000 05525nam a22006015i 4500
001 978-3-030-88040-8
003 DE-He213
005 20240423130233.0
007 cr nn 008mamaa
008 211122s2021 sz | s |||| 0|eng d
020 _a9783030880408
_9978-3-030-88040-8
024 7 _a10.1007/978-3-030-88040-8
_2doi
050 4 _aQA76.9.A25
072 7 _aUR
_2bicssc
072 7 _aUTN
_2bicssc
072 7 _aCOM053000
_2bisacsh
072 7 _aUR
_2thema
072 7 _aUTN
_2thema
082 0 4 _a005.8
_223
245 1 0 _aArtificial Intelligence in Cyber Security: Impact and Implications
_h[electronic resource] :
_bSecurity Challenges, Technical and Ethical Issues, Forensic Investigative Challenges /
_cedited by Reza Montasari, Hamid Jahankhani.
250 _a1st ed. 2021.
264 1 _aCham :
_bSpringer International Publishing :
_bImprint: Springer,
_c2021.
300 _aVI, 306 p. 99 illus., 81 illus. in color.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
490 1 _aAdvanced Sciences and Technologies for Security Applications,
_x2363-9466
505 0 _a1. Artificial Intelligence for Cyber Security: Principles and Paradigms -- 2. Cognitive Technologies and Artificial Intelligence in Cyber Security -- 3. Artificial Intelligence and Machine Learning Tools for Cyber Defence Operations -- 4. Machine Learning against Cyber Terrorism: Detecting Modified Terrorist Content Online -- 5. Combating Cybersecurity Kill Chain: Moving to a Proactive Security Model -- 6. Decoding Encrypted Data Using Deep Neural Networks -- 7. Socio-Technical Security: User Behaviour, Profiling and Modelling and Privacy by Design -- 8. Artificial Intelligence-Enabled Authentication and Associated Security Implications -- 9. Attacking Artificial Intelligence: Security Vulnerability and Proposed Countermeasures -- 10. Intelligent Security: Applying Artificial Intelligence to Detect Advanced Cyber Attacks.
520 _aThe book provides a valuable reference for cyber security experts, digital forensic practitioners and network security professionals. In recent years, AI has gained substantial attention from researchers in both academia and industry, and as a result AI’s capabilities are constantly increasing at an extraordinary pace. AI is considered to be the Fourth Industrial Revolution or at least the next significant technological change after the evolution in mobile and cloud computing technologies. AI is a vehicle for improving the quality of our lives across every spectrum with a broad range of beneficial applications in various sectors. Notwithstanding its numerous beneficial use, AI simultaneously poses numerous legal, ethical, security and privacy challenges that are compounded by its malicious use by criminals. These challenges pose many risks to both our privacy and security at national, organisational and individual levels. In view of this, this book aims to help address some ofthese challenges focusing on the implication, impact and mitigations of the stated issues. The book provides a comprehensive coverage of not only the technical and ethical issues presented by the use of AI but also the adversarial application of AI and its associated implications. The authors recommend a number of novel approaches to assist in better detecting, thwarting and addressing AI challenges. The book also looks ahead and forecasts what attacks can be carried out in the future through the malicious use of the AI if sufficient defences are not implemented. The research contained in the book fits well into the larger body of work on various aspects of AI and cyber security. It is also aimed at researchers seeking to obtain a more profound knowledge of machine learning and deep learning in the context of cyber security, digital forensics and cybercrime. Furthermore, the book is an exceptional advanced text for Ph.D. and master’s degree programmes in cyber security, digitalforensics, network security, cyber terrorism and computer science. Each chapter contributed to the book is written by an internationally renowned expert who has extensive experience in law enforcement, industry or academia. Furthermore, this book blends advanced research findings with practice-based methods to provide the reader with advanced understanding and relevant skills.
650 0 _aData protection.
650 0 _aArtificial intelligence.
650 0 _aSecurity systems.
650 0 _aInformation technology
_xMoral and ethical aspects.
650 1 4 _aData and Information Security.
650 2 4 _aArtificial Intelligence.
650 2 4 _aSecurity Science and Technology.
650 2 4 _aInformation Ethics.
700 1 _aMontasari, Reza.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
700 1 _aJahankhani, Hamid.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
710 2 _aSpringerLink (Online service)
773 0 _tSpringer Nature eBook
776 0 8 _iPrinted edition:
_z9783030880392
776 0 8 _iPrinted edition:
_z9783030880415
776 0 8 _iPrinted edition:
_z9783030880422
830 0 _aAdvanced Sciences and Technologies for Security Applications,
_x2363-9466
856 4 0 _uhttps://doi.org/10.1007/978-3-030-88040-8
912 _aZDB-2-SCS
912 _aZDB-2-SXCS
942 _cSPRINGER
999 _c186494
_d186494