Applying Artificial Intelligence in Cybersecurity Analytics and Cyber Threat Detection
"Today, it's impossible to deploy effective cybersecurity technology without relying heavily on machine learning. With machine learning, cybersecurity systems can be analyzed using patterns and learn from them to help prevent similar attacks and respond to changing behavior. It can help cy...
Otros Autores: | , , |
---|---|
Formato: | Libro electrónico |
Idioma: | Inglés |
Publicado: |
Hoboken, NJ :
John Wiley & Sons, Inc
[2024]
|
Edición: | First edition |
Materias: | |
Ver en Biblioteca Universitat Ramon Llull: | https://discovery.url.edu/permalink/34CSUC_URL/1im36ta/alma991009811331006719 |
Tabla de Contenidos:
- PART A: Artificial Intelligence (AI) in Cyber Security Analytics: Fundamental and Challenges. Analysis of Malicious executables and detection techniques. Detection and Analysis of Botnet Attacks Using Machine Learning Techniques. Artificial Intelligence Perspective on Digital Forensics. Review on Machine Learning-based Traffic Rules Contravention Detection System. Enhancing Cybersecurity Ratings using Artificial Intelligence and DevOps Technologies
- PART B: Cyber Threat Detection and Analysis Using Artificial Intelligence and Big Data. Malware analysis techniques in Android-based Smartphones Applications. Cyber Threat Detection and Mitigation Using Artificial Intelligence - A Cyber-physical Perspective. Performance Analysis of Intrusion Detection System using ML techniques. Spectral Pattern learning approach-based student sentiment analysis using Dense-net multiperception neural network in E-learning Environment. Big Data and Deep Learning Based Tourism Industry Sentiment Analysis Using Deep Spectral Recurrent Neural Network
- PART C: Applied Artificial Intelligence Approaches in Emerging Cyber Security Domains. Enhancing Security in Cloud Computing using Artificial Intelligence (AI). Utilization of Deep Learning Models for Safe Human-friendly Computing in Cloud, Fog and Mobile Edge Networks. Artificial Intelligence for Threat Anomaly Detection using Graph Databases - A Semantic Outlook. Security in Blockchain-based Smart Applications using Artificial Intelligence (AI). Leveraging Deep Learning Techniques for Securing the Internet of Things in the Age of Big Data Era.