000 | 05557nam a22006375i 4500 | ||
---|---|---|---|
001 | 978-3-031-09955-7 | ||
003 | DE-He213 | ||
005 | 20240423130235.0 | ||
007 | cr nn 008mamaa | ||
008 | 231207s2024 sz | s |||| 0|eng d | ||
020 |
_a9783031099557 _9978-3-031-09955-7 |
||
024 | 7 |
_a10.1007/978-3-031-09955-7 _2doi |
|
050 | 4 | _aTK7895.E42 | |
050 | 4 | _aTK5105.8857 | |
072 | 7 |
_aTJF _2bicssc |
|
072 | 7 |
_aGPFC _2bicssc |
|
072 | 7 |
_aTEC008000 _2bisacsh |
|
072 | 7 |
_aTJF _2thema |
|
072 | 7 |
_aGPFC _2thema |
|
082 | 0 | 4 |
_a621.38 _223 |
245 | 1 | 0 |
_aModern Approaches in IoT and Machine Learning for Cyber Security _h[electronic resource] : _bLatest Trends in AI / _cedited by Vinit Kumar Gunjan, Mohd Dilshad Ansari, Mohammed Usman, ThiDieuLinh Nguyen. |
250 | _a1st ed. 2024. | ||
264 | 1 |
_aCham : _bSpringer International Publishing : _bImprint: Springer, _c2024. |
|
300 |
_aX, 417 p. 216 illus., 123 illus. in color. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
490 | 1 |
_aInternet of Things, Technology, Communications and Computing, _x2199-1081 |
|
505 | 0 | _aIntroduction -- Being secure, vigilant and resilient in the age of Industry 4.0 -- Facing new cyber risks in the age of smart production -- Leveraging AI for threat detection -- Being resilient when attacks inevitably hit home -- Security for the Industrial Internet of Things -- Reinventing the Internet to Secure the Digital Economy -- The future of cybersecurity -- Adapting data science for security challenges -- Big data analytics for cybersecurity -- Data Analytics and Decision Support for Cybersecurity -- Data Science in Cybersecurity and Cyberthreat Intelligence -- Integrating cyber security and data science for social media -- Data warehousing and data mining techniques for cyber security -- Machine learning and deep learning methods for cybersecurity -- Machine Learning and Big Data Processing for Cybersecurity Data Analysis -- Blockchain's roles in strengthening cybersecurity and protecting privacy -- Using virtual environments for the assessment of cybersecurity issues in IoT scenarios -- Security considerations for secure and trustworthy smart home system in the IoT environment -- Cyber security challenges for IoT-based smart grid networks -- Evaluating critical security issues of the IoT world -- Internet of Things security and forensics -- Applying Artificial Intelligence Techniques to Prevent Cyber Assaults -- Cyber security and the role of intelligent systems in addressing its challenges -- Cyber security of water SCADA systems -- Bio-inspiring cyber security and cloud services -- AI enabled blockchain smart contracts -- Cyber security and the evolution in intrusion detection systems -- A cyber security study of a SCADA energy management system -- Security analysis and recommendations for AI/ML enabled automated cyber medical systems -- Making knowledge tradable in edge-AI enabled IoT -- Artificial intelligence and national security -- Conclusion. | |
520 | _aThis book examines the cyber risks associated with Internet of Things (IoT) and highlights the cyber security capabilities that IoT platforms must have in order to address those cyber risks effectively. The chapters fuse together deep cyber security expertise with artificial intelligence (AI), machine learning, and advanced analytics tools, which allows readers to evaluate, emulate, outpace, and eliminate threats in real time. The book’s chapters are written by experts of IoT and machine learning to help examine the computer-based crimes of the next decade. They highlight on automated processes for analyzing cyber frauds in the current systems and predict what is on the horizon. This book is applicable for researchers and professionals in cyber security, AI, and IoT. Examines cyber risks associated with IoT and highlights essential cyber security capabilities needed to address risks effectively; Fuses deep cyber security expertise with artificial intelligence, machine learning and advanced analytics tools; Includes a case study about an automated process for analyzing cyber frauds specifically in phishing and cloning. | ||
650 | 0 | _aCooperating objects (Computer systems). | |
650 | 0 | _aTelecommunication. | |
650 | 0 | _aData protection. | |
650 | 0 | _aQuantitative research. | |
650 | 1 | 4 | _aCyber-Physical Systems. |
650 | 2 | 4 | _aCommunications Engineering, Networks. |
650 | 2 | 4 | _aData and Information Security. |
650 | 2 | 4 | _aData Analysis and Big Data. |
700 | 1 |
_aGunjan, Vinit Kumar. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt |
|
700 | 1 |
_aAnsari, Mohd Dilshad. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt |
|
700 | 1 |
_aUsman, Mohammed. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt |
|
700 | 1 |
_aNguyen, ThiDieuLinh. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt |
|
710 | 2 | _aSpringerLink (Online service) | |
773 | 0 | _tSpringer Nature eBook | |
776 | 0 | 8 |
_iPrinted edition: _z9783031099540 |
776 | 0 | 8 |
_iPrinted edition: _z9783031099564 |
776 | 0 | 8 |
_iPrinted edition: _z9783031099571 |
830 | 0 |
_aInternet of Things, Technology, Communications and Computing, _x2199-1081 |
|
856 | 4 | 0 | _uhttps://doi.org/10.1007/978-3-031-09955-7 |
912 | _aZDB-2-SCS | ||
912 | _aZDB-2-SXCS | ||
942 | _cSPRINGER | ||
999 |
_c186525 _d186525 |