語系:
繁體中文
English
說明(常見問題)
圖資館首頁
登入
回首頁
到查詢結果
[ author_sort:"sikos, leslie f." ]
切換:
標籤
|
MARC模式
|
ISBD
AI in cybersecurity
~
Sikos, Leslie F.
AI in cybersecurity
紀錄類型:
書目-電子資源 : Monograph/item
正題名/作者:
AI in cybersecurityedited by Leslie F. Sikos.
其他作者:
Sikos, Leslie F.
出版者:
Cham :Springer International Publishing :2019.
面頁冊數:
xvii, 205 p. :ill., digital ;24 cm.
Contained By:
Springer eBooks
標題:
Artificial intelligence.
電子資源:
https://doi.org/10.1007/978-3-319-98842-9
ISBN:
9783319988429$q(electronic bk.)
AI in cybersecurity
AI in cybersecurity
[electronic resource] /edited by Leslie F. Sikos. - Cham :Springer International Publishing :2019. - xvii, 205 p. :ill., digital ;24 cm. - Intelligent systems reference library,v.1511868-4394 ;. - Intelligent systems reference library ;v.24..
OWL Ontologies in Cybersecurity: Conceptual Modeling of Cyber-Knowledge -- Knowledge Representation of Network Semantics for Reasoning-Powered Cyber-Situational Awareness -- The Security of Machine Learning Systems -- Patch Before Exploited: An Approach to Identify Targeted Software Vulnerabilities -- Applying Artificial Intelligence Methods to Network Attack Detection -- Machine Learning Algorithms for Network Intrusion Detection -- Android Application Analysis using Machine Learning Techniques.
This book presents a collection of state-of-the-art AI approaches to cybersecurity and cyberthreat intelligence, offering strategic defense mechanisms for malware, addressing cybercrime, and assessing vulnerabilities to yield proactive rather than reactive countermeasures. The current variety and scope of cybersecurity threats far exceed the capabilities of even the most skilled security professionals. In addition, analyzing yesterday's security incidents no longer enables experts to predict and prevent tomorrow's attacks, which necessitates approaches that go far beyond identifying known threats. Nevertheless, there are promising avenues: complex behavior matching can isolate threats based on the actions taken, while machine learning can help detect anomalies, prevent malware infections, discover signs of illicit activities, and protect assets from hackers. In turn, knowledge representation enables automated reasoning over network data, helping achieve cybersituational awareness. Bringing together contributions by high-caliber experts, this book suggests new research directions in this critical and rapidly growing field.
ISBN: 9783319988429$q(electronic bk.)
Standard No.: 10.1007/978-3-319-98842-9doiSubjects--Topical Terms:
194058
Artificial intelligence.
LC Class. No.: TA347.A78
Dewey Class. No.: 006.3
AI in cybersecurity
LDR
:02662nmm a2200337 a 4500
001
552534
003
DE-He213
005
20190617110848.0
006
m d
007
cr nn 008maaau
008
191106s2019 gw s 0 eng d
020
$a
9783319988429$q(electronic bk.)
020
$a
9783319988412$q(paper)
024
7
$a
10.1007/978-3-319-98842-9
$2
doi
035
$a
978-3-319-98842-9
040
$a
GP
$c
GP
041
0
$a
eng
050
4
$a
TA347.A78
072
7
$a
UYQ
$2
bicssc
072
7
$a
COM004000
$2
bisacsh
072
7
$a
UYQ
$2
thema
082
0 4
$a
006.3
$2
23
090
$a
TA347.A78
$b
A288 2019
245
0 0
$a
AI in cybersecurity
$h
[electronic resource] /
$c
edited by Leslie F. Sikos.
260
$a
Cham :
$b
Springer International Publishing :
$b
Imprint: Springer,
$c
2019.
300
$a
xvii, 205 p. :
$b
ill., digital ;
$c
24 cm.
490
1
$a
Intelligent systems reference library,
$x
1868-4394 ;
$v
v.151
505
0
$a
OWL Ontologies in Cybersecurity: Conceptual Modeling of Cyber-Knowledge -- Knowledge Representation of Network Semantics for Reasoning-Powered Cyber-Situational Awareness -- The Security of Machine Learning Systems -- Patch Before Exploited: An Approach to Identify Targeted Software Vulnerabilities -- Applying Artificial Intelligence Methods to Network Attack Detection -- Machine Learning Algorithms for Network Intrusion Detection -- Android Application Analysis using Machine Learning Techniques.
520
$a
This book presents a collection of state-of-the-art AI approaches to cybersecurity and cyberthreat intelligence, offering strategic defense mechanisms for malware, addressing cybercrime, and assessing vulnerabilities to yield proactive rather than reactive countermeasures. The current variety and scope of cybersecurity threats far exceed the capabilities of even the most skilled security professionals. In addition, analyzing yesterday's security incidents no longer enables experts to predict and prevent tomorrow's attacks, which necessitates approaches that go far beyond identifying known threats. Nevertheless, there are promising avenues: complex behavior matching can isolate threats based on the actions taken, while machine learning can help detect anomalies, prevent malware infections, discover signs of illicit activities, and protect assets from hackers. In turn, knowledge representation enables automated reasoning over network data, helping achieve cybersituational awareness. Bringing together contributions by high-caliber experts, this book suggests new research directions in this critical and rapidly growing field.
650
0
$a
Artificial intelligence.
$3
194058
650
0
$a
Computer security.
$3
184416
650
1 4
$a
Computational Intelligence.
$3
338479
650
2 4
$a
Artificial Intelligence.
$3
212515
650
2 4
$a
Security.
$3
760527
700
1
$a
Sikos, Leslie F.
$3
545201
710
2
$a
SpringerLink (Online service)
$3
273601
773
0
$t
Springer eBooks
830
0
$a
Intelligent systems reference library ;
$v
v.24.
$3
558591
856
4 0
$u
https://doi.org/10.1007/978-3-319-98842-9
950
$a
Intelligent Technologies and Robotics (Springer-42732)
筆 0 讀者評論
全部
電子館藏
館藏
1 筆 • 頁數 1 •
1
條碼號
館藏地
館藏流通類別
資料類型
索書號
使用類型
借閱狀態
預約狀態
備註欄
附件
000000165703
電子館藏
1圖書
電子書
EB TA347.A78 A288 2019 2019
一般使用(Normal)
在架
0
1 筆 • 頁數 1 •
1
多媒體
多媒體檔案
https://doi.org/10.1007/978-3-319-98842-9
評論
新增評論
分享你的心得
Export
取書館別
處理中
...
變更密碼
登入