Language:
English
繁體中文
Help
圖資館首頁
Login
Back
Switch To:
Labeled
|
MARC Mode
|
ISBD
Integrating artificial intelligence ...
~
IGI Global.
Integrating artificial intelligence in cybersecurity and forensic practices
Record Type:
Electronic resources : Monograph/item
Title/Author:
Integrating artificial intelligence in cybersecurity and forensic practicesMarwan Omar, Hewa Majeed Zangana, Derek Mohammed, editors.
other author:
Mohammed, Derek.
Published:
Hershey, Pennsylvania :IGI Global,2025.
Description:
1 online resource (xviii, 484 p.) :ill.
Subject:
Computer security.
Online resource:
http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/979-8-3373-0588-2
ISBN:
9798337305905$q(ebook)
Integrating artificial intelligence in cybersecurity and forensic practices
Integrating artificial intelligence in cybersecurity and forensic practices
[electronic resource] /Marwan Omar, Hewa Majeed Zangana, Derek Mohammed, editors. - Hershey, Pennsylvania :IGI Global,2025. - 1 online resource (xviii, 484 p.) :ill. - Advances in information security, privacy, and ethics (AISPE) book series. - Advances in information security, privacy, and ethics (AISPE) book series..
Includes bibliographical references and index.
Preface -- Chapter 1. Introduction to Artificial Intelligence in Cybersecurity and Forensic Science -- Chapter 2. The Role of Machine Learning and Deep Learning in Threat Detection -- Chapter 3. Using Natural Language Processing (NLP) for Phishing and Spam Detection -- Chapter 4. Network Forensics and Traffic Analysis With Machine Learning -- Chapter 5. Image Denoising Techniques for Cybersecurity and Forensic Applications: AI-Driven Approaches -- Chapter 6. AutomatedEvidence Collection and Analysis Using AI -- Chapter 7. How Human-Centered Cybersecurity (HCC) Training Fosters Organizational Cybersecurity Cultures (CSC) -- Chapter 8. The Role of Cybersecurity Legislation in Promoting Data Privacy -- Chapter 9. Digital Forensic Data Mining and Pattern Recognition -- Chapter 10. Improving AppSec Resiliency, Monitoring, Risk Assessment, and Compliance by Bridging DevSecOps With SOCs -- Chapter 11. An In-Depth Investigation on Hardware Trojans Testing Into Cyber Security Concerns Using Machine Learning Models -- Chapter 12. Source Code Analysis With Deep Neural Networks -- Chapter 13. An In-Depth Analysis of a Cyber Attack: Case Study and Security Insights -- Chapter 14. UsingMachine Learning to Identify High-Risk Employee Activity in Proactive Insider Threat Detection -- Compilation of References -- About the Contributors -- Index.
Integrating Artificial Intelligence in Cybersecurity and Forensic Practices explores the evolving role of AI in cybersecurity and forensic science. It delves into key AI techniques, discussing their applications, benefits, and challenges in tackling modern cyber threats and forensic investigations. Covering topics such as automation, deep neural networks, and traffic analysis, this book is an excellent resource for professionals, researchers, students, IT security managers, threat analysts, digital forensic investigators, and more.
Mode of access: World Wide Web.
ISBN: 9798337305905$q(ebook)Subjects--Topical Terms:
184416
Computer security.
Subjects--Index Terms:
Artificial Intelligence (AI)Index Terms--Genre/Form:
214472
Electronic books.
LC Class. No.: QA76.9.A25 / I58 2025eb
Dewey Class. No.: 005.8
Integrating artificial intelligence in cybersecurity and forensic practices
LDR
:03796nmm a2200553 a 4500
001
681654
006
m o d
007
cr nn |||muauu
008
251124s2025 paua ob 001 0 eng d
020
$a
9798337305905$q(ebook)
020
$z
9798337305882$q(hardback)
020
$z
9798337305899$q(paperback)
035
$a
(CaBNVSL)slc00007244
035
$a
(OCoLC)1479494548
035
$a
00360022
040
$a
CaBNVSL
$b
eng
$c
CaBNVSL
$d
CaBNVSL
041
0
$a
eng
050
4
$a
QA76.9.A25
$b
I58 2025eb
082
0 4
$a
005.8
$2
23
245
0 0
$a
Integrating artificial intelligence in cybersecurity and forensic practices
$h
[electronic resource] /
$c
Marwan Omar, Hewa Majeed Zangana, Derek Mohammed, editors.
260
$a
Hershey, Pennsylvania :
$b
IGI Global,
$c
2025.
300
$a
1 online resource (xviii, 484 p.) :
$b
ill.
490
1
$a
Advances in information security, privacy, and ethics (AISPE) book series
504
$a
Includes bibliographical references and index.
505
0
$a
Preface -- Chapter 1. Introduction to Artificial Intelligence in Cybersecurity and Forensic Science -- Chapter 2. The Role of Machine Learning and Deep Learning in Threat Detection -- Chapter 3. Using Natural Language Processing (NLP) for Phishing and Spam Detection -- Chapter 4. Network Forensics and Traffic Analysis With Machine Learning -- Chapter 5. Image Denoising Techniques for Cybersecurity and Forensic Applications: AI-Driven Approaches -- Chapter 6. AutomatedEvidence Collection and Analysis Using AI -- Chapter 7. How Human-Centered Cybersecurity (HCC) Training Fosters Organizational Cybersecurity Cultures (CSC) -- Chapter 8. The Role of Cybersecurity Legislation in Promoting Data Privacy -- Chapter 9. Digital Forensic Data Mining and Pattern Recognition -- Chapter 10. Improving AppSec Resiliency, Monitoring, Risk Assessment, and Compliance by Bridging DevSecOps With SOCs -- Chapter 11. An In-Depth Investigation on Hardware Trojans Testing Into Cyber Security Concerns Using Machine Learning Models -- Chapter 12. Source Code Analysis With Deep Neural Networks -- Chapter 13. An In-Depth Analysis of a Cyber Attack: Case Study and Security Insights -- Chapter 14. UsingMachine Learning to Identify High-Risk Employee Activity in Proactive Insider Threat Detection -- Compilation of References -- About the Contributors -- Index.
520
3
$a
Integrating Artificial Intelligence in Cybersecurity and Forensic Practices explores the evolving role of AI in cybersecurity and forensic science. It delves into key AI techniques, discussing their applications, benefits, and challenges in tackling modern cyber threats and forensic investigations. Covering topics such as automation, deep neural networks, and traffic analysis, this book is an excellent resource for professionals, researchers, students, IT security managers, threat analysts, digital forensic investigators, and more.
538
$a
Mode of access: World Wide Web.
650
0
$a
Computer security.
$3
184416
650
0
$a
Forensic sciences.
$3
230960
650
0
$a
Artificial intelligence.
$3
194058
650
0
$a
Computer networks
$x
Security measures.
$3
185597
650
0
$a
Criminal investigation
$x
Technological innovations.
$3
792830
653
$a
Artificial Intelligence (AI)
653
$a
Automation.
653
$a
Cyber Attacks.
653
$a
Cybersecurity.
653
$a
Data Mining.
653
$a
Data Privacy.
653
$a
Deep Learning.
653
$a
Deep Neural Networks.
653
$a
Forensics.
653
$a
Hardware Trojans.
653
$a
Human-Centered Cybersecurity (HCC)
653
$a
Image Denoising.
653
$a
Machine Learning (ML)
653
$a
Natural Language Processing (NLP)
653
$a
Network Forensics.
653
$a
Organizational Cybersecurity Cultures (CSC)
653
$a
Pattern Recognition.
653
$a
Phishing.
653
$a
Risk Assessment.
653
$a
Threat Detection.
653
$a
Traffic Analysis.
655
4
$a
Electronic books.
$2
local.
$3
214472
700
1
$a
Mohammed, Derek.
$3
995255
700
1
$a
Zangana, Hewa Majeed,
$d
1987-
$3
995256
700
1
$a
Omar, Marwan,
$d
1982-
$e
editor.
$3
777846
710
2
$a
IGI Global.
$3
529832
776
0 8
$i
Print version:
$z
9798337305882
830
0
$a
Advances in information security, privacy, and ethics (AISPE) book series.
$3
795907
856
4 0
$u
http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/979-8-3373-0588-2
based on 0 review(s)
ALL
電子館藏
Items
1 records • Pages 1 •
1
Inventory Number
Location Name
Item Class
Material type
Call number
Usage Class
Loan Status
No. of reservations
Opac note
Attachments
000000254743
電子館藏
1圖書
電子書
EB QA76.9.A25 I58 2025eb 2025
一般使用(Normal)
On shelf
0
1 records • Pages 1 •
1
Multimedia
Multimedia file
http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/979-8-3373-0588-2
Reviews
Add a review
and share your thoughts with other readers
Export
pickup library
Processing
...
Change password
Login