000 04699nam a22005535i 4500
001 978-3-030-76613-9
003 DE-He213
005 20240423125353.0
007 cr nn 008mamaa
008 210803s2021 sz | s |||| 0|eng d
020 _a9783030766139
_9978-3-030-76613-9
024 7 _a10.1007/978-3-030-76613-9
_2doi
050 4 _aTK5105.59
072 7 _aUTN
_2bicssc
072 7 _aCOM043050
_2bisacsh
072 7 _aUTN
_2thema
082 0 4 _a005.8
_223
245 1 0 _aAI-Enabled Threat Detection and Security Analysis for Industrial IoT
_h[electronic resource] /
_cedited by Hadis Karimipour, Farnaz Derakhshan.
250 _a1st ed. 2021.
264 1 _aCham :
_bSpringer International Publishing :
_bImprint: Springer,
_c2021.
300 _aVIII, 250 p. 94 illus., 82 illus. in color.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
505 0 _aArtificial Intelligence for Threat Detection and Analysis in Industrial IoT: Applications and Challenges -- Complementing IIoT Services through AI: Feasibility and Suitability -- Data Security and Privacy in Industrial IoT -- Blockchain Applications in the Industrial Internet of Things -- Application of Deep Learning on IoT-enabled Smart Grid Monitoring -- Cyber Security of Smart Manufacturing Execution Systems: A Bibliometric Analysis -- The Role of Machine Learning in IIoT Through FPGAs -- Deep Representation Learning for Cyber-Attack Detection in Industrial IoT -- Classification and Intelligent Mining of Anomalies in Industrial IoT -- A Snapshot Ensemble Deep Neural Network Model for Attack Detection in Industrial Internet of Things -- Privacy Preserving Federated Learning Solution for Security of Industrial Cyber Physical Systems -- A Multi-Stage Machine Learning Model for Security Analysis in Industrial Control System -- A Recurrent Attention Model for Cyber Attack Classification.
520 _aThis contributed volume provides the state-of-the-art development on security and privacy for cyber-physical systems (CPS) and industrial Internet of Things (IIoT). More specifically, this book discusses the security challenges in CPS and IIoT systems as well as how Artificial Intelligence (AI) and Machine Learning (ML) can be used to address these challenges. Furthermore, this book proposes various defence strategies, including intelligent cyber-attack and anomaly detection algorithms for different IIoT applications. Each chapter corresponds to an important snapshot including an overview of the opportunities and challenges of realizing the AI in IIoT environments, issues related to data security, privacy and application of blockchain technology in the IIoT environment. This book also examines more advanced and specific topics in AI-based solutions developed for efficient anomaly detection in IIoT environments. Different AI/ML tecniques including deep representation learning, Snapshot Ensemble Deep Neural Network (SEDNN), federated learning and multi-stage learning are discussed and analysed as well. Researchers and professionals working in computer security with an emphasis on the scientific foundations and engineering techniques for securing IIoT systems and their underlying computing and communicating systems will find this book useful as a reference. The content of this book will be particularly useful for advanced-level students studying computer science, computer technology, cyber security, and information systems. It also applies to advanced-level students studying electrical engineering and system engineering, who would benefit from the case studies.
650 0 _aComputer networks
_xSecurity measures.
650 0 _aCooperating objects (Computer systems).
650 0 _aArtificial intelligence.
650 0 _aMachine learning.
650 1 4 _aMobile and Network Security.
650 2 4 _aCyber-Physical Systems.
650 2 4 _aArtificial Intelligence.
650 2 4 _aMachine Learning.
700 1 _aKarimipour, Hadis.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
700 1 _aDerakhshan, Farnaz.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
710 2 _aSpringerLink (Online service)
773 0 _tSpringer Nature eBook
776 0 8 _iPrinted edition:
_z9783030766122
776 0 8 _iPrinted edition:
_z9783030766146
776 0 8 _iPrinted edition:
_z9783030766153
856 4 0 _uhttps://doi.org/10.1007/978-3-030-76613-9
912 _aZDB-2-SCS
912 _aZDB-2-SXCS
942 _cSPRINGER
999 _c177204
_d177204