Language:
English
繁體中文
Help
圖資館首頁
Login
Back
Switch To:
Labeled
|
MARC Mode
|
ISBD
Utilizing generative AI for cyber de...
~
IGI Global.
Utilizing generative AI for cyber defense strategies
Record Type:
Electronic resources : Monograph/item
Title/Author:
Utilizing generative AI for cyber defense strategiesNoor Zaman Jhanjhi.
remainder title:
Utilizing generative artificial intelligence for cyber defense strategies
Author:
Jhanjhi, Noor Zaman.
Published:
Hershey, Pennsylvania :IGI Global,2025.
Description:
1 online resource (xix, 525 p.) :ill.
Subject:
Artificial intelligence.
Online resource:
http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/979-8-3693-8944-7
ISBN:
9798369389461$q(ebook)
Utilizing generative AI for cyber defense strategies
Jhanjhi, Noor Zaman.
Utilizing generative AI for cyber defense strategies
[electronic resource] /Utilizing generative artificial intelligence for cyber defense strategiesNoor Zaman Jhanjhi. - Hershey, Pennsylvania :IGI Global,2025. - 1 online resource (xix, 525 p.) :ill. - Advances in digital crime, forensics, and cyber terrorism (ADCFCT) book series. - Advances in digital crime, forensics, and cyber terrorism (ADCFCT) book series..
Includes bibliographical references and index.
Preface -- Chapter 1. Federated Learning for Collaborative Cyber Defense -- Chapter 2. Risk Assessment and Mitigation With Generative AI Models -- Chapter 3. Dynamic Defense Strategies With Generative AI -- Chapter 4. Unleashing thePower of Generative Adversarial Networks for Cybersecurity: Proactive Defense and Innovation -- Chapter 5. Enhancing Security Through Generative AI-Based Authentication -- Chapter 6. Generative AI for Threat Intelligence and Information Sharing -- Chapter 7. Generative AI for Threat Hunting and Behaviour Analysis -- Chapter 8. A Methodical Approach to Exploiting Vulnerabilities and Countermeasures Using AI -- Chapter 9. Variational Autoencoders (VAEs) for Anomaly Detection --Chapter 10. A Novel Approach for Intrusion Detection System Using Deep Learning Architecture -- Chapter 11. A New Approach for Detecting Malware Using a Convolutional Autoencoder With Kernel Density Estimation -- Chapter 12. Scouting the Juncture of Internet of Things (IoT), Deep Learning, and Cybercrime: Powering Legal Perspectives on Advanced Data Analytics -- Chapter 13. Muscles of Deep Learning (DL) and Internet of Things (IoT) in Cyber Crimes Investigation: Legal Dimensions in Space-Age Data Analytics -- Chapter 14. Safeguarding the Future: Advancements in Cybersecurity via Generative AI -- Compilation of References -- About the Contributors -- Index.
"As cyber threats become increasingly sophisticated, the need for innovative defense strategies becomes urgent. Generative artificial intelligence (AI) offers a revolutionary approach to enhance cybersecurity. By utilizing advanced algorithms, data analysis, and machine learning, generative AI can simulate complex attack scenarios, identify vulnerabilities, and develop proactive defense mechanisms while adapting to modern-day cyber-attacks. AI strengthens current organizational security while offering quick, effective responses to emerging threats. Decisive strategies are needed to integrate generative AI into businesses defense strategies and protect organizations from attacks, secure digital data, andensure safe business processes. Utilizing Generative AI for Cyber Defense Strategies explores the utilization of generative AI tools in organizational cyber security and defense. Strategies for effective threat detection and mitigation arepresented, with an emphasis on deep learning, artificial intelligence, and Internet of Things (IoT) technology. This book covers topics such as cyber security, threat intelligence, and behavior analysis, and is a useful resource for computerengineers, security professionals, business owners, government officials, data analysts, academicians, scientists, and researchers."--
Mode of access: World Wide Web.
ISBN: 9798369389461$q(ebook)Subjects--Topical Terms:
194058
Artificial intelligence.
Subjects--Index Terms:
Anomaly Detection.Index Terms--Genre/Form:
214472
Electronic books.
LC Class. No.: QA76.9.A25 / J43 2024eb
Dewey Class. No.: 005.8
Utilizing generative AI for cyber defense strategies
LDR
:04417nmm a2200481 a 4500
001
681627
006
m o d
007
cr nn |||muauu
008
251124s2025 paua ob 001 0 eng d
020
$a
9798369389461$q(ebook)
020
$z
9798369389447$q(hardback)
035
$a
(CaBNVSL)slc00006840
035
$a
(OCoLC)1459227554
035
$a
00353340
040
$a
CaBNVSL
$b
eng
$c
CaBNVSL
$d
CaBNVSL
041
0
$a
eng
050
4
$a
QA76.9.A25
$b
J43 2024eb
082
0 4
$a
005.8
$2
23
100
1
$a
Jhanjhi, Noor Zaman.
$3
929196
245
1 0
$a
Utilizing generative AI for cyber defense strategies
$h
[electronic resource] /
$c
Noor Zaman Jhanjhi.
246
3
$a
Utilizing generative artificial intelligence for cyber defense strategies
260
$a
Hershey, Pennsylvania :
$b
IGI Global,
$c
2025.
300
$a
1 online resource (xix, 525 p.) :
$b
ill.
490
1
$a
Advances in digital crime, forensics, and cyber terrorism (ADCFCT) book series
504
$a
Includes bibliographical references and index.
505
0
$a
Preface -- Chapter 1. Federated Learning for Collaborative Cyber Defense -- Chapter 2. Risk Assessment and Mitigation With Generative AI Models -- Chapter 3. Dynamic Defense Strategies With Generative AI -- Chapter 4. Unleashing thePower of Generative Adversarial Networks for Cybersecurity: Proactive Defense and Innovation -- Chapter 5. Enhancing Security Through Generative AI-Based Authentication -- Chapter 6. Generative AI for Threat Intelligence and Information Sharing -- Chapter 7. Generative AI for Threat Hunting and Behaviour Analysis -- Chapter 8. A Methodical Approach to Exploiting Vulnerabilities and Countermeasures Using AI -- Chapter 9. Variational Autoencoders (VAEs) for Anomaly Detection --Chapter 10. A Novel Approach for Intrusion Detection System Using Deep Learning Architecture -- Chapter 11. A New Approach for Detecting Malware Using a Convolutional Autoencoder With Kernel Density Estimation -- Chapter 12. Scouting the Juncture of Internet of Things (IoT), Deep Learning, and Cybercrime: Powering Legal Perspectives on Advanced Data Analytics -- Chapter 13. Muscles of Deep Learning (DL) and Internet of Things (IoT) in Cyber Crimes Investigation: Legal Dimensions in Space-Age Data Analytics -- Chapter 14. Safeguarding the Future: Advancements in Cybersecurity via Generative AI -- Compilation of References -- About the Contributors -- Index.
520
3
$a
"As cyber threats become increasingly sophisticated, the need for innovative defense strategies becomes urgent. Generative artificial intelligence (AI) offers a revolutionary approach to enhance cybersecurity. By utilizing advanced algorithms, data analysis, and machine learning, generative AI can simulate complex attack scenarios, identify vulnerabilities, and develop proactive defense mechanisms while adapting to modern-day cyber-attacks. AI strengthens current organizational security while offering quick, effective responses to emerging threats. Decisive strategies are needed to integrate generative AI into businesses defense strategies and protect organizations from attacks, secure digital data, andensure safe business processes. Utilizing Generative AI for Cyber Defense Strategies explores the utilization of generative AI tools in organizational cyber security and defense. Strategies for effective threat detection and mitigation arepresented, with an emphasis on deep learning, artificial intelligence, and Internet of Things (IoT) technology. This book covers topics such as cyber security, threat intelligence, and behavior analysis, and is a useful resource for computerengineers, security professionals, business owners, government officials, data analysts, academicians, scientists, and researchers."--
$c
Provided by publisher.
538
$a
Mode of access: World Wide Web.
650
0
$a
Artificial intelligence.
$3
194058
650
0
$a
Computer security.
$3
184416
650
0
$a
Information storage and retrieval systems
$x
Management.
$3
237211
650
0
$a
Information technology
$x
Management.
$3
183357
650
0
$a
Data privacy.
$3
919820
650
0
$a
Data protection.
$3
202312
653
$a
Anomaly Detection.
653
$a
Authentication Technologies.
653
$a
Behavior Analysis.
653
$a
Cyber Security.
653
$a
Data Analytics.
653
$a
Deep Learning.
653
$a
Defense Strategies.
653
$a
Federated Learning.
653
$a
Generative AI.
653
$a
Information Sharing.
653
$a
Internet of Things (IoT)
653
$a
Malware.
653
$a
Risk Assessment and Mitigation.
653
$a
Threat Intelligence.
653
$a
Variational Autoencoders (VAEs)
655
4
$a
Electronic books.
$2
local.
$3
214472
710
2
$a
IGI Global.
$3
529832
776
0 8
$i
Print version:
$z
9798369389447
830
0
$a
Advances in digital crime, forensics, and cyber terrorism (ADCFCT) book series.
$3
952392
856
4 0
$u
http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/979-8-3693-8944-7
based on 0 review(s)
ALL
電子館藏
Items
1 records • Pages 1 •
1
Inventory Number
Location Name
Item Class
Material type
Call number
Usage Class
Loan Status
No. of reservations
Opac note
Attachments
000000254716
電子館藏
1圖書
電子書
EB QA76.9.A25 J43 2024eb 2025
一般使用(Normal)
On shelf
0
1 records • Pages 1 •
1
Multimedia
Multimedia file
http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/979-8-3693-8944-7
Reviews
Add a review
and share your thoughts with other readers
Export
pickup library
Processing
...
Change password
Login