語系:
繁體中文
English
說明(常見問題)
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Demystifying AI and ML for cyber-threat intelligence
紀錄類型:
書目-語言資料,印刷品 : Monograph/item
正題名/作者:
Demystifying AI and ML for cyber-threat intelligence/ edited by Ming Yang ... [et al.].
其他作者:
Yang, Ming.
出版者:
Cham :Springer Nature Switzerland : : 2025.,
面頁冊數:
xi, 628 p. :ill. (some col.), digital ; : 24 cm.;
Contained By:
Springer Nature eBook
標題:
Artificial intelligence - Security measures. -
電子資源:
https://doi.org/10.1007/978-3-031-90723-4
ISBN:
9783031907234
Demystifying AI and ML for cyber-threat intelligence
Demystifying AI and ML for cyber-threat intelligence
[electronic resource] /edited by Ming Yang ... [et al.]. - Cham :Springer Nature Switzerland :2025. - xi, 628 p. :ill. (some col.), digital ;24 cm. - Information systems engineering and management,v. 433004-9598 ;. - Information systems engineering and management ;v. 1..
A Comprehensive Review on the Detection Capabilities of IDS using Deep Learning Techniques -- Next-Generation Intrusion Detection Framework with Active Learning-Driven Neural Networks for DDoS Defense -- Ensemble Learning-based Intrusion Detection System for RPL-based IoT Networks -- Advancing Detection of Man-in-the-Middle Attacks through Possibilistic C-Means Clustering -- CNN-Based IDS for Internet of Vehicles Using Transfer Learning -- Real-Time Network Intrusion Detection System using Machine Learning -- OpIDS-DL : OPTIMIZING INTRUSION DETECTION IN IoT NETWORKS: A DEEP LEARNING APPROACH WITH REGULARIZATION AND DROPOUT FOR ENHANCED CYBERSECURITY -- ML-Powered Sensitive Data Loss Prevention Firewall for Generative AI Applications -- Enhancing Data Integrity: Unveiling the Potential of Reversible Logic for Error Detection and Correction -- Enhancing Cyber security through Reversible Logic -- Beyond Passwords: Enhancing Security with Continuous Behavioral Biometrics and Passive Authentication.
This book simplifies complex AI and ML concepts, making them accessible to security analysts, IT professionals, researchers, and decision-makers. Cyber threats have become increasingly sophisticated in the ever-evolving digital landscape, making traditional security measures insufficient to combat modern attacks. Artificial intelligence (AI) and machine learning (ML) have emerged as transformative tools in cybersecurity, enabling organizations to detect, prevent, and respond to threats with greater efficiency. This book is a comprehensive guide, bridging the gap between cybersecurity and AI/ML by offering clear, practical insights into their role in threat intelligence. Readers will gain a solid foundation in key AI and ML principles, including supervised and unsupervised learning, deep learning, and natural language processing (NLP) while exploring real-world applications such as intrusion detection, malware analysis, and fraud prevention. Through hands-on insights, case studies, and implementation strategies, it provides actionable knowledge for integrating AI-driven threat intelligence into security operations. Additionally, it examines emerging trends, ethical considerations, and the evolving role of AI in cybersecurity. Unlike overly technical manuals, this book balances theoretical concepts with practical applications, breaking down complex algorithms into actionable insights. Whether a seasoned professional or a beginner, readers will find this book an essential roadmap to navigating the future of cybersecurity in an AI-driven world. This book empowers its audience to stay ahead of cyber adversaries and embrace the next generation of intelligent threat detection.
ISBN: 9783031907234
Standard No.: 10.1007/978-3-031-90723-4doiSubjects--Topical Terms:
1481843
Artificial intelligence
--Security measures.
LC Class. No.: TA347.A78
Dewey Class. No.: 006.3
Demystifying AI and ML for cyber-threat intelligence
LDR
:03800nam a2200337 a 4500
001
1166458
003
DE-He213
005
20250816130156.0
006
m d
007
cr nn 008maaau
008
251217s2025 sz s 0 eng d
020
$a
9783031907234
$q
(electronic bk.)
020
$a
9783031907227
$q
(paper)
024
7
$a
10.1007/978-3-031-90723-4
$2
doi
035
$a
978-3-031-90723-4
040
$a
GP
$c
GP
041
0
$a
eng
050
4
$a
TA347.A78
072
7
$a
UYQ
$2
bicssc
072
7
$a
COM004000
$2
bisacsh
072
7
$a
UYQ
$2
thema
082
0 4
$a
006.3
$2
23
090
$a
TA347.A78
$b
D389 2025
245
0 0
$a
Demystifying AI and ML for cyber-threat intelligence
$h
[electronic resource] /
$c
edited by Ming Yang ... [et al.].
260
$a
Cham :
$c
2025.
$b
Springer Nature Switzerland :
$b
Imprint: Springer,
300
$a
xi, 628 p. :
$b
ill. (some col.), digital ;
$c
24 cm.
490
1
$a
Information systems engineering and management,
$x
3004-9598 ;
$v
v. 43
505
0
$a
A Comprehensive Review on the Detection Capabilities of IDS using Deep Learning Techniques -- Next-Generation Intrusion Detection Framework with Active Learning-Driven Neural Networks for DDoS Defense -- Ensemble Learning-based Intrusion Detection System for RPL-based IoT Networks -- Advancing Detection of Man-in-the-Middle Attacks through Possibilistic C-Means Clustering -- CNN-Based IDS for Internet of Vehicles Using Transfer Learning -- Real-Time Network Intrusion Detection System using Machine Learning -- OpIDS-DL : OPTIMIZING INTRUSION DETECTION IN IoT NETWORKS: A DEEP LEARNING APPROACH WITH REGULARIZATION AND DROPOUT FOR ENHANCED CYBERSECURITY -- ML-Powered Sensitive Data Loss Prevention Firewall for Generative AI Applications -- Enhancing Data Integrity: Unveiling the Potential of Reversible Logic for Error Detection and Correction -- Enhancing Cyber security through Reversible Logic -- Beyond Passwords: Enhancing Security with Continuous Behavioral Biometrics and Passive Authentication.
520
$a
This book simplifies complex AI and ML concepts, making them accessible to security analysts, IT professionals, researchers, and decision-makers. Cyber threats have become increasingly sophisticated in the ever-evolving digital landscape, making traditional security measures insufficient to combat modern attacks. Artificial intelligence (AI) and machine learning (ML) have emerged as transformative tools in cybersecurity, enabling organizations to detect, prevent, and respond to threats with greater efficiency. This book is a comprehensive guide, bridging the gap between cybersecurity and AI/ML by offering clear, practical insights into their role in threat intelligence. Readers will gain a solid foundation in key AI and ML principles, including supervised and unsupervised learning, deep learning, and natural language processing (NLP) while exploring real-world applications such as intrusion detection, malware analysis, and fraud prevention. Through hands-on insights, case studies, and implementation strategies, it provides actionable knowledge for integrating AI-driven threat intelligence into security operations. Additionally, it examines emerging trends, ethical considerations, and the evolving role of AI in cybersecurity. Unlike overly technical manuals, this book balances theoretical concepts with practical applications, breaking down complex algorithms into actionable insights. Whether a seasoned professional or a beginner, readers will find this book an essential roadmap to navigating the future of cybersecurity in an AI-driven world. This book empowers its audience to stay ahead of cyber adversaries and embrace the next generation of intelligent threat detection.
650
0
$a
Artificial intelligence
$x
Security measures.
$3
1481843
650
1 4
$a
Computational Intelligence.
$3
768837
650
2 4
$a
Data and Information Security.
$3
1365785
650
2 4
$a
Data Engineering.
$3
1226308
650
2 4
$a
Artificial Intelligence.
$3
646849
700
1
$a
Yang, Ming.
$3
845501
710
2
$a
SpringerLink (Online service)
$3
593884
773
0
$t
Springer Nature eBook
830
0
$a
Information systems engineering and management ;
$v
v. 1.
$3
1455467
856
4 0
$u
https://doi.org/10.1007/978-3-031-90723-4
950
$a
Intelligent Technologies and Robotics (SpringerNature-42732)
筆 0 讀者評論
多媒體
評論
新增評論
分享你的心得
Export
取書館別
處理中
...
變更密碼[密碼必須為2種組合(英文和數字)及長度為10碼以上]
登入