Language:
English
繁體中文
Help
Login
Back
Switch To:
Labeled
|
MARC Mode
|
ISBD
Utilizing generative AI for cyber defense strategies
Record Type:
Language materials, printed : Monograph/item
Title/Author:
Utilizing generative AI for cyber defense strategies/ Noor Zaman Jhanjhi.
remainder title:
Utilizing generative artificial intelligence for cyber defense strategies
Author:
Jhanjhi, Noor Zaman.
Published:
Hershey, Pennsylvania :IGI Global, : 2025.,
Description:
1 online resource (xix, 525 p.) :ill. :
Subject:
Artificial intelligence. -
Online resource:
http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/979-8-3693-8944-7
ISBN:
9798369389461
Utilizing generative AI for cyber defense strategies
Jhanjhi, Noor Zaman.
Utilizing generative AI for cyber defense strategies
[electronic resource] /Utilizing generative artificial intelligence for cyber defense strategiesNoor Zaman Jhanjhi. - Hershey, Pennsylvania :IGI Global,2025. - 1 online resource (xix, 525 p.) :ill. - Advances in digital crime, forensics, and cyber terrorism (ADCFCT) book series. - Advances in digital crime, forensics, and cyber terrorism (ADCFCT) book series..
Includes bibliographical references and index.
Preface -- Chapter 1. Federated Learning for Collaborative Cyber Defense -- Chapter 2. Risk Assessment and Mitigation With Generative AI Models -- Chapter 3. Dynamic Defense Strategies With Generative AI -- Chapter 4. Unleashing thePower of Generative Adversarial Networks for Cybersecurity: Proactive Defense and Innovation -- Chapter 5. Enhancing Security Through Generative AI-Based Authentication -- Chapter 6. Generative AI for Threat Intelligence and Information Sharing -- Chapter 7. Generative AI for Threat Hunting and Behaviour Analysis -- Chapter 8. A Methodical Approach to Exploiting Vulnerabilities and Countermeasures Using AI -- Chapter 9. Variational Autoencoders (VAEs) for Anomaly Detection --Chapter 10. A Novel Approach for Intrusion Detection System Using Deep Learning Architecture -- Chapter 11. A New Approach for Detecting Malware Using a Convolutional Autoencoder With Kernel Density Estimation -- Chapter 12. Scouting the Juncture of Internet of Things (IoT), Deep Learning, and Cybercrime: Powering Legal Perspectives on Advanced Data Analytics -- Chapter 13. Muscles of Deep Learning (DL) and Internet of Things (IoT) in Cyber Crimes Investigation: Legal Dimensions in Space-Age Data Analytics -- Chapter 14. Safeguarding the Future: Advancements in Cybersecurity via Generative AI -- Compilation of References -- About the Contributors -- Index.
"As cyber threats become increasingly sophisticated, the need for innovative defense strategies becomes urgent. Generative artificial intelligence (AI) offers a revolutionary approach to enhance cybersecurity. By utilizing advanced algorithms, data analysis, and machine learning, generative AI can simulate complex attack scenarios, identify vulnerabilities, and develop proactive defense mechanisms while adapting to modern-day cyber-attacks. AI strengthens current organizational security while offering quick, effective responses to emerging threats. Decisive strategies are needed to integrate generative AI into businesses defense strategies and protect organizations from attacks, secure digital data, andensure safe business processes. Utilizing Generative AI for Cyber Defense Strategies explores the utilization of generative AI tools in organizational cyber security and defense. Strategies for effective threat detection and mitigation arepresented, with an emphasis on deep learning, artificial intelligence, and Internet of Things (IoT) technology. This book covers topics such as cyber security, threat intelligence, and behavior analysis, and is a useful resource for computerengineers, security professionals, business owners, government officials, data analysts, academicians, scientists, and researchers."--
Mode of access: World Wide Web.
ISBN: 9798369389461Subjects--Topical Terms:
559380
Artificial intelligence.
Subjects--Index Terms:
Anomaly Detection.Index Terms--Genre/Form:
554714
Electronic books.
LC Class. No.: QA76.9.A25 / J43 2024eb
Dewey Class. No.: 005.8
Utilizing generative AI for cyber defense strategies
LDR
:04416nam a2200481 a 4500
001
1168700
006
m o d
007
cr nn |||muauu
008
251230s2025 paua ob 001 0 eng d
020
$a
9798369389461
$q
(ebook)
020
$z
9798369389447
$q
(hardback)
035
$a
(CaBNVSL)slc00006840
035
$a
(OCoLC)1459227554
035
$a
00353340
040
$a
CaBNVSL
$b
eng
$c
CaBNVSL
$d
CaBNVSL
041
0
$a
eng
050
4
$a
QA76.9.A25
$b
J43 2024eb
082
0 4
$a
005.8
$2
23
100
1
$a
Jhanjhi, Noor Zaman.
$e
editor.
$3
1387658
245
1 0
$a
Utilizing generative AI for cyber defense strategies
$h
[electronic resource] /
$c
Noor Zaman Jhanjhi.
246
3
$a
Utilizing generative artificial intelligence for cyber defense strategies
260
$a
Hershey, Pennsylvania :
$b
IGI Global,
$c
2025.
300
$a
1 online resource (xix, 525 p.) :
$b
ill.
490
1
$a
Advances in digital crime, forensics, and cyber terrorism (ADCFCT) book series
504
$a
Includes bibliographical references and index.
505
0
$a
Preface -- Chapter 1. Federated Learning for Collaborative Cyber Defense -- Chapter 2. Risk Assessment and Mitigation With Generative AI Models -- Chapter 3. Dynamic Defense Strategies With Generative AI -- Chapter 4. Unleashing thePower of Generative Adversarial Networks for Cybersecurity: Proactive Defense and Innovation -- Chapter 5. Enhancing Security Through Generative AI-Based Authentication -- Chapter 6. Generative AI for Threat Intelligence and Information Sharing -- Chapter 7. Generative AI for Threat Hunting and Behaviour Analysis -- Chapter 8. A Methodical Approach to Exploiting Vulnerabilities and Countermeasures Using AI -- Chapter 9. Variational Autoencoders (VAEs) for Anomaly Detection --Chapter 10. A Novel Approach for Intrusion Detection System Using Deep Learning Architecture -- Chapter 11. A New Approach for Detecting Malware Using a Convolutional Autoencoder With Kernel Density Estimation -- Chapter 12. Scouting the Juncture of Internet of Things (IoT), Deep Learning, and Cybercrime: Powering Legal Perspectives on Advanced Data Analytics -- Chapter 13. Muscles of Deep Learning (DL) and Internet of Things (IoT) in Cyber Crimes Investigation: Legal Dimensions in Space-Age Data Analytics -- Chapter 14. Safeguarding the Future: Advancements in Cybersecurity via Generative AI -- Compilation of References -- About the Contributors -- Index.
520
3
$a
"As cyber threats become increasingly sophisticated, the need for innovative defense strategies becomes urgent. Generative artificial intelligence (AI) offers a revolutionary approach to enhance cybersecurity. By utilizing advanced algorithms, data analysis, and machine learning, generative AI can simulate complex attack scenarios, identify vulnerabilities, and develop proactive defense mechanisms while adapting to modern-day cyber-attacks. AI strengthens current organizational security while offering quick, effective responses to emerging threats. Decisive strategies are needed to integrate generative AI into businesses defense strategies and protect organizations from attacks, secure digital data, andensure safe business processes. Utilizing Generative AI for Cyber Defense Strategies explores the utilization of generative AI tools in organizational cyber security and defense. Strategies for effective threat detection and mitigation arepresented, with an emphasis on deep learning, artificial intelligence, and Internet of Things (IoT) technology. This book covers topics such as cyber security, threat intelligence, and behavior analysis, and is a useful resource for computerengineers, security professionals, business owners, government officials, data analysts, academicians, scientists, and researchers."--
$c
Provided by publisher.
538
$a
Mode of access: World Wide Web.
650
0
$a
Artificial intelligence.
$3
559380
650
0
$a
Computer security.
$3
557122
650
0
$a
Information storage and retrieval systems
$x
Management.
$3
1498777
650
0
$a
Information technology
$x
Management.
$3
559272
650
0
$a
Data privacy.
$3
1424015
650
0
$a
Data protection.
$3
557764
653
$a
Anomaly Detection.
653
$a
Authentication Technologies.
653
$a
Behavior Analysis.
653
$a
Cyber Security.
653
$a
Data Analytics.
653
$a
Deep Learning.
653
$a
Defense Strategies.
653
$a
Federated Learning.
653
$a
Generative AI.
653
$a
Information Sharing.
653
$a
Internet of Things (IoT)
653
$a
Malware.
653
$a
Risk Assessment and Mitigation.
653
$a
Threat Intelligence.
653
$a
Variational Autoencoders (VAEs)
655
4
$a
Electronic books.
$2
local
$3
554714
710
2
$a
IGI Global.
$3
805187
776
0 8
$i
Print version:
$z
9798369389447
830
0
$a
Advances in digital crime, forensics, and cyber terrorism (ADCFCT) book series.
$3
1427449
856
4 0
$u
http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/979-8-3693-8944-7
based on 0 review(s)
Multimedia
Reviews
Add a review
and share your thoughts with other readers
Export
pickup library
Processing
...
Change password
Login