Language:
English
繁體中文
Help
Login
Back
Switch To:
Labeled
|
MARC Mode
|
ISBD
Demystifying AI and ML for cyber-threat intelligence
Record Type:
Language materials, printed : Monograph/item
Title/Author:
Demystifying AI and ML for cyber-threat intelligence/ edited by Ming Yang ... [et al.].
other author:
Yang, Ming.
Published:
Cham :Springer Nature Switzerland : : 2025.,
Description:
xi, 628 p. :ill. (some col.), digital ; : 24 cm.;
Contained By:
Springer Nature eBook
Subject:
Artificial intelligence - Security measures. -
Online resource:
https://doi.org/10.1007/978-3-031-90723-4
ISBN:
9783031907234
Demystifying AI and ML for cyber-threat intelligence
Demystifying AI and ML for cyber-threat intelligence
[electronic resource] /edited by Ming Yang ... [et al.]. - Cham :Springer Nature Switzerland :2025. - xi, 628 p. :ill. (some col.), digital ;24 cm. - Information systems engineering and management,v. 433004-9598 ;. - Information systems engineering and management ;v. 1..
A Comprehensive Review on the Detection Capabilities of IDS using Deep Learning Techniques -- Next-Generation Intrusion Detection Framework with Active Learning-Driven Neural Networks for DDoS Defense -- Ensemble Learning-based Intrusion Detection System for RPL-based IoT Networks -- Advancing Detection of Man-in-the-Middle Attacks through Possibilistic C-Means Clustering -- CNN-Based IDS for Internet of Vehicles Using Transfer Learning -- Real-Time Network Intrusion Detection System using Machine Learning -- OpIDS-DL : OPTIMIZING INTRUSION DETECTION IN IoT NETWORKS: A DEEP LEARNING APPROACH WITH REGULARIZATION AND DROPOUT FOR ENHANCED CYBERSECURITY -- ML-Powered Sensitive Data Loss Prevention Firewall for Generative AI Applications -- Enhancing Data Integrity: Unveiling the Potential of Reversible Logic for Error Detection and Correction -- Enhancing Cyber security through Reversible Logic -- Beyond Passwords: Enhancing Security with Continuous Behavioral Biometrics and Passive Authentication.
This book simplifies complex AI and ML concepts, making them accessible to security analysts, IT professionals, researchers, and decision-makers. Cyber threats have become increasingly sophisticated in the ever-evolving digital landscape, making traditional security measures insufficient to combat modern attacks. Artificial intelligence (AI) and machine learning (ML) have emerged as transformative tools in cybersecurity, enabling organizations to detect, prevent, and respond to threats with greater efficiency. This book is a comprehensive guide, bridging the gap between cybersecurity and AI/ML by offering clear, practical insights into their role in threat intelligence. Readers will gain a solid foundation in key AI and ML principles, including supervised and unsupervised learning, deep learning, and natural language processing (NLP) while exploring real-world applications such as intrusion detection, malware analysis, and fraud prevention. Through hands-on insights, case studies, and implementation strategies, it provides actionable knowledge for integrating AI-driven threat intelligence into security operations. Additionally, it examines emerging trends, ethical considerations, and the evolving role of AI in cybersecurity. Unlike overly technical manuals, this book balances theoretical concepts with practical applications, breaking down complex algorithms into actionable insights. Whether a seasoned professional or a beginner, readers will find this book an essential roadmap to navigating the future of cybersecurity in an AI-driven world. This book empowers its audience to stay ahead of cyber adversaries and embrace the next generation of intelligent threat detection.
ISBN: 9783031907234
Standard No.: 10.1007/978-3-031-90723-4doiSubjects--Topical Terms:
1481843
Artificial intelligence
--Security measures.
LC Class. No.: TA347.A78
Dewey Class. No.: 006.3
Demystifying AI and ML for cyber-threat intelligence
LDR
:03800nam a2200337 a 4500
001
1166458
003
DE-He213
005
20250816130156.0
006
m d
007
cr nn 008maaau
008
251217s2025 sz s 0 eng d
020
$a
9783031907234
$q
(electronic bk.)
020
$a
9783031907227
$q
(paper)
024
7
$a
10.1007/978-3-031-90723-4
$2
doi
035
$a
978-3-031-90723-4
040
$a
GP
$c
GP
041
0
$a
eng
050
4
$a
TA347.A78
072
7
$a
UYQ
$2
bicssc
072
7
$a
COM004000
$2
bisacsh
072
7
$a
UYQ
$2
thema
082
0 4
$a
006.3
$2
23
090
$a
TA347.A78
$b
D389 2025
245
0 0
$a
Demystifying AI and ML for cyber-threat intelligence
$h
[electronic resource] /
$c
edited by Ming Yang ... [et al.].
260
$a
Cham :
$c
2025.
$b
Springer Nature Switzerland :
$b
Imprint: Springer,
300
$a
xi, 628 p. :
$b
ill. (some col.), digital ;
$c
24 cm.
490
1
$a
Information systems engineering and management,
$x
3004-9598 ;
$v
v. 43
505
0
$a
A Comprehensive Review on the Detection Capabilities of IDS using Deep Learning Techniques -- Next-Generation Intrusion Detection Framework with Active Learning-Driven Neural Networks for DDoS Defense -- Ensemble Learning-based Intrusion Detection System for RPL-based IoT Networks -- Advancing Detection of Man-in-the-Middle Attacks through Possibilistic C-Means Clustering -- CNN-Based IDS for Internet of Vehicles Using Transfer Learning -- Real-Time Network Intrusion Detection System using Machine Learning -- OpIDS-DL : OPTIMIZING INTRUSION DETECTION IN IoT NETWORKS: A DEEP LEARNING APPROACH WITH REGULARIZATION AND DROPOUT FOR ENHANCED CYBERSECURITY -- ML-Powered Sensitive Data Loss Prevention Firewall for Generative AI Applications -- Enhancing Data Integrity: Unveiling the Potential of Reversible Logic for Error Detection and Correction -- Enhancing Cyber security through Reversible Logic -- Beyond Passwords: Enhancing Security with Continuous Behavioral Biometrics and Passive Authentication.
520
$a
This book simplifies complex AI and ML concepts, making them accessible to security analysts, IT professionals, researchers, and decision-makers. Cyber threats have become increasingly sophisticated in the ever-evolving digital landscape, making traditional security measures insufficient to combat modern attacks. Artificial intelligence (AI) and machine learning (ML) have emerged as transformative tools in cybersecurity, enabling organizations to detect, prevent, and respond to threats with greater efficiency. This book is a comprehensive guide, bridging the gap between cybersecurity and AI/ML by offering clear, practical insights into their role in threat intelligence. Readers will gain a solid foundation in key AI and ML principles, including supervised and unsupervised learning, deep learning, and natural language processing (NLP) while exploring real-world applications such as intrusion detection, malware analysis, and fraud prevention. Through hands-on insights, case studies, and implementation strategies, it provides actionable knowledge for integrating AI-driven threat intelligence into security operations. Additionally, it examines emerging trends, ethical considerations, and the evolving role of AI in cybersecurity. Unlike overly technical manuals, this book balances theoretical concepts with practical applications, breaking down complex algorithms into actionable insights. Whether a seasoned professional or a beginner, readers will find this book an essential roadmap to navigating the future of cybersecurity in an AI-driven world. This book empowers its audience to stay ahead of cyber adversaries and embrace the next generation of intelligent threat detection.
650
0
$a
Artificial intelligence
$x
Security measures.
$3
1481843
650
1 4
$a
Computational Intelligence.
$3
768837
650
2 4
$a
Data and Information Security.
$3
1365785
650
2 4
$a
Data Engineering.
$3
1226308
650
2 4
$a
Artificial Intelligence.
$3
646849
700
1
$a
Yang, Ming.
$3
845501
710
2
$a
SpringerLink (Online service)
$3
593884
773
0
$t
Springer Nature eBook
830
0
$a
Information systems engineering and management ;
$v
v. 1.
$3
1455467
856
4 0
$u
https://doi.org/10.1007/978-3-031-90723-4
950
$a
Intelligent Technologies and Robotics (SpringerNature-42732)
based on 0 review(s)
Multimedia
Reviews
Add a review
and share your thoughts with other readers
Export
pickup library
Processing
...
Change password
Login