語系:
繁體中文
English
說明(常見問題)
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Cyber Defence in the Age of AI, Sma...
~
Jahankhani, Hamid.
Cyber Defence in the Age of AI, Smart Societies and Augmented Humanity
紀錄類型:
書目-語言資料,印刷品 : Monograph/item
正題名/作者:
Cyber Defence in the Age of AI, Smart Societies and Augmented Humanity/ edited by Hamid Jahankhani, Stefan Kendzierskyj, Nishan Chelvachandran, Jaime Ibarra.
其他作者:
Ibarra, Jaime.
面頁冊數:
VIII, 450 p. 87 illus., 72 illus. in color.online resource. :
Contained By:
Springer Nature eBook
標題:
Security Science and Technology. -
電子資源:
https://doi.org/10.1007/978-3-030-35746-7
ISBN:
9783030357467
Cyber Defence in the Age of AI, Smart Societies and Augmented Humanity
Cyber Defence in the Age of AI, Smart Societies and Augmented Humanity
[electronic resource] /edited by Hamid Jahankhani, Stefan Kendzierskyj, Nishan Chelvachandran, Jaime Ibarra. - 1st ed. 2020. - VIII, 450 p. 87 illus., 72 illus. in color.online resource. - Advanced Sciences and Technologies for Security Applications,1613-5113. - Advanced Sciences and Technologies for Security Applications,.
Foreword -- Part 1: Cyber Defence & Critical National Infrastructure (CNI) -- Critical National Infrastructure, C4ISR and Cyber Weapons in the Digital Age -- The Malicious Use of AI-based Deepfake technology as the New Threat to Psychological Security and Political Stability -- Considerations for the Governance of AI and Government Legislative Frameworks -- Part 2: Augmented Humanity & Digital Society -- Augmented humanity: Data, Privacy and Security -- Consumer Awareness on Security and Privacy Threat of Medical Devices -- Biohacking Capabilities & Threat/ Attack Vectors -- Digital Twins for Precision Healthcare -- 5G Cybersecurity Vulnerabilities with IoT and Smart Societies -- Part 3: Technology of Cyber Attacks -- Blockchain, TTP Attacks and Harmonious Relationship with AI -- Protecting Privacy and Security Using Tor and Blockchain and De-anonymization Risks -- Experimental Analyses in Search of Effective Mitigation for Login Cross-Site Request Forgery -- Attack Vectors and Advanced Persistent Threats -- Artificial Intelligence in Protecting Smart Building’s Cloud Service Infrastructure from Cyberattacks -- Part 4: Smart Societies and Data Exploitation -- Smart Distributed Ledger Technologies in Industry 4.0: Challenges and Opportunities in Supply Chain Management -- Combating Domestic Abuse inflicted in smart societies -- Deep Convolutional Neural Networks for Forensic Age Estimation: a Review -- Secure Implementation of E-governance: a Case Study about Estonia -- Insider Threat.
This publication highlights the fast-moving technological advancement and infiltration of Artificial Intelligence into society. Concepts of evolution of society through interconnectivity are explored, together with how the fusion of human and technological interaction leading to Augmented Humanity is fast becoming more than just an endemic phase, but a cultural phase shift to digital societies. It aims to balance both the positive progressive outlooks such developments bring with potential issues that may stem from innovation of this kind, such as the invasive procedures of bio hacking or ethical connotations concerning the usage of digital twins. This publication will also give the reader a good level of understanding on fundamental cyber defence principles, interactions with Critical National Infrastructure (CNI) and the Command, Control, Communications and Intelligence (C3I) decision-making framework. A detailed view of the cyber-attack landscape will be garnered; touching on the tactics, techniques and procedures used, red and blue teaming initiatives, cyber resilience and the protection of larger scale systems. The integration of AI, smart societies, the human-centric approach and Augmented Humanity is discernible in the exponential growth, collection and use of [big] data; concepts woven throughout the diversity of topics covered in this publication; which also discusses the privacy and transparency of data ownership, and the potential dangers of exploitation through social media. As humans are become ever more interconnected, with the prolificacy of smart wearable devices and wearable body area networks, the availability of and abundance of user data and metadata derived from individuals has grown exponentially. The notion of data ownership, privacy and situational awareness are now at the forefront in this new age.
ISBN: 9783030357467
Standard No.: 10.1007/978-3-030-35746-7doiSubjects--Topical Terms:
783419
Security Science and Technology.
LC Class. No.: Q334-342
Dewey Class. No.: 006.3
Cyber Defence in the Age of AI, Smart Societies and Augmented Humanity
LDR
:04880nam a22004095i 4500
001
1026088
003
DE-He213
005
20200704151938.0
007
cr nn 008mamaa
008
210318s2020 gw | s |||| 0|eng d
020
$a
9783030357467
$9
978-3-030-35746-7
024
7
$a
10.1007/978-3-030-35746-7
$2
doi
035
$a
978-3-030-35746-7
050
4
$a
Q334-342
072
7
$a
UYQ
$2
bicssc
072
7
$a
COM004000
$2
bisacsh
072
7
$a
UYQ
$2
thema
082
0 4
$a
006.3
$2
23
245
1 0
$a
Cyber Defence in the Age of AI, Smart Societies and Augmented Humanity
$h
[electronic resource] /
$c
edited by Hamid Jahankhani, Stefan Kendzierskyj, Nishan Chelvachandran, Jaime Ibarra.
250
$a
1st ed. 2020.
264
1
$a
Cham :
$b
Springer International Publishing :
$b
Imprint: Springer,
$c
2020.
300
$a
VIII, 450 p. 87 illus., 72 illus. in color.
$b
online resource.
336
$a
text
$b
txt
$2
rdacontent
337
$a
computer
$b
c
$2
rdamedia
338
$a
online resource
$b
cr
$2
rdacarrier
347
$a
text file
$b
PDF
$2
rda
490
1
$a
Advanced Sciences and Technologies for Security Applications,
$x
1613-5113
505
0
$a
Foreword -- Part 1: Cyber Defence & Critical National Infrastructure (CNI) -- Critical National Infrastructure, C4ISR and Cyber Weapons in the Digital Age -- The Malicious Use of AI-based Deepfake technology as the New Threat to Psychological Security and Political Stability -- Considerations for the Governance of AI and Government Legislative Frameworks -- Part 2: Augmented Humanity & Digital Society -- Augmented humanity: Data, Privacy and Security -- Consumer Awareness on Security and Privacy Threat of Medical Devices -- Biohacking Capabilities & Threat/ Attack Vectors -- Digital Twins for Precision Healthcare -- 5G Cybersecurity Vulnerabilities with IoT and Smart Societies -- Part 3: Technology of Cyber Attacks -- Blockchain, TTP Attacks and Harmonious Relationship with AI -- Protecting Privacy and Security Using Tor and Blockchain and De-anonymization Risks -- Experimental Analyses in Search of Effective Mitigation for Login Cross-Site Request Forgery -- Attack Vectors and Advanced Persistent Threats -- Artificial Intelligence in Protecting Smart Building’s Cloud Service Infrastructure from Cyberattacks -- Part 4: Smart Societies and Data Exploitation -- Smart Distributed Ledger Technologies in Industry 4.0: Challenges and Opportunities in Supply Chain Management -- Combating Domestic Abuse inflicted in smart societies -- Deep Convolutional Neural Networks for Forensic Age Estimation: a Review -- Secure Implementation of E-governance: a Case Study about Estonia -- Insider Threat.
520
$a
This publication highlights the fast-moving technological advancement and infiltration of Artificial Intelligence into society. Concepts of evolution of society through interconnectivity are explored, together with how the fusion of human and technological interaction leading to Augmented Humanity is fast becoming more than just an endemic phase, but a cultural phase shift to digital societies. It aims to balance both the positive progressive outlooks such developments bring with potential issues that may stem from innovation of this kind, such as the invasive procedures of bio hacking or ethical connotations concerning the usage of digital twins. This publication will also give the reader a good level of understanding on fundamental cyber defence principles, interactions with Critical National Infrastructure (CNI) and the Command, Control, Communications and Intelligence (C3I) decision-making framework. A detailed view of the cyber-attack landscape will be garnered; touching on the tactics, techniques and procedures used, red and blue teaming initiatives, cyber resilience and the protection of larger scale systems. The integration of AI, smart societies, the human-centric approach and Augmented Humanity is discernible in the exponential growth, collection and use of [big] data; concepts woven throughout the diversity of topics covered in this publication; which also discusses the privacy and transparency of data ownership, and the potential dangers of exploitation through social media. As humans are become ever more interconnected, with the prolificacy of smart wearable devices and wearable body area networks, the availability of and abundance of user data and metadata derived from individuals has grown exponentially. The notion of data ownership, privacy and situational awareness are now at the forefront in this new age.
650
2 4
$a
Security Science and Technology.
$3
783419
650
2 4
$a
Privacy.
$3
575491
650
2 4
$a
Big Data.
$3
1017136
650
1 4
$a
Artificial Intelligence.
$3
646849
650
0
$a
System safety.
$3
639363
650
0
$a
Computer security.
$3
557122
650
0
$a
Big data.
$3
981821
650
0
$a
Artificial intelligence.
$3
559380
700
1
$a
Ibarra, Jaime.
$e
editor.
$4
edt
$4
http://id.loc.gov/vocabulary/relators/edt
$3
1322382
700
1
$a
Chelvachandran, Nishan.
$e
editor.
$4
edt
$4
http://id.loc.gov/vocabulary/relators/edt
$3
1322381
700
1
$a
Kendzierskyj, Stefan.
$e
editor.
$4
edt
$4
http://id.loc.gov/vocabulary/relators/edt
$3
1308530
700
1
$a
Jahankhani, Hamid.
$4
edt
$4
http://id.loc.gov/vocabulary/relators/edt
$3
681083
710
2
$a
SpringerLink (Online service)
$3
593884
773
0
$t
Springer Nature eBook
776
0 8
$i
Printed edition:
$z
9783030357450
776
0 8
$i
Printed edition:
$z
9783030357474
776
0 8
$i
Printed edition:
$z
9783030357481
830
0
$a
Advanced Sciences and Technologies for Security Applications,
$x
1613-5113
$3
1266773
856
4 0
$u
https://doi.org/10.1007/978-3-030-35746-7
912
$a
ZDB-2-SCS
912
$a
ZDB-2-SXCS
950
$a
Computer Science (SpringerNature-11645)
950
$a
Computer Science (R0) (SpringerNature-43710)
筆 0 讀者評論
多媒體
評論
新增評論
分享你的心得
Export
取書館別
處理中
...
變更密碼[密碼必須為2種組合(英文和數字)及長度為10碼以上]
登入