summary, etc | This book discusses artificial intelligence (AI) and cybersecurity from multiple points of view. The diverse chapters reveal modern trends and challenges related to the use of artificial intelligence when considering privacy, cyber-attacks and defense as well as applications from malware detection to radio signal intelligence. The chapters are contributed by an international team of renown researchers and professionals in the field of AI and cybersecurity. During the last few decades the rise of modern AI solutions that surpass humans in specific tasks has occurred. Moreover, these new technologies provide new methods of automating cybersecurity tasks. In addition to the privacy, ethics and cybersecurity concerns, the readers learn several new cutting edge applications of AI technologies. Researchers working in AI and cybersecurity as well as advanced level students studying computer scienceand electrical engineering with a focus on AI and Cybersecurity will find this book useful as a reference. Professionals working within these related fields will also want to purchase this book as a reference. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Artificial intelligence. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Data protection |
General subdivision | Law and legislation. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Cryptography. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Data encryption (Computer science). |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Computer networks |
General subdivision | Security measures. |
650 14 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Artificial Intelligence. |
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Privacy. |
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Cryptology. |
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Mobile and Network Security. |
700 1# - ADDED ENTRY--PERSONAL NAME | |
Personal name | Sipola, Tuomo. |
Relator term | editor. |
Relator code | edt |
-- | http://id.loc.gov/vocabulary/relators/edt |
700 1# - ADDED ENTRY--PERSONAL NAME | |
Personal name | Kokkonen, Tero. |
Relator term | editor. |
Relator code | edt |
-- | http://id.loc.gov/vocabulary/relators/edt |
700 1# - ADDED ENTRY--PERSONAL NAME | |
Personal name | Karjalainen, Mika. |
Relator term | editor. |
Relator code | edt |
-- | http://id.loc.gov/vocabulary/relators/edt |
710 2# - ADDED ENTRY--CORPORATE NAME | |
Corporate name or jurisdiction name as entry element | SpringerLink (Online service) |
773 0# - HOST ITEM ENTRY | |
Title | Springer Nature eBook |
776 08 - ADDITIONAL PHYSICAL FORM ENTRY | |
Display text | Printed edition: |
International Standard Book Number | 9783031150296 |
776 08 - ADDITIONAL PHYSICAL FORM ENTRY | |
Display text | Printed edition: |
International Standard Book Number | 9783031150319 |
776 08 - ADDITIONAL PHYSICAL FORM ENTRY | |
Display text | Printed edition: |
International Standard Book Number | 9783031150326 |
856 40 - ELECTRONIC LOCATION AND ACCESS | |
Uniform Resource Identifier | <a href="https://doi.org/10.1007/978-3-031-15030-2">https://doi.org/10.1007/978-3-031-15030-2</a> |
912 ## - | |
-- | ZDB-2-SCS |
912 ## - | |
-- | ZDB-2-SXCS |
942 ## - ADDED ENTRY ELEMENTS (KOHA) | |
Koha item type | eBooks-CSE-Springer |
No items available.