|
|
|
|
| LEADER |
00000nam a22000005i 4500 |
| 001 |
978-3-031-90723-4 |
| 003 |
DE-He213 |
| 005 |
20250816130156.0 |
| 007 |
cr nn 008mamaa |
| 008 |
250816s2025 sz | s |||| 0|eng d |
| 020 |
|
|
|a 9783031907234
|9 978-3-031-90723-4
|
| 024 |
7 |
|
|a 10.1007/978-3-031-90723-4
|2 doi
|
| 050 |
|
4 |
|a Q342
|
| 072 |
|
7 |
|a UYQ
|2 bicssc
|
| 072 |
|
7 |
|a COM004000
|2 bisacsh
|
| 072 |
|
7 |
|a UYQ
|2 thema
|
| 082 |
0 |
4 |
|a 006.3
|2 23
|
| 245 |
1 |
0 |
|a Demystifying AI and ML for Cyber–Threat Intelligence
|h [electronic resource] /
|c edited by Ming Yang, Sachi Nandan Mohanty, Suneeta Satpathy, Shu Hu.
|
| 250 |
|
|
|a 1st ed. 2025.
|
| 264 |
|
1 |
|a Cham :
|b Springer Nature Switzerland :
|b Imprint: Springer,
|c 2025.
|
| 300 |
|
|
|a XI, 628 p. 190 illus., 143 illus. in color.
|b online resource.
|
| 336 |
|
|
|a text
|b txt
|2 rdacontent
|
| 337 |
|
|
|a computer
|b c
|2 rdamedia
|
| 338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
| 341 |
0 |
|
|b PDF/UA-1
|2 onix
|
| 341 |
0 |
|
|b Table of contents navigation
|2 onix
|
| 341 |
0 |
|
|b Single logical reading order
|2 onix
|
| 341 |
0 |
|
|b Short alternative textual descriptions
|2 onix
|
| 341 |
0 |
|
|b Use of color is not sole means of conveying information
|2 onix
|
| 341 |
0 |
|
|b Use of high contrast between text and background color
|2 onix
|
| 341 |
0 |
|
|b Next / Previous structural navigation
|2 onix
|
| 341 |
0 |
|
|b All non-decorative content supports reading without sight
|2 onix
|
| 347 |
|
|
|a text file
|b PDF
|2 rda
|
| 490 |
1 |
|
|a Information Systems Engineering and Management,
|x 3004-9598 ;
|v 43
|
| 505 |
0 |
|
|a A Comprehensive Review on the Detection Capabilities of IDS using Deep Learning Techniques -- Next-Generation Intrusion Detection Framework with Active Learning-Driven Neural Networks for DDoS Defense -- Ensemble Learning-based Intrusion Detection System for RPL-based IoT Networks -- Advancing Detection of Man-in-the-Middle Attacks through Possibilistic C-Means Clustering -- CNN-Based IDS for Internet of Vehicles Using Transfer Learning -- Real-Time Network Intrusion Detection System using Machine Learning -- OpIDS-DL : OPTIMIZING INTRUSION DETECTION IN IoT NETWORKS: A DEEP LEARNING APPROACH WITH REGULARIZATION AND DROPOUT FOR ENHANCED CYBERSECURITY -- ML-Powered Sensitive Data Loss Prevention Firewall for Generative AI Applications -- Enhancing Data Integrity: Unveiling the Potential of Reversible Logic for Error Detection and Correction -- Enhancing Cyber security through Reversible Logic -- Beyond Passwords: Enhancing Security with Continuous Behavioral Biometrics and Passive Authentication.
|
| 520 |
|
|
|a This book simplifies complex AI and ML concepts, making them accessible to security analysts, IT professionals, researchers, and decision-makers. Cyber threats have become increasingly sophisticated in the ever-evolving digital landscape, making traditional security measures insufficient to combat modern attacks. Artificial intelligence (AI) and machine learning (ML) have emerged as transformative tools in cybersecurity, enabling organizations to detect, prevent, and respond to threats with greater efficiency. This book is a comprehensive guide, bridging the gap between cybersecurity and AI/ML by offering clear, practical insights into their role in threat intelligence. Readers will gain a solid foundation in key AI and ML principles, including supervised and unsupervised learning, deep learning, and natural language processing (NLP) while exploring real-world applications such as intrusion detection, malware analysis, and fraud prevention. Through hands-on insights, case studies, and implementation strategies, it provides actionable knowledge for integrating AI-driven threat intelligence into security operations. Additionally, it examines emerging trends, ethical considerations, and the evolving role of AI in cybersecurity. Unlike overly technical manuals, this book balances theoretical concepts with practical applications, breaking down complex algorithms into actionable insights. Whether a seasoned professional or a beginner, readers will find this book an essential roadmap to navigating the future of cybersecurity in an AI-driven world. This book empowers its audience to stay ahead of cyber adversaries and embrace the next generation of intelligent threat detection.
|
| 532 |
8 |
|
|a Accessibility summary: This PDF has been created in accordance with the PDF/UA-1 standard to enhance accessibility, including screen reader support, described non-text content (images, graphs), bookmarks for easy navigation, keyboard-friendly links and forms and searchable, selectable text. We recognize the importance of accessibility, and we welcome queries about accessibility for any of our products. If you have a question or an access need, please get in touch with us at accessibilitysupport@springernature.com. Please note that a more accessible version of this eBook is available as ePub.
|
| 532 |
8 |
|
|a No reading system accessibility options actively disabled
|
| 532 |
8 |
|
|a Publisher contact for further accessibility information: accessibilitysupport@springernature.com
|
| 650 |
|
0 |
|a Computational intelligence.
|
| 650 |
|
0 |
|a Data protection.
|
| 650 |
|
0 |
|a Engineering
|x Data processing.
|
| 650 |
|
0 |
|a Artificial intelligence.
|
| 650 |
1 |
4 |
|a Computational Intelligence.
|
| 650 |
2 |
4 |
|a Data and Information Security.
|
| 650 |
2 |
4 |
|a Data Engineering.
|
| 650 |
2 |
4 |
|a Artificial Intelligence.
|
| 700 |
1 |
|
|a Yang, Ming.
|e editor.
|4 edt
|4 http://id.loc.gov/vocabulary/relators/edt
|
| 700 |
1 |
|
|a Mohanty, Sachi Nandan.
|e editor.
|4 edt
|4 http://id.loc.gov/vocabulary/relators/edt
|
| 700 |
1 |
|
|a Satpathy, Suneeta.
|e editor.
|4 edt
|4 http://id.loc.gov/vocabulary/relators/edt
|
| 700 |
1 |
|
|a Hu, Shu.
|e editor.
|4 edt
|4 http://id.loc.gov/vocabulary/relators/edt
|
| 710 |
2 |
|
|a SpringerLink (Online service)
|
| 773 |
0 |
|
|t Springer Nature eBook
|
| 776 |
0 |
8 |
|i Printed edition:
|z 9783031907227
|
| 776 |
0 |
8 |
|i Printed edition:
|z 9783031907241
|
| 776 |
0 |
8 |
|i Printed edition:
|z 9783031907258
|
| 830 |
|
0 |
|a Information Systems Engineering and Management,
|x 3004-9598 ;
|v 43
|
| 856 |
4 |
0 |
|u https://doi.org/10.1007/978-3-031-90723-4
|
| 912 |
|
|
|a ZDB-2-INR
|
| 912 |
|
|
|a ZDB-2-SXIT
|
| 950 |
|
|
|a Intelligent Technologies and Robotics (SpringerNature-42732)
|
| 950 |
|
|
|a Intelligent Technologies and Robotics (R0) (SpringerNature-43728)
|