Modern Approaches in IoT and Machine Learning for Cyber Security (Record no. 186525)

MARC details
000 -LEADER
fixed length control field 05557nam a22006375i 4500
001 - CONTROL NUMBER
control field 978-3-031-09955-7
003 - CONTROL NUMBER IDENTIFIER
control field DE-He213
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20240423130235.0
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION
fixed length control field cr nn 008mamaa
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 231207s2024 sz | s |||| 0|eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9783031099557
-- 978-3-031-09955-7
024 7# - OTHER STANDARD IDENTIFIER
Standard number or code 10.1007/978-3-031-09955-7
Source of number or code doi
050 #4 - LIBRARY OF CONGRESS CALL NUMBER
Classification number TK7895.E42
050 #4 - LIBRARY OF CONGRESS CALL NUMBER
Classification number TK5105.8857
072 #7 - SUBJECT CATEGORY CODE
Subject category code TJF
Source bicssc
072 #7 - SUBJECT CATEGORY CODE
Subject category code GPFC
Source bicssc
072 #7 - SUBJECT CATEGORY CODE
Subject category code TEC008000
Source bisacsh
072 #7 - SUBJECT CATEGORY CODE
Subject category code TJF
Source thema
072 #7 - SUBJECT CATEGORY CODE
Subject category code GPFC
Source thema
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 621.38
Edition number 23
245 10 - TITLE STATEMENT
Title Modern Approaches in IoT and Machine Learning for Cyber Security
Medium [electronic resource] :
Remainder of title Latest Trends in AI /
Statement of responsibility, etc edited by Vinit Kumar Gunjan, Mohd Dilshad Ansari, Mohammed Usman, ThiDieuLinh Nguyen.
250 ## - EDITION STATEMENT
Edition statement 1st ed. 2024.
264 #1 -
-- Cham :
-- Springer International Publishing :
-- Imprint: Springer,
-- 2024.
300 ## - PHYSICAL DESCRIPTION
Extent X, 417 p. 216 illus., 123 illus. in color.
Other physical details online resource.
336 ## -
-- text
-- txt
-- rdacontent
337 ## -
-- computer
-- c
-- rdamedia
338 ## -
-- online resource
-- cr
-- rdacarrier
347 ## -
-- text file
-- PDF
-- rda
490 1# - SERIES STATEMENT
Series statement Internet of Things, Technology, Communications and Computing,
International Standard Serial Number 2199-1081
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note Introduction -- Being secure, vigilant and resilient in the age of Industry 4.0 -- Facing new cyber risks in the age of smart production -- Leveraging AI for threat detection -- Being resilient when attacks inevitably hit home -- Security for the Industrial Internet of Things -- Reinventing the Internet to Secure the Digital Economy -- The future of cybersecurity -- Adapting data science for security challenges -- Big data analytics for cybersecurity -- Data Analytics and Decision Support for Cybersecurity -- Data Science in Cybersecurity and Cyberthreat Intelligence -- Integrating cyber security and data science for social media -- Data warehousing and data mining techniques for cyber security -- Machine learning and deep learning methods for cybersecurity -- Machine Learning and Big Data Processing for Cybersecurity Data Analysis -- Blockchain's roles in strengthening cybersecurity and protecting privacy -- Using virtual environments for the assessment of cybersecurity issues in IoT scenarios -- Security considerations for secure and trustworthy smart home system in the IoT environment -- Cyber security challenges for IoT-based smart grid networks -- Evaluating critical security issues of the IoT world -- Internet of Things security and forensics -- Applying Artificial Intelligence Techniques to Prevent Cyber Assaults -- Cyber security and the role of intelligent systems in addressing its challenges -- Cyber security of water SCADA systems -- Bio-inspiring cyber security and cloud services -- AI enabled blockchain smart contracts -- Cyber security and the evolution in intrusion detection systems -- A cyber security study of a SCADA energy management system -- Security analysis and recommendations for AI/ML enabled automated cyber medical systems -- Making knowledge tradable in edge-AI enabled IoT -- Artificial intelligence and national security -- Conclusion.
520 ## - SUMMARY, ETC.
Summary, etc This book examines the cyber risks associated with Internet of Things (IoT) and highlights the cyber security capabilities that IoT platforms must have in order to address those cyber risks effectively. The chapters fuse together deep cyber security expertise with artificial intelligence (AI), machine learning, and advanced analytics tools, which allows readers to evaluate, emulate, outpace, and eliminate threats in real time. The book’s chapters are written by experts of IoT and machine learning to help examine the computer-based crimes of the next decade. They highlight on automated processes for analyzing cyber frauds in the current systems and predict what is on the horizon. This book is applicable for researchers and professionals in cyber security, AI, and IoT. Examines cyber risks associated with IoT and highlights essential cyber security capabilities needed to address risks effectively; Fuses deep cyber security expertise with artificial intelligence, machine learning and advanced analytics tools; Includes a case study about an automated process for analyzing cyber frauds specifically in phishing and cloning.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Cooperating objects (Computer systems).
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Telecommunication.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Data protection.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Quantitative research.
650 14 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Cyber-Physical Systems.
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Communications Engineering, Networks.
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Data and Information Security.
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Data Analysis and Big Data.
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Gunjan, Vinit Kumar.
Relator term editor.
Relator code edt
-- http://id.loc.gov/vocabulary/relators/edt
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Ansari, Mohd Dilshad.
Relator term editor.
Relator code edt
-- http://id.loc.gov/vocabulary/relators/edt
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Usman, Mohammed.
Relator term editor.
Relator code edt
-- http://id.loc.gov/vocabulary/relators/edt
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Nguyen, ThiDieuLinh.
Relator term editor.
Relator code edt
-- http://id.loc.gov/vocabulary/relators/edt
710 2# - ADDED ENTRY--CORPORATE NAME
Corporate name or jurisdiction name as entry element SpringerLink (Online service)
773 0# - HOST ITEM ENTRY
Title Springer Nature eBook
776 08 - ADDITIONAL PHYSICAL FORM ENTRY
Display text Printed edition:
International Standard Book Number 9783031099540
776 08 - ADDITIONAL PHYSICAL FORM ENTRY
Display text Printed edition:
International Standard Book Number 9783031099564
776 08 - ADDITIONAL PHYSICAL FORM ENTRY
Display text Printed edition:
International Standard Book Number 9783031099571
830 #0 - SERIES ADDED ENTRY--UNIFORM TITLE
Uniform title Internet of Things, Technology, Communications and Computing,
-- 2199-1081
856 40 - ELECTRONIC LOCATION AND ACCESS
Uniform Resource Identifier <a href="https://doi.org/10.1007/978-3-031-09955-7">https://doi.org/10.1007/978-3-031-09955-7</a>
912 ## -
-- ZDB-2-SCS
912 ## -
-- ZDB-2-SXCS
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Koha item type eBooks-CSE-Springer

No items available.

© 2024 IIIT-Delhi, library@iiitd.ac.in