000 05557nam a22006375i 4500
001 978-3-031-09955-7
003 DE-He213
005 20240423130235.0
007 cr nn 008mamaa
008 231207s2024 sz | s |||| 0|eng d
020 _a9783031099557
_9978-3-031-09955-7
024 7 _a10.1007/978-3-031-09955-7
_2doi
050 4 _aTK7895.E42
050 4 _aTK5105.8857
072 7 _aTJF
_2bicssc
072 7 _aGPFC
_2bicssc
072 7 _aTEC008000
_2bisacsh
072 7 _aTJF
_2thema
072 7 _aGPFC
_2thema
082 0 4 _a621.38
_223
245 1 0 _aModern Approaches in IoT and Machine Learning for Cyber Security
_h[electronic resource] :
_bLatest Trends in AI /
_cedited by Vinit Kumar Gunjan, Mohd Dilshad Ansari, Mohammed Usman, ThiDieuLinh Nguyen.
250 _a1st ed. 2024.
264 1 _aCham :
_bSpringer International Publishing :
_bImprint: Springer,
_c2024.
300 _aX, 417 p. 216 illus., 123 illus. in color.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
490 1 _aInternet of Things, Technology, Communications and Computing,
_x2199-1081
505 0 _aIntroduction -- Being secure, vigilant and resilient in the age of Industry 4.0 -- Facing new cyber risks in the age of smart production -- Leveraging AI for threat detection -- Being resilient when attacks inevitably hit home -- Security for the Industrial Internet of Things -- Reinventing the Internet to Secure the Digital Economy -- The future of cybersecurity -- Adapting data science for security challenges -- Big data analytics for cybersecurity -- Data Analytics and Decision Support for Cybersecurity -- Data Science in Cybersecurity and Cyberthreat Intelligence -- Integrating cyber security and data science for social media -- Data warehousing and data mining techniques for cyber security -- Machine learning and deep learning methods for cybersecurity -- Machine Learning and Big Data Processing for Cybersecurity Data Analysis -- Blockchain's roles in strengthening cybersecurity and protecting privacy -- Using virtual environments for the assessment of cybersecurity issues in IoT scenarios -- Security considerations for secure and trustworthy smart home system in the IoT environment -- Cyber security challenges for IoT-based smart grid networks -- Evaluating critical security issues of the IoT world -- Internet of Things security and forensics -- Applying Artificial Intelligence Techniques to Prevent Cyber Assaults -- Cyber security and the role of intelligent systems in addressing its challenges -- Cyber security of water SCADA systems -- Bio-inspiring cyber security and cloud services -- AI enabled blockchain smart contracts -- Cyber security and the evolution in intrusion detection systems -- A cyber security study of a SCADA energy management system -- Security analysis and recommendations for AI/ML enabled automated cyber medical systems -- Making knowledge tradable in edge-AI enabled IoT -- Artificial intelligence and national security -- Conclusion.
520 _aThis book examines the cyber risks associated with Internet of Things (IoT) and highlights the cyber security capabilities that IoT platforms must have in order to address those cyber risks effectively. The chapters fuse together deep cyber security expertise with artificial intelligence (AI), machine learning, and advanced analytics tools, which allows readers to evaluate, emulate, outpace, and eliminate threats in real time. The book’s chapters are written by experts of IoT and machine learning to help examine the computer-based crimes of the next decade. They highlight on automated processes for analyzing cyber frauds in the current systems and predict what is on the horizon. This book is applicable for researchers and professionals in cyber security, AI, and IoT. Examines cyber risks associated with IoT and highlights essential cyber security capabilities needed to address risks effectively; Fuses deep cyber security expertise with artificial intelligence, machine learning and advanced analytics tools; Includes a case study about an automated process for analyzing cyber frauds specifically in phishing and cloning.
650 0 _aCooperating objects (Computer systems).
650 0 _aTelecommunication.
650 0 _aData protection.
650 0 _aQuantitative research.
650 1 4 _aCyber-Physical Systems.
650 2 4 _aCommunications Engineering, Networks.
650 2 4 _aData and Information Security.
650 2 4 _aData Analysis and Big Data.
700 1 _aGunjan, Vinit Kumar.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
700 1 _aAnsari, Mohd Dilshad.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
700 1 _aUsman, Mohammed.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
700 1 _aNguyen, ThiDieuLinh.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
710 2 _aSpringerLink (Online service)
773 0 _tSpringer Nature eBook
776 0 8 _iPrinted edition:
_z9783031099540
776 0 8 _iPrinted edition:
_z9783031099564
776 0 8 _iPrinted edition:
_z9783031099571
830 0 _aInternet of Things, Technology, Communications and Computing,
_x2199-1081
856 4 0 _uhttps://doi.org/10.1007/978-3-031-09955-7
912 _aZDB-2-SCS
912 _aZDB-2-SXCS
942 _cSPRINGER
999 _c186525
_d186525