語系:
繁體中文
English
說明(常見問題)
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Utilizing generative AI for cyber defense strategies
紀錄類型:
書目-語言資料,印刷品 : Monograph/item
正題名/作者:
Utilizing generative AI for cyber defense strategies/ Noor Zaman Jhanjhi.
其他題名:
Utilizing generative artificial intelligence for cyber defense strategies
作者:
Jhanjhi, Noor Zaman.
出版者:
Hershey, Pennsylvania :IGI Global, : 2025.,
面頁冊數:
1 online resource (xix, 525 p.) :ill. :
標題:
Artificial intelligence. -
電子資源:
http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/979-8-3693-8944-7
ISBN:
9798369389461
Utilizing generative AI for cyber defense strategies
Jhanjhi, Noor Zaman.
Utilizing generative AI for cyber defense strategies
[electronic resource] /Utilizing generative artificial intelligence for cyber defense strategiesNoor Zaman Jhanjhi. - Hershey, Pennsylvania :IGI Global,2025. - 1 online resource (xix, 525 p.) :ill. - Advances in digital crime, forensics, and cyber terrorism (ADCFCT) book series. - Advances in digital crime, forensics, and cyber terrorism (ADCFCT) book series..
Includes bibliographical references and index.
Preface -- Chapter 1. Federated Learning for Collaborative Cyber Defense -- Chapter 2. Risk Assessment and Mitigation With Generative AI Models -- Chapter 3. Dynamic Defense Strategies With Generative AI -- Chapter 4. Unleashing thePower of Generative Adversarial Networks for Cybersecurity: Proactive Defense and Innovation -- Chapter 5. Enhancing Security Through Generative AI-Based Authentication -- Chapter 6. Generative AI for Threat Intelligence and Information Sharing -- Chapter 7. Generative AI for Threat Hunting and Behaviour Analysis -- Chapter 8. A Methodical Approach to Exploiting Vulnerabilities and Countermeasures Using AI -- Chapter 9. Variational Autoencoders (VAEs) for Anomaly Detection --Chapter 10. A Novel Approach for Intrusion Detection System Using Deep Learning Architecture -- Chapter 11. A New Approach for Detecting Malware Using a Convolutional Autoencoder With Kernel Density Estimation -- Chapter 12. Scouting the Juncture of Internet of Things (IoT), Deep Learning, and Cybercrime: Powering Legal Perspectives on Advanced Data Analytics -- Chapter 13. Muscles of Deep Learning (DL) and Internet of Things (IoT) in Cyber Crimes Investigation: Legal Dimensions in Space-Age Data Analytics -- Chapter 14. Safeguarding the Future: Advancements in Cybersecurity via Generative AI -- Compilation of References -- About the Contributors -- Index.
"As cyber threats become increasingly sophisticated, the need for innovative defense strategies becomes urgent. Generative artificial intelligence (AI) offers a revolutionary approach to enhance cybersecurity. By utilizing advanced algorithms, data analysis, and machine learning, generative AI can simulate complex attack scenarios, identify vulnerabilities, and develop proactive defense mechanisms while adapting to modern-day cyber-attacks. AI strengthens current organizational security while offering quick, effective responses to emerging threats. Decisive strategies are needed to integrate generative AI into businesses defense strategies and protect organizations from attacks, secure digital data, andensure safe business processes. Utilizing Generative AI for Cyber Defense Strategies explores the utilization of generative AI tools in organizational cyber security and defense. Strategies for effective threat detection and mitigation arepresented, with an emphasis on deep learning, artificial intelligence, and Internet of Things (IoT) technology. This book covers topics such as cyber security, threat intelligence, and behavior analysis, and is a useful resource for computerengineers, security professionals, business owners, government officials, data analysts, academicians, scientists, and researchers."--
Mode of access: World Wide Web.
ISBN: 9798369389461Subjects--Topical Terms:
559380
Artificial intelligence.
Subjects--Index Terms:
Anomaly Detection.Index Terms--Genre/Form:
554714
Electronic books.
LC Class. No.: QA76.9.A25 / J43 2024eb
Dewey Class. No.: 005.8
Utilizing generative AI for cyber defense strategies
LDR
:04416nam a2200481 a 4500
001
1168700
006
m o d
007
cr nn |||muauu
008
251230s2025 paua ob 001 0 eng d
020
$a
9798369389461
$q
(ebook)
020
$z
9798369389447
$q
(hardback)
035
$a
(CaBNVSL)slc00006840
035
$a
(OCoLC)1459227554
035
$a
00353340
040
$a
CaBNVSL
$b
eng
$c
CaBNVSL
$d
CaBNVSL
041
0
$a
eng
050
4
$a
QA76.9.A25
$b
J43 2024eb
082
0 4
$a
005.8
$2
23
100
1
$a
Jhanjhi, Noor Zaman.
$e
editor.
$3
1387658
245
1 0
$a
Utilizing generative AI for cyber defense strategies
$h
[electronic resource] /
$c
Noor Zaman Jhanjhi.
246
3
$a
Utilizing generative artificial intelligence for cyber defense strategies
260
$a
Hershey, Pennsylvania :
$b
IGI Global,
$c
2025.
300
$a
1 online resource (xix, 525 p.) :
$b
ill.
490
1
$a
Advances in digital crime, forensics, and cyber terrorism (ADCFCT) book series
504
$a
Includes bibliographical references and index.
505
0
$a
Preface -- Chapter 1. Federated Learning for Collaborative Cyber Defense -- Chapter 2. Risk Assessment and Mitigation With Generative AI Models -- Chapter 3. Dynamic Defense Strategies With Generative AI -- Chapter 4. Unleashing thePower of Generative Adversarial Networks for Cybersecurity: Proactive Defense and Innovation -- Chapter 5. Enhancing Security Through Generative AI-Based Authentication -- Chapter 6. Generative AI for Threat Intelligence and Information Sharing -- Chapter 7. Generative AI for Threat Hunting and Behaviour Analysis -- Chapter 8. A Methodical Approach to Exploiting Vulnerabilities and Countermeasures Using AI -- Chapter 9. Variational Autoencoders (VAEs) for Anomaly Detection --Chapter 10. A Novel Approach for Intrusion Detection System Using Deep Learning Architecture -- Chapter 11. A New Approach for Detecting Malware Using a Convolutional Autoencoder With Kernel Density Estimation -- Chapter 12. Scouting the Juncture of Internet of Things (IoT), Deep Learning, and Cybercrime: Powering Legal Perspectives on Advanced Data Analytics -- Chapter 13. Muscles of Deep Learning (DL) and Internet of Things (IoT) in Cyber Crimes Investigation: Legal Dimensions in Space-Age Data Analytics -- Chapter 14. Safeguarding the Future: Advancements in Cybersecurity via Generative AI -- Compilation of References -- About the Contributors -- Index.
520
3
$a
"As cyber threats become increasingly sophisticated, the need for innovative defense strategies becomes urgent. Generative artificial intelligence (AI) offers a revolutionary approach to enhance cybersecurity. By utilizing advanced algorithms, data analysis, and machine learning, generative AI can simulate complex attack scenarios, identify vulnerabilities, and develop proactive defense mechanisms while adapting to modern-day cyber-attacks. AI strengthens current organizational security while offering quick, effective responses to emerging threats. Decisive strategies are needed to integrate generative AI into businesses defense strategies and protect organizations from attacks, secure digital data, andensure safe business processes. Utilizing Generative AI for Cyber Defense Strategies explores the utilization of generative AI tools in organizational cyber security and defense. Strategies for effective threat detection and mitigation arepresented, with an emphasis on deep learning, artificial intelligence, and Internet of Things (IoT) technology. This book covers topics such as cyber security, threat intelligence, and behavior analysis, and is a useful resource for computerengineers, security professionals, business owners, government officials, data analysts, academicians, scientists, and researchers."--
$c
Provided by publisher.
538
$a
Mode of access: World Wide Web.
650
0
$a
Artificial intelligence.
$3
559380
650
0
$a
Computer security.
$3
557122
650
0
$a
Information storage and retrieval systems
$x
Management.
$3
1498777
650
0
$a
Information technology
$x
Management.
$3
559272
650
0
$a
Data privacy.
$3
1424015
650
0
$a
Data protection.
$3
557764
653
$a
Anomaly Detection.
653
$a
Authentication Technologies.
653
$a
Behavior Analysis.
653
$a
Cyber Security.
653
$a
Data Analytics.
653
$a
Deep Learning.
653
$a
Defense Strategies.
653
$a
Federated Learning.
653
$a
Generative AI.
653
$a
Information Sharing.
653
$a
Internet of Things (IoT)
653
$a
Malware.
653
$a
Risk Assessment and Mitigation.
653
$a
Threat Intelligence.
653
$a
Variational Autoencoders (VAEs)
655
4
$a
Electronic books.
$2
local
$3
554714
710
2
$a
IGI Global.
$3
805187
776
0 8
$i
Print version:
$z
9798369389447
830
0
$a
Advances in digital crime, forensics, and cyber terrorism (ADCFCT) book series.
$3
1427449
856
4 0
$u
http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/979-8-3693-8944-7
筆 0 讀者評論
多媒體
評論
新增評論
分享你的心得
Export
取書館別
處理中
...
變更密碼[密碼必須為2種組合(英文和數字)及長度為10碼以上]
登入