語系:
繁體中文
English
說明(常見問題)
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Explainable AI for cybersecurity
紀錄類型:
書目-語言資料,印刷品 : Monograph/item
正題名/作者:
Explainable AI for cybersecurity/ by Zhixin Pan, Prabhat Mishra.
作者:
Pan, Zhixin.
其他作者:
Mishra, Prabhat.
出版者:
Cham :Springer Nature Switzerland : : 2023.,
面頁冊數:
xviii, 243 p. :ill. (chiefly color), digital ; : 24 cm.;
Contained By:
Springer Nature eBook
標題:
Artificial Intelligence. -
電子資源:
https://doi.org/10.1007/978-3-031-46479-9
ISBN:
9783031464799
Explainable AI for cybersecurity
Pan, Zhixin.
Explainable AI for cybersecurity
[electronic resource] /by Zhixin Pan, Prabhat Mishra. - Cham :Springer Nature Switzerland :2023. - xviii, 243 p. :ill. (chiefly color), digital ;24 cm.
Part 1: Introduction -- Chapter 1. Cybersecurity Landscape for Computer Systems -- Chapter 2. Explainable Artificial Intelligence -- Part 2: Detection of Software Vulnerabilities -- Chapter 3. Malware Detection using Explainable AI -- Chapter 4. Spectre and Meltdown Detection using Explainable AI -- Part 3: Detection of Hardware Vulnerabilities -- Chapter 5. Hardware Trojan Detection using Reinforcement Learning -- Chapter 6. Hardware Trojan Detection using Side-Channel Analysis -- Chapter 7. Hardware Trojan Detection using Shapley Ensemble Boosting -- Part 4: Mitigation of AI Vulnerabilities -- Chapter 8. Mitigation of Adversarial Machine Learning -- Chapter 9. AI Trojan Attacks and Countermeasures -- Part 5: Acceleration of Explainable AI -- Chapter 10. Hardware Acceleration of Explainable AI -- Chapter 11. Explainable AI Acceleration using Tensor Processing Units -- Part 6: Conclusion -- Chapter 12. The Future of AI-Enabled Cybersecurity.
This book provides a comprehensive overview of security vulnerabilities and state-of-the-art countermeasures using explainable artificial intelligence (AI) Specifically, it describes how explainable AI can be effectively used for detection and mitigation of hardware vulnerabilities (e.g., hardware Trojans) as well as software attacks (e.g., malware and ransomware) It provides insights into the security threats towards machine learning models and presents effective countermeasures. It also explores hardware acceleration of explainable AI algorithms. The reader will be able to comprehend a complete picture of cybersecurity challenges and how to detect them using explainable AI. This book serves as a single source of reference for students, researchers, engineers, and practitioners for designing secure and trustworthy systems. Introduces a wide variety of software and hardware vulnerabilities; Describes solutions for detecting security attacks using explainable AI; Presents a fast and robust framework using hardware acceleration and mitigation of adversarial attacks.
ISBN: 9783031464799
Standard No.: 10.1007/978-3-031-46479-9doiSubjects--Topical Terms:
646849
Artificial Intelligence.
LC Class. No.: Q342 / .P36 2023
Dewey Class. No.: 006.3
Explainable AI for cybersecurity
LDR
:03030nam a2200325 a 4500
001
1120375
003
DE-He213
005
20231212134846.0
006
m d
007
cr nn 008maaau
008
240612s2023 sz s 0 eng d
020
$a
9783031464799
$q
(electronic bk.)
020
$a
9783031464782
$q
(paper)
024
7
$a
10.1007/978-3-031-46479-9
$2
doi
035
$a
978-3-031-46479-9
040
$a
GP
$c
GP
041
0
$a
eng
050
4
$a
Q342
$b
.P36 2023
072
7
$a
UYQ
$2
bicssc
072
7
$a
TEC009000
$2
bisacsh
072
7
$a
UYQ
$2
thema
082
0 4
$a
006.3
$2
23
090
$a
Q342
$b
.P187 2023
100
1
$a
Pan, Zhixin.
$3
1435625
245
1 0
$a
Explainable AI for cybersecurity
$h
[electronic resource] /
$c
by Zhixin Pan, Prabhat Mishra.
260
$a
Cham :
$c
2023.
$b
Springer Nature Switzerland :
$b
Imprint: Springer,
300
$a
xviii, 243 p. :
$b
ill. (chiefly color), digital ;
$c
24 cm.
505
0
$a
Part 1: Introduction -- Chapter 1. Cybersecurity Landscape for Computer Systems -- Chapter 2. Explainable Artificial Intelligence -- Part 2: Detection of Software Vulnerabilities -- Chapter 3. Malware Detection using Explainable AI -- Chapter 4. Spectre and Meltdown Detection using Explainable AI -- Part 3: Detection of Hardware Vulnerabilities -- Chapter 5. Hardware Trojan Detection using Reinforcement Learning -- Chapter 6. Hardware Trojan Detection using Side-Channel Analysis -- Chapter 7. Hardware Trojan Detection using Shapley Ensemble Boosting -- Part 4: Mitigation of AI Vulnerabilities -- Chapter 8. Mitigation of Adversarial Machine Learning -- Chapter 9. AI Trojan Attacks and Countermeasures -- Part 5: Acceleration of Explainable AI -- Chapter 10. Hardware Acceleration of Explainable AI -- Chapter 11. Explainable AI Acceleration using Tensor Processing Units -- Part 6: Conclusion -- Chapter 12. The Future of AI-Enabled Cybersecurity.
520
$a
This book provides a comprehensive overview of security vulnerabilities and state-of-the-art countermeasures using explainable artificial intelligence (AI) Specifically, it describes how explainable AI can be effectively used for detection and mitigation of hardware vulnerabilities (e.g., hardware Trojans) as well as software attacks (e.g., malware and ransomware) It provides insights into the security threats towards machine learning models and presents effective countermeasures. It also explores hardware acceleration of explainable AI algorithms. The reader will be able to comprehend a complete picture of cybersecurity challenges and how to detect them using explainable AI. This book serves as a single source of reference for students, researchers, engineers, and practitioners for designing secure and trustworthy systems. Introduces a wide variety of software and hardware vulnerabilities; Describes solutions for detecting security attacks using explainable AI; Presents a fast and robust framework using hardware acceleration and mitigation of adversarial attacks.
650
2 4
$a
Artificial Intelligence.
$3
646849
650
2 4
$a
Embedded Systems.
$3
1026431
650
2 4
$a
Electronics Design and Verification.
$3
1387809
650
2 4
$a
Data and Information Security.
$3
1365785
650
2 4
$a
Electronic Circuits and Systems.
$3
1366689
650
1 4
$a
Computational Intelligence.
$3
768837
650
0
$a
Internet of things
$x
Security measures.
$3
1129535
650
0
$a
Artificial intelligence
$x
Data processing.
$3
574424
700
1
$a
Mishra, Prabhat.
$3
670983
710
2
$a
SpringerLink (Online service)
$3
593884
773
0
$t
Springer Nature eBook
856
4 0
$u
https://doi.org/10.1007/978-3-031-46479-9
950
$a
Intelligent Technologies and Robotics (SpringerNature-42732)
筆 0 讀者評論
多媒體
評論
新增評論
分享你的心得
Export
取書館別
處理中
...
變更密碼[密碼必須為2種組合(英文和數字)及長度為10碼以上]
登入