Language:
English
繁體中文
Help
圖資館首頁
Login
Back
Switch To:
Labeled
|
MARC Mode
|
ISBD
AI-enabled threat detection and secu...
~
Derakhshan, Farnaz.
AI-enabled threat detection and security analysis for industrial IoT
Record Type:
Electronic resources : Monograph/item
Title/Author:
AI-enabled threat detection and security analysis for industrial IoTedited by Hadis Karimipour, Farnaz Derakhshan.
other author:
Karimipour, Hadis.
Published:
Cham :Springer International Publishing :2021.
Description:
viii, 250 p. :ill., digital ;24 cm.
Contained By:
Springer Nature eBook
Subject:
Internet of thingsSecurity measures.
Online resource:
https://doi.org/10.1007/978-3-030-76613-9
ISBN:
9783030766139$q(electronic bk.)
AI-enabled threat detection and security analysis for industrial IoT
AI-enabled threat detection and security analysis for industrial IoT
[electronic resource] /edited by Hadis Karimipour, Farnaz Derakhshan. - Cham :Springer International Publishing :2021. - viii, 250 p. :ill., digital ;24 cm.
Artificial Intelligence for Threat Detection and Analysis in Industrial IoT: Applications and Challenges -- Complementing IIoT Services through AI: Feasibility and Suitability -- Data Security and Privacy in Industrial IoT -- Blockchain Applications in the Industrial Internet of Things -- Application of Deep Learning on IoT-enabled Smart Grid Monitoring -- Cyber Security of Smart Manufacturing Execution Systems: A Bibliometric Analysis -- The Role of Machine Learning in IIoT Through FPGAs -- Deep Representation Learning for Cyber-Attack Detection in Industrial IoT -- Classification and Intelligent Mining of Anomalies in Industrial IoT -- A Snapshot Ensemble Deep Neural Network Model for Attack Detection in Industrial Internet of Things -- Privacy Preserving Federated Learning Solution for Security of Industrial Cyber Physical Systems -- A Multi-Stage Machine Learning Model for Security Analysis in Industrial Control System -- A Recurrent Attention Model for Cyber Attack Classification.
This contributed volume provides the state-of-the-art development on security and privacy for cyber-physical systems (CPS) and industrial Internet of Things (IIoT) More specifically, this book discusses the security challenges in CPS and IIoT systems as well as how Artificial Intelligence (AI) and Machine Learning (ML) can be used to address these challenges. Furthermore, this book proposes various defence strategies, including intelligent cyber-attack and anomaly detection algorithms for different IIoT applications. Each chapter corresponds to an important snapshot including an overview of the opportunities and challenges of realizing the AI in IIoT environments, issues related to data security, privacy and application of blockchain technology in the IIoT environment. This book also examines more advanced and specific topics in AI-based solutions developed for efficient anomaly detection in IIoT environments. Different AI/ML tecniques including deep representation learning, Snapshot Ensemble Deep Neural Network (SEDNN), federated learning and multi-stage learning are discussed and analysed as well. Researchers and professionals working in computer security with an emphasis on the scientific foundations and engineering techniques for securing IIoT systems and their underlying computing and communicating systems will find this book useful as a reference. The content of this book will be particularly useful for advanced-level students studying computer science, computer technology, cyber security, and information systems. It also applies to advanced-level students studying electrical engineering and system engineering, who would benefit from the case studies.
ISBN: 9783030766139$q(electronic bk.)
Standard No.: 10.1007/978-3-030-76613-9doiSubjects--Topical Terms:
770009
Internet of things
--Security measures.
LC Class. No.: TK5105.8857 / .A5 2021
Dewey Class. No.: 004.678
AI-enabled threat detection and security analysis for industrial IoT
LDR
:03709nmm a2200325 a 4500
001
605298
003
DE-He213
005
20210803201017.0
006
m d
007
cr nn 008maaau
008
211201s2021 sz s 0 eng d
020
$a
9783030766139$q(electronic bk.)
020
$a
9783030766122$q(paper)
024
7
$a
10.1007/978-3-030-76613-9
$2
doi
035
$a
978-3-030-76613-9
040
$a
GP
$c
GP
041
0
$a
eng
050
4
$a
TK5105.8857
$b
.A5 2021
072
7
$a
UTN
$2
bicssc
072
7
$a
COM043050
$2
bisacsh
072
7
$a
UTN
$2
thema
082
0 4
$a
004.678
$2
23
090
$a
TK5105.8857
$b
.A288 2021
245
0 0
$a
AI-enabled threat detection and security analysis for industrial IoT
$h
[electronic resource] /
$c
edited by Hadis Karimipour, Farnaz Derakhshan.
260
$a
Cham :
$b
Springer International Publishing :
$b
Imprint: Springer,
$c
2021.
300
$a
viii, 250 p. :
$b
ill., digital ;
$c
24 cm.
505
0
$a
Artificial Intelligence for Threat Detection and Analysis in Industrial IoT: Applications and Challenges -- Complementing IIoT Services through AI: Feasibility and Suitability -- Data Security and Privacy in Industrial IoT -- Blockchain Applications in the Industrial Internet of Things -- Application of Deep Learning on IoT-enabled Smart Grid Monitoring -- Cyber Security of Smart Manufacturing Execution Systems: A Bibliometric Analysis -- The Role of Machine Learning in IIoT Through FPGAs -- Deep Representation Learning for Cyber-Attack Detection in Industrial IoT -- Classification and Intelligent Mining of Anomalies in Industrial IoT -- A Snapshot Ensemble Deep Neural Network Model for Attack Detection in Industrial Internet of Things -- Privacy Preserving Federated Learning Solution for Security of Industrial Cyber Physical Systems -- A Multi-Stage Machine Learning Model for Security Analysis in Industrial Control System -- A Recurrent Attention Model for Cyber Attack Classification.
520
$a
This contributed volume provides the state-of-the-art development on security and privacy for cyber-physical systems (CPS) and industrial Internet of Things (IIoT) More specifically, this book discusses the security challenges in CPS and IIoT systems as well as how Artificial Intelligence (AI) and Machine Learning (ML) can be used to address these challenges. Furthermore, this book proposes various defence strategies, including intelligent cyber-attack and anomaly detection algorithms for different IIoT applications. Each chapter corresponds to an important snapshot including an overview of the opportunities and challenges of realizing the AI in IIoT environments, issues related to data security, privacy and application of blockchain technology in the IIoT environment. This book also examines more advanced and specific topics in AI-based solutions developed for efficient anomaly detection in IIoT environments. Different AI/ML tecniques including deep representation learning, Snapshot Ensemble Deep Neural Network (SEDNN), federated learning and multi-stage learning are discussed and analysed as well. Researchers and professionals working in computer security with an emphasis on the scientific foundations and engineering techniques for securing IIoT systems and their underlying computing and communicating systems will find this book useful as a reference. The content of this book will be particularly useful for advanced-level students studying computer science, computer technology, cyber security, and information systems. It also applies to advanced-level students studying electrical engineering and system engineering, who would benefit from the case studies.
650
0
$a
Internet of things
$x
Security measures.
$3
770009
650
1 4
$a
Mobile and Network Security.
$3
825732
650
2 4
$a
Cyber-physical systems, IoT.
$3
836359
650
2 4
$a
Artificial Intelligence.
$3
212515
650
2 4
$a
Machine Learning.
$3
833608
700
1
$a
Karimipour, Hadis.
$3
874026
700
1
$a
Derakhshan, Farnaz.
$3
901370
710
2
$a
SpringerLink (Online service)
$3
273601
773
0
$t
Springer Nature eBook
856
4 0
$u
https://doi.org/10.1007/978-3-030-76613-9
950
$a
Computer Science (SpringerNature-11645)
based on 0 review(s)
ALL
電子館藏
Items
1 records • Pages 1 •
1
Inventory Number
Location Name
Item Class
Material type
Call number
Usage Class
Loan Status
No. of reservations
Opac note
Attachments
000000203345
電子館藏
1圖書
電子書
EB TK5105.8857 .A288 2021 2021
一般使用(Normal)
On shelf
0
1 records • Pages 1 •
1
Multimedia
Multimedia file
https://doi.org/10.1007/978-3-030-76613-9
Reviews
Add a review
and share your thoughts with other readers
Export
pickup library
Processing
...
Change password
Login