AI in Cybersecurity

This book presents a collection of state-of-the-art AI approaches to cybersecurity and cyberthreat intelligence, offering strategic defense mechanisms for malware, addressing cybercrime, and assessing vulnerabilities to yield proactive rather than reactive countermeasures. The current variety and sc...

Πλήρης περιγραφή

Λεπτομέρειες βιβλιογραφικής εγγραφής
Συγγραφή απο Οργανισμό/Αρχή: SpringerLink (Online service)
Άλλοι συγγραφείς: Sikos, Leslie F. (Επιμελητής έκδοσης, http://id.loc.gov/vocabulary/relators/edt)
Μορφή: Ηλεκτρονική πηγή Ηλ. βιβλίο
Γλώσσα:English
Έκδοση: Cham : Springer International Publishing : Imprint: Springer, 2019.
Έκδοση:1st ed. 2019.
Σειρά:Intelligent Systems Reference Library, 151
Θέματα:
Διαθέσιμο Online:Full Text via HEAL-Link
LEADER 03640nam a2200505 4500
001 978-3-319-98842-9
003 DE-He213
005 20191022151926.0
007 cr nn 008mamaa
008 181111s2019 gw | s |||| 0|eng d
020 |a 9783319988429  |9 978-3-319-98842-9 
024 7 |a 10.1007/978-3-319-98842-9  |2 doi 
040 |d GrThAP 
050 4 |a Q342 
072 7 |a UYQ  |2 bicssc 
072 7 |a TEC009000  |2 bisacsh 
072 7 |a UYQ  |2 thema 
082 0 4 |a 006.3  |2 23 
245 1 0 |a AI in Cybersecurity  |h [electronic resource] /  |c edited by Leslie F. Sikos. 
250 |a 1st ed. 2019. 
264 1 |a Cham :  |b Springer International Publishing :  |b Imprint: Springer,  |c 2019. 
300 |a XVII, 205 p. 49 illus., 29 illus. in color.  |b online resource. 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a text file  |b PDF  |2 rda 
490 1 |a Intelligent Systems Reference Library,  |x 1868-4394 ;  |v 151 
505 0 |a OWL Ontologies in Cybersecurity: Conceptual Modeling of Cyber-Knowledge -- Knowledge Representation of Network Semantics for Reasoning-Powered Cyber-Situational Awareness -- The Security of Machine Learning Systems -- Patch Before Exploited: An Approach to Identify Targeted Software Vulnerabilities -- Applying Artificial Intelligence Methods to Network Attack Detection -- Machine Learning Algorithms for Network Intrusion Detection -- Android Application Analysis using Machine Learning Techniques. 
520 |a This book presents a collection of state-of-the-art AI approaches to cybersecurity and cyberthreat intelligence, offering strategic defense mechanisms for malware, addressing cybercrime, and assessing vulnerabilities to yield proactive rather than reactive countermeasures. The current variety and scope of cybersecurity threats far exceed the capabilities of even the most skilled security professionals. In addition, analyzing yesterday's security incidents no longer enables experts to predict and prevent tomorrow's attacks, which necessitates approaches that go far beyond identifying known threats. Nevertheless, there are promising avenues: complex behavior matching can isolate threats based on the actions taken, while machine learning can help detect anomalies, prevent malware infections, discover signs of illicit activities, and protect assets from hackers. In turn, knowledge representation enables automated reasoning over network data, helping achieve cybersituational awareness. Bringing together contributions by high-caliber experts, this book suggests new research directions in this critical and rapidly growing field. 
650 0 |a Computational intelligence. 
650 0 |a Artificial intelligence. 
650 0 |a Data protection. 
650 1 4 |a Computational Intelligence.  |0 http://scigraph.springernature.com/things/product-market-codes/T11014 
650 2 4 |a Artificial Intelligence.  |0 http://scigraph.springernature.com/things/product-market-codes/I21000 
650 2 4 |a Security.  |0 http://scigraph.springernature.com/things/product-market-codes/I28000 
700 1 |a Sikos, Leslie F.  |e editor.  |4 edt  |4 http://id.loc.gov/vocabulary/relators/edt 
710 2 |a SpringerLink (Online service) 
773 0 |t Springer eBooks 
776 0 8 |i Printed edition:  |z 9783319988412 
776 0 8 |i Printed edition:  |z 9783319988436 
776 0 8 |i Printed edition:  |z 9783030075392 
830 0 |a Intelligent Systems Reference Library,  |x 1868-4394 ;  |v 151 
856 4 0 |u https://doi.org/10.1007/978-3-319-98842-9  |z Full Text via HEAL-Link 
912 |a ZDB-2-INR 
950 |a Intelligent Technologies and Robotics (Springer-42732)