Language:
English
繁體中文
Help
圖資館首頁
Login
Back
Switch To:
Labeled
|
MARC Mode
|
ISBD
Reshaping cybersecurity with generat...
~
IGI Global.
Reshaping cybersecurity with generative AI techniques
Record Type:
Electronic resources : Monograph/item
Title/Author:
Reshaping cybersecurity with generative AI techniquesNoor Zaman Jhanjhi.
remainder title:
Reshaping cybersecurity with generative artificial intelligencee techniques
Author:
Jhanjhi, Noor Zaman.
Published:
Hershey, Pennsylvania :IGI Global,2025.
Description:
1 online resource (xxvii, 636 p.) :ill.
Subject:
Computer security.
Online resource:
http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/979-8-3693-5415-5
ISBN:
9798369354179$q(ebook)
Reshaping cybersecurity with generative AI techniques
Jhanjhi, Noor Zaman.
Reshaping cybersecurity with generative AI techniques
[electronic resource] /Reshaping cybersecurity with generative artificial intelligencee techniquesNoor Zaman Jhanjhi. - Hershey, Pennsylvania :IGI Global,2025. - 1 online resource (xxvii, 636 p.) :ill. - Advances in information security, privacy, and ethics (AISPE) book series. - Advances in information security, privacy, and ethics (AISPE) book series..
Includes bibliographical references and index.
Preface -- Chapter 1. Overview of Generative AI Techniques for Cybersecurity -- Chapter 2. Reinforcement Learning Approaches in Cyber Security -- Chapter 3. Generative AI in Network Security and Intrusion Detection -- Chapter 4. Reshaping Cybersecurity of Wireless Sensor Networks Using Energy-Optimized Approach Against Wormhole Attack -- Chapter 5. AI in 6G Network Security and Management -- Chapter 6. Blockchain and Generative AI for Securing Distributed Systems -- Chapter 7. Securing IoT Devices Using Generative AI Techniques -- Chapter 8. Reshaping Secure Coding Through Generative AI Approach to Minimizing Programming Challenges -- Chapter 9. Security Considerations in Generative AI for Web Applications -- Chapter 10. Generative AI for Secure User Interface (UI) Design -- Chapter 11. Reshaping Cybersecurity Practices by Optimizing Web Application Penetration Testing -- Chapter 12. Ethics and Transparency in Secure Web Model Generation -- Chapter 13. Future Trends and Trials in Cybersecurity and Generative AI -- Chapter 14. Future Trends and Challenges in Cybersecurity and Generative AI -- Compilation of References -- About the Contributors -- Index.
"The constantly changing digital environment of today makes cybersecurity an ever-increasing concern. With every technological advancement, cyber threats become more sophisticated and easily exploit system vulnerabilities. This unending attack barrage exposes organizations to data breaches, financial losses, and reputational harm. The traditional defense mechanisms, once dependable, now require additional support to keep up with the dynamic nature of modern attacks. Reshaping CyberSecurity With Generative AI Techniques offers a transformative solution to the pressing cybersecurity dilemma by harnessing the power of cutting-edge generative AI technologies. Bridging the gap between artificial intelligenceand cybersecurity presents a paradigm shift in defense strategies, empowering organizations to safeguard their digital assets proactively. Through a comprehensive exploration of generative AI techniques, readers gain invaluable insights into how these technologies can be leveraged to mitigate cyber threats, enhance defense capabilities, and reshape the cybersecurity paradigm."--
Mode of access: World Wide Web.
ISBN: 9798369354179$q(ebook)Subjects--Topical Terms:
184416
Computer security.
Subjects--Index Terms:
AI-Enhanced Dynamic Defense Strategies.Index Terms--Genre/Form:
214472
Electronic books.
LC Class. No.: QA76.9.A25 / J43 2024eb
Dewey Class. No.: 005.8
Reshaping cybersecurity with generative AI techniques
LDR
:04463nmm a2200493 a 4500
001
681628
006
m o d
007
cr nn |||muauu
008
251124s2025 paua ob 001 0 eng d
020
$a
9798369354179$q(ebook)
020
$z
9798369354155$q(hardback)
020
$z
9798369354162$q(paperback)
035
$a
(CaBNVSL)slc00006820
035
$a
(OCoLC)1459227644
035
$a
00339911
040
$a
CaBNVSL
$b
eng
$c
CaBNVSL
$d
CaBNVSL
041
0
$a
eng
050
4
$a
QA76.9.A25
$b
J43 2024eb
082
0 4
$a
005.8
$2
23
100
1
$a
Jhanjhi, Noor Zaman.
$3
929196
245
1 0
$a
Reshaping cybersecurity with generative AI techniques
$h
[electronic resource] /
$c
Noor Zaman Jhanjhi.
246
3
$a
Reshaping cybersecurity with generative artificial intelligencee techniques
260
$a
Hershey, Pennsylvania :
$b
IGI Global,
$c
2025.
300
$a
1 online resource (xxvii, 636 p.) :
$b
ill.
490
1
$a
Advances in information security, privacy, and ethics (AISPE) book series
504
$a
Includes bibliographical references and index.
505
0
$a
Preface -- Chapter 1. Overview of Generative AI Techniques for Cybersecurity -- Chapter 2. Reinforcement Learning Approaches in Cyber Security -- Chapter 3. Generative AI in Network Security and Intrusion Detection -- Chapter 4. Reshaping Cybersecurity of Wireless Sensor Networks Using Energy-Optimized Approach Against Wormhole Attack -- Chapter 5. AI in 6G Network Security and Management -- Chapter 6. Blockchain and Generative AI for Securing Distributed Systems -- Chapter 7. Securing IoT Devices Using Generative AI Techniques -- Chapter 8. Reshaping Secure Coding Through Generative AI Approach to Minimizing Programming Challenges -- Chapter 9. Security Considerations in Generative AI for Web Applications -- Chapter 10. Generative AI for Secure User Interface (UI) Design -- Chapter 11. Reshaping Cybersecurity Practices by Optimizing Web Application Penetration Testing -- Chapter 12. Ethics and Transparency in Secure Web Model Generation -- Chapter 13. Future Trends and Trials in Cybersecurity and Generative AI -- Chapter 14. Future Trends and Challenges in Cybersecurity and Generative AI -- Compilation of References -- About the Contributors -- Index.
520
3
$a
"The constantly changing digital environment of today makes cybersecurity an ever-increasing concern. With every technological advancement, cyber threats become more sophisticated and easily exploit system vulnerabilities. This unending attack barrage exposes organizations to data breaches, financial losses, and reputational harm. The traditional defense mechanisms, once dependable, now require additional support to keep up with the dynamic nature of modern attacks. Reshaping CyberSecurity With Generative AI Techniques offers a transformative solution to the pressing cybersecurity dilemma by harnessing the power of cutting-edge generative AI technologies. Bridging the gap between artificial intelligenceand cybersecurity presents a paradigm shift in defense strategies, empowering organizations to safeguard their digital assets proactively. Through a comprehensive exploration of generative AI techniques, readers gain invaluable insights into how these technologies can be leveraged to mitigate cyber threats, enhance defense capabilities, and reshape the cybersecurity paradigm."--
$c
Provided by publisher.
538
$a
Mode of access: World Wide Web.
650
0
$a
Computer security.
$3
184416
650
0
$a
Artificial intelligence.
$3
194058
650
0
$a
Computer networks
$x
Security measures.
$3
185597
650
0
$a
Information technology
$x
Security measures.
$3
238552
653
$a
AI-Enhanced Dynamic Defense Strategies.
653
$a
Adversarial Attack Defense.
653
$a
Applications of Generative AI in Cybersecurity.
653
$a
Building Resilient Systems.
653
$a
Deep Learning for Threat Detection and Analysis.
653
$a
Enhancing Security Through Generative AI-Based Authentication.
653
$a
Ethical Considerations in Generative AI-Powered Cybersecurity.
653
$a
Federated Learning for Collaborative Cyber Defense.
653
$a
Generative AI for Threat Hunting and Behavior Analysis.
653
$a
Generative AI for Threat Intelligence and Information Sharing.
653
$a
Generative AI in Network Security and Intrusion Detection.
653
$a
Generative AI-Based Forensics and Incident Response.
653
$a
Generative Adversarial Networks (GANs) in Cybersecurity.
653
$a
Leveraging Generative AI for Secure Communication Protocols.
653
$a
Privacy-Preserving Techniques.
655
4
$a
Electronic books.
$2
local.
$3
214472
710
2
$a
IGI Global.
$3
529832
776
0 8
$i
Print version:
$z
9798369354155
830
0
$a
Advances in information security, privacy, and ethics (AISPE) book series.
$3
795907
856
4 0
$u
http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/979-8-3693-5415-5
based on 0 review(s)
ALL
電子館藏
Items
1 records • Pages 1 •
1
Inventory Number
Location Name
Item Class
Material type
Call number
Usage Class
Loan Status
No. of reservations
Opac note
Attachments
000000254717
電子館藏
1圖書
電子書
EB QA76.9.A25 J43 2024eb 2025
一般使用(Normal)
On shelf
0
1 records • Pages 1 •
1
Multimedia
Multimedia file
http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/979-8-3693-5415-5
Reviews
Add a review
and share your thoughts with other readers
Export
pickup library
Processing
...
Change password
Login