Demystifying AI and ML for Cyber–Threat Intelligence

Bibliographic Details
Corporate Author: SpringerLink (Online service)
Other Authors: Yang, Ming (Editor), Mohanty, Sachi Nandan (Editor), Satpathy, Suneeta (Editor), Hu, Shu (Editor)
Summary:XI, 628 p. 190 illus., 143 illus. in color.
text
Language:English
Published: Cham : Springer Nature Switzerland : Imprint: Springer, 2025.
Edition:1st ed. 2025.
Series:Information Systems Engineering and Management, 43
Subjects:
Online Access:https://doi.org/10.1007/978-3-031-90723-4
Format: Electronic Book

MARC

LEADER 00000nam a22000005i 4500
001 978-3-031-90723-4
003 DE-He213
005 20250816130156.0
007 cr nn 008mamaa
008 250816s2025 sz | s |||| 0|eng d
020 |a 9783031907234  |9 978-3-031-90723-4 
024 7 |a 10.1007/978-3-031-90723-4  |2 doi 
050 4 |a Q342 
072 7 |a UYQ  |2 bicssc 
072 7 |a COM004000  |2 bisacsh 
072 7 |a UYQ  |2 thema 
082 0 4 |a 006.3  |2 23 
245 1 0 |a Demystifying AI and ML for Cyber–Threat Intelligence  |h [electronic resource] /  |c edited by Ming Yang, Sachi Nandan Mohanty, Suneeta Satpathy, Shu Hu. 
250 |a 1st ed. 2025. 
264 1 |a Cham :  |b Springer Nature Switzerland :  |b Imprint: Springer,  |c 2025. 
300 |a XI, 628 p. 190 illus., 143 illus. in color.  |b online resource. 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
341 0 |b PDF/UA-1  |2 onix 
341 0 |b Table of contents navigation  |2 onix 
341 0 |b Single logical reading order  |2 onix 
341 0 |b Short alternative textual descriptions  |2 onix 
341 0 |b Use of color is not sole means of conveying information  |2 onix 
341 0 |b Use of high contrast between text and background color  |2 onix 
341 0 |b Next / Previous structural navigation  |2 onix 
341 0 |b All non-decorative content supports reading without sight  |2 onix 
347 |a text file  |b PDF  |2 rda 
490 1 |a Information Systems Engineering and Management,  |x 3004-9598 ;  |v 43 
505 0 |a A Comprehensive Review on the Detection Capabilities of IDS using Deep Learning Techniques -- Next-Generation Intrusion Detection Framework with Active Learning-Driven Neural Networks for DDoS Defense -- Ensemble Learning-based Intrusion Detection System for RPL-based IoT Networks -- Advancing Detection of Man-in-the-Middle Attacks through Possibilistic C-Means Clustering -- CNN-Based IDS for Internet of Vehicles Using Transfer Learning -- Real-Time Network Intrusion Detection System using Machine Learning -- OpIDS-DL : OPTIMIZING INTRUSION DETECTION IN IoT NETWORKS: A DEEP LEARNING APPROACH WITH REGULARIZATION AND DROPOUT FOR ENHANCED CYBERSECURITY -- ML-Powered Sensitive Data Loss Prevention Firewall for Generative AI Applications -- Enhancing Data Integrity: Unveiling the Potential of Reversible Logic for Error Detection and Correction -- Enhancing Cyber security through Reversible Logic -- Beyond Passwords: Enhancing Security with Continuous Behavioral Biometrics and Passive Authentication. 
520 |a This book simplifies complex AI and ML concepts, making them accessible to security analysts, IT professionals, researchers, and decision-makers. Cyber threats have become increasingly sophisticated in the ever-evolving digital landscape, making traditional security measures insufficient to combat modern attacks. Artificial intelligence (AI) and machine learning (ML) have emerged as transformative tools in cybersecurity, enabling organizations to detect, prevent, and respond to threats with greater efficiency. This book is a comprehensive guide, bridging the gap between cybersecurity and AI/ML by offering clear, practical insights into their role in threat intelligence. Readers will gain a solid foundation in key AI and ML principles, including supervised and unsupervised learning, deep learning, and natural language processing (NLP) while exploring real-world applications such as intrusion detection, malware analysis, and fraud prevention. Through hands-on insights, case studies, and implementation strategies, it provides actionable knowledge for integrating AI-driven threat intelligence into security operations. Additionally, it examines emerging trends, ethical considerations, and the evolving role of AI in cybersecurity. Unlike overly technical manuals, this book balances theoretical concepts with practical applications, breaking down complex algorithms into actionable insights. Whether a seasoned professional or a beginner, readers will find this book an essential roadmap to navigating the future of cybersecurity in an AI-driven world. This book empowers its audience to stay ahead of cyber adversaries and embrace the next generation of intelligent threat detection. 
532 8 |a Accessibility summary: This PDF has been created in accordance with the PDF/UA-1 standard to enhance accessibility, including screen reader support, described non-text content (images, graphs), bookmarks for easy navigation, keyboard-friendly links and forms and searchable, selectable text. We recognize the importance of accessibility, and we welcome queries about accessibility for any of our products. If you have a question or an access need, please get in touch with us at accessibilitysupport@springernature.com. Please note that a more accessible version of this eBook is available as ePub. 
532 8 |a No reading system accessibility options actively disabled 
532 8 |a Publisher contact for further accessibility information: accessibilitysupport@springernature.com 
650 0 |a Computational intelligence. 
650 0 |a Data protection. 
650 0 |a Engineering  |x Data processing. 
650 0 |a Artificial intelligence. 
650 1 4 |a Computational Intelligence. 
650 2 4 |a Data and Information Security. 
650 2 4 |a Data Engineering. 
650 2 4 |a Artificial Intelligence. 
700 1 |a Yang, Ming.  |e editor.  |4 edt  |4 http://id.loc.gov/vocabulary/relators/edt 
700 1 |a Mohanty, Sachi Nandan.  |e editor.  |4 edt  |4 http://id.loc.gov/vocabulary/relators/edt 
700 1 |a Satpathy, Suneeta.  |e editor.  |4 edt  |4 http://id.loc.gov/vocabulary/relators/edt 
700 1 |a Hu, Shu.  |e editor.  |4 edt  |4 http://id.loc.gov/vocabulary/relators/edt 
710 2 |a SpringerLink (Online service) 
773 0 |t Springer Nature eBook 
776 0 8 |i Printed edition:  |z 9783031907227 
776 0 8 |i Printed edition:  |z 9783031907241 
776 0 8 |i Printed edition:  |z 9783031907258 
830 0 |a Information Systems Engineering and Management,  |x 3004-9598 ;  |v 43 
856 4 0 |u https://doi.org/10.1007/978-3-031-90723-4 
912 |a ZDB-2-INR 
912 |a ZDB-2-SXIT 
950 |a Intelligent Technologies and Robotics (SpringerNature-42732) 
950 |a Intelligent Technologies and Robotics (R0) (SpringerNature-43728)