Language:
English
繁體中文
Help
Login
Back
Switch To:
Labeled
|
MARC Mode
|
ISBD
Integrating artificial intelligence in cybersecurity and forensic practices
Record Type:
Language materials, printed : Monograph/item
Title/Author:
Integrating artificial intelligence in cybersecurity and forensic practices/ Marwan Omar, Hewa Majeed Zangana, Derek Mohammed, editors.
other author:
Mohammed, Derek.
Published:
Hershey, Pennsylvania :IGI Global, : 2025.,
Description:
1 online resource (xviii, 484 p.) :ill. :
Subject:
Computer security. -
Online resource:
http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/979-8-3373-0588-2
ISBN:
9798337305905
Integrating artificial intelligence in cybersecurity and forensic practices
Integrating artificial intelligence in cybersecurity and forensic practices
[electronic resource] /Marwan Omar, Hewa Majeed Zangana, Derek Mohammed, editors. - Hershey, Pennsylvania :IGI Global,2025. - 1 online resource (xviii, 484 p.) :ill. - Advances in information security, privacy, and ethics (AISPE) book series. - Advances in information security, privacy, and ethics (AISPE) book series..
Includes bibliographical references and index.
Preface -- Chapter 1. Introduction to Artificial Intelligence in Cybersecurity and Forensic Science -- Chapter 2. The Role of Machine Learning and Deep Learning in Threat Detection -- Chapter 3. Using Natural Language Processing (NLP) for Phishing and Spam Detection -- Chapter 4. Network Forensics and Traffic Analysis With Machine Learning -- Chapter 5. Image Denoising Techniques for Cybersecurity and Forensic Applications: AI-Driven Approaches -- Chapter 6. AutomatedEvidence Collection and Analysis Using AI -- Chapter 7. How Human-Centered Cybersecurity (HCC) Training Fosters Organizational Cybersecurity Cultures (CSC) -- Chapter 8. The Role of Cybersecurity Legislation in Promoting Data Privacy -- Chapter 9. Digital Forensic Data Mining and Pattern Recognition -- Chapter 10. Improving AppSec Resiliency, Monitoring, Risk Assessment, and Compliance by Bridging DevSecOps With SOCs -- Chapter 11. An In-Depth Investigation on Hardware Trojans Testing Into Cyber Security Concerns Using Machine Learning Models -- Chapter 12. Source Code Analysis With Deep Neural Networks -- Chapter 13. An In-Depth Analysis of a Cyber Attack: Case Study and Security Insights -- Chapter 14. UsingMachine Learning to Identify High-Risk Employee Activity in Proactive Insider Threat Detection -- Compilation of References -- About the Contributors -- Index.
Integrating Artificial Intelligence in Cybersecurity and Forensic Practices explores the evolving role of AI in cybersecurity and forensic science. It delves into key AI techniques, discussing their applications, benefits, and challenges in tackling modern cyber threats and forensic investigations. Covering topics such as automation, deep neural networks, and traffic analysis, this book is an excellent resource for professionals, researchers, students, IT security managers, threat analysts, digital forensic investigators, and more.
Mode of access: World Wide Web.
ISBN: 9798337305905Subjects--Topical Terms:
557122
Computer security.
Subjects--Index Terms:
Artificial Intelligence (AI)Index Terms--Genre/Form:
554714
Electronic books.
LC Class. No.: QA76.9.A25 / I58 2025eb
Dewey Class. No.: 005.8
Integrating artificial intelligence in cybersecurity and forensic practices
LDR
:03795nam a2200553 a 4500
001
1168727
006
m o d
007
cr nn |||muauu
008
251230s2025 paua ob 001 0 eng d
020
$a
9798337305905
$q
(ebook)
020
$z
9798337305882
$q
(hardback)
020
$z
9798337305899
$q
(paperback)
035
$a
(CaBNVSL)slc00007244
035
$a
(OCoLC)1479494548
035
$a
00360022
040
$a
CaBNVSL
$b
eng
$c
CaBNVSL
$d
CaBNVSL
041
0
$a
eng
050
4
$a
QA76.9.A25
$b
I58 2025eb
082
0 4
$a
005.8
$2
23
245
0 0
$a
Integrating artificial intelligence in cybersecurity and forensic practices
$h
[electronic resource] /
$c
Marwan Omar, Hewa Majeed Zangana, Derek Mohammed, editors.
260
$a
Hershey, Pennsylvania :
$b
IGI Global,
$c
2025.
300
$a
1 online resource (xviii, 484 p.) :
$b
ill.
490
1
$a
Advances in information security, privacy, and ethics (AISPE) book series
504
$a
Includes bibliographical references and index.
505
0
$a
Preface -- Chapter 1. Introduction to Artificial Intelligence in Cybersecurity and Forensic Science -- Chapter 2. The Role of Machine Learning and Deep Learning in Threat Detection -- Chapter 3. Using Natural Language Processing (NLP) for Phishing and Spam Detection -- Chapter 4. Network Forensics and Traffic Analysis With Machine Learning -- Chapter 5. Image Denoising Techniques for Cybersecurity and Forensic Applications: AI-Driven Approaches -- Chapter 6. AutomatedEvidence Collection and Analysis Using AI -- Chapter 7. How Human-Centered Cybersecurity (HCC) Training Fosters Organizational Cybersecurity Cultures (CSC) -- Chapter 8. The Role of Cybersecurity Legislation in Promoting Data Privacy -- Chapter 9. Digital Forensic Data Mining and Pattern Recognition -- Chapter 10. Improving AppSec Resiliency, Monitoring, Risk Assessment, and Compliance by Bridging DevSecOps With SOCs -- Chapter 11. An In-Depth Investigation on Hardware Trojans Testing Into Cyber Security Concerns Using Machine Learning Models -- Chapter 12. Source Code Analysis With Deep Neural Networks -- Chapter 13. An In-Depth Analysis of a Cyber Attack: Case Study and Security Insights -- Chapter 14. UsingMachine Learning to Identify High-Risk Employee Activity in Proactive Insider Threat Detection -- Compilation of References -- About the Contributors -- Index.
520
3
$a
Integrating Artificial Intelligence in Cybersecurity and Forensic Practices explores the evolving role of AI in cybersecurity and forensic science. It delves into key AI techniques, discussing their applications, benefits, and challenges in tackling modern cyber threats and forensic investigations. Covering topics such as automation, deep neural networks, and traffic analysis, this book is an excellent resource for professionals, researchers, students, IT security managers, threat analysts, digital forensic investigators, and more.
538
$a
Mode of access: World Wide Web.
650
0
$a
Computer security.
$3
557122
650
0
$a
Forensic sciences.
$3
563977
650
0
$a
Artificial intelligence.
$3
559380
650
0
$a
Computer networks
$x
Security measures.
$3
555385
650
0
$a
Criminal investigation
$x
Technological innovations.
$3
1201125
653
$a
Artificial Intelligence (AI)
653
$a
Automation.
653
$a
Cyber Attacks.
653
$a
Cybersecurity.
653
$a
Data Mining.
653
$a
Data Privacy.
653
$a
Deep Learning.
653
$a
Deep Neural Networks.
653
$a
Forensics.
653
$a
Hardware Trojans.
653
$a
Human-Centered Cybersecurity (HCC)
653
$a
Image Denoising.
653
$a
Machine Learning (ML)
653
$a
Natural Language Processing (NLP)
653
$a
Network Forensics.
653
$a
Organizational Cybersecurity Cultures (CSC)
653
$a
Pattern Recognition.
653
$a
Phishing.
653
$a
Risk Assessment.
653
$a
Threat Detection.
653
$a
Traffic Analysis.
655
4
$a
Electronic books.
$2
local
$3
554714
700
1
$a
Mohammed, Derek.
$3
1498829
700
1
$a
Zangana, Hewa Majeed,
$d
1987-
$3
1498830
700
1
$a
Omar, Marwan,
$d
1982-
$3
1090884
710
2
$a
IGI Global.
$3
805187
776
0 8
$i
Print version:
$z
9798337305882
830
0
$a
Advances in information security, privacy, and ethics (AISPE) book series.
$3
1427689
856
4 0
$u
http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/979-8-3373-0588-2
based on 0 review(s)
Multimedia
Reviews
Add a review
and share your thoughts with other readers
Export
pickup library
Processing
...
Change password
Login