000 | 03959nam a22006375i 4500 | ||
---|---|---|---|
001 | 978-3-031-05752-6 | ||
003 | DE-He213 | ||
005 | 20240423130120.0 | ||
007 | cr nn 008mamaa | ||
008 | 220901s2022 sz | s |||| 0|eng d | ||
020 |
_a9783031057526 _9978-3-031-05752-6 |
||
024 | 7 |
_a10.1007/978-3-031-05752-6 _2doi |
|
050 | 4 | _aTA345-345.5 | |
072 | 7 |
_aUN _2bicssc |
|
072 | 7 |
_aCOM018000 _2bisacsh |
|
072 | 7 |
_aUN _2thema |
|
082 | 0 | 4 |
_a620.00285 _223 |
245 | 1 | 0 |
_aBig Data Analytics and Computational Intelligence for Cybersecurity _h[electronic resource] / _cedited by Mariya Ouaissa, Zakaria Boulouard, Mariyam Ouaissa, Inam Ullah Khan, Mohammed Kaosar. |
250 | _a1st ed. 2022. | ||
264 | 1 |
_aCham : _bSpringer International Publishing : _bImprint: Springer, _c2022. |
|
300 |
_aXV, 335 p. 89 illus., 62 illus. in color. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
490 | 1 |
_aStudies in Big Data, _x2197-6511 ; _v111 |
|
505 | 0 | _aNew Advancements in Cybersecurity: A Comprehensive Survey -- CPSs Communication using 5G Network in the Light of Security -- A Survey on Security Aspects in RPL Protocol over IoT Network -- Analysis of Cybersecurity Risks and their Mitigation for Work-from-Home Tools and Techniques -- A Systemic Security and Privacy Review: Attacks and Prevention Mechanisms over IoT Layers -- Software-Defined Networking Security: A Comprehensive Review. | |
520 | _aThis book presents a collection of state-of-the-art artificial intelligence and big data analytics approaches to cybersecurity intelligence. It illustrates the latest trends in AI/ML-based strategic defense mechanisms against malware, vulnerabilities, cyber threats, as well as proactive countermeasures. It also introduces other trending technologies, such as blockchain, SDN, and IoT, and discusses their possible impact on improving security. The book discusses the convergence of AI/ML and big data in cybersecurity by providing an overview of theoretical, practical, and simulation concepts of computational intelligence and big data analytics used in different approaches of security. It also displays solutions that will help analyze complex patterns in user data and ultimately improve productivity. This book can be a source for researchers, students, and practitioners interested in the fields of artificial intelligence, cybersecurity, data analytics, and recent trends ofnetworks. | ||
650 | 0 |
_aEngineering _xData processing. |
|
650 | 0 | _aComputational intelligence. | |
650 | 0 | _aBig data. | |
650 | 0 | _aArtificial intelligence. | |
650 | 0 | _aCooperating objects (Computer systems). | |
650 | 1 | 4 | _aData Engineering. |
650 | 2 | 4 | _aComputational Intelligence. |
650 | 2 | 4 | _aBig Data. |
650 | 2 | 4 | _aArtificial Intelligence. |
650 | 2 | 4 | _aCyber-Physical Systems. |
700 | 1 |
_aOuaissa, Mariya. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt |
|
700 | 1 |
_aBoulouard, Zakaria. _eeditor. _0(orcid) _10000-0002-4891-3760 _4edt _4http://id.loc.gov/vocabulary/relators/edt |
|
700 | 1 |
_aOuaissa, Mariyam. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt |
|
700 | 1 |
_aKhan, Inam Ullah. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt |
|
700 | 1 |
_aKaosar, Mohammed. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt |
|
710 | 2 | _aSpringerLink (Online service) | |
773 | 0 | _tSpringer Nature eBook | |
776 | 0 | 8 |
_iPrinted edition: _z9783031057519 |
776 | 0 | 8 |
_iPrinted edition: _z9783031057533 |
776 | 0 | 8 |
_iPrinted edition: _z9783031057540 |
830 | 0 |
_aStudies in Big Data, _x2197-6511 ; _v111 |
|
856 | 4 | 0 | _uhttps://doi.org/10.1007/978-3-031-05752-6 |
912 | _aZDB-2-SCS | ||
912 | _aZDB-2-SXCS | ||
942 | _cSPRINGER | ||
999 |
_c185206 _d185206 |