AI tools for protecting and preventing sophisticated cyber attacks / edited by Eduard Babulak.
"The ubiquity and pervasive access to internet resources 24/7 by anyone from anywhere is enabling access to endless professional, educational, technical, business, industrial, medical, and government resources worldwide. To guarantee internet integrity and availability with confidentiality, the...
Saved in:
Other Authors: | |
---|---|
Format: | Ebook |
Language: | English |
Published: |
Hershey, PA :
Information Science Reference, an imprint of IGI Global,
2023.
|
Subjects: | |
Online Access: | IGI Global e-Book Collection |
MARC
LEADER | 00000nzm a22000004i 4500 | ||
---|---|---|---|
005 | 20230901130321.0 | ||
007 | cr mn|||||n||| | ||
008 | 230202s2023 pau ob 001 0 eng d | ||
010 | |z 2023004834 | ||
011 | |a Z3950 Search: @or @attr 1=7 "9781668471104" @attr 1=7 "9781668471128" | ||
011 | |a Z3950 Record: 0 of 2 | ||
020 | |a 1668471124 |q ebook | ||
020 | |a 9781668471128 |q ebook | ||
020 | |a 1668471108 |q Internet | ||
020 | |a 9781668471104 |q Internet | ||
020 | |z 1668471116 |q s/c | ||
020 | |z 9781668471111 |q s/c | ||
035 | |a (EDS)EDS102195858 | ||
040 | |a DLC |b eng |e rda |c DLC |d YDX |d Z5A | ||
042 | |a pcc | ||
050 | 0 | 0 | |a QA76.9.A25 |b A4155 2023 |
082 | 0 | 0 | |a 005.8 |
099 | |a 005.8 AI | ||
245 | 0 | 0 | |a AI tools for protecting and preventing sophisticated cyber attacks / |c edited by Eduard Babulak. |
264 | 1 | |a Hershey, PA : |b Information Science Reference, an imprint of IGI Global, |c 2023. | |
300 | |a 1 online resource | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
504 | |a Includes bibliographical references and index. | ||
505 | 0 | 0 | |g 1. |t The Role of Artificial Intelligence in Cyber Security / |r Karmel Arockiasamy -- |g 2. |t The AI Application in Cybersecurity / |r Kiranbhai Dodiya, Dipak Kumar Mahida, Ankita Patel, Kapil Kumar -- |g 3. |t AI Applications in Cybersecurity: Worldwide and Saudi Arabia Focus / |r Ahmad Fahad Aljuryyed, Nawaf Ahmed Almufarriji, Sulaiman Sami Refaee, Naif Ayub Hussain, Rayan Saadullah Aziz -- |g 4. |t Artificial Intelligence for Information Security / |r Lubana Isaoglu, Derya Yiltas-Kaplan -- |g 5. |t Hardware and Software Cyber Security Tools / |r Tamalika Das, Nabonita Nath, Kshounish Acharyya, Shirsa Chakraborty, Parag Chatterjee -- |g 6. |t Zero Day Vulnerabilities Assessments, Exploits Detection, and Various Design Patterns in Cyber Software / |r Vidhanth Maan Thapa, Sudhanshu Srivastava, Shelly Garg -- |g 7. |t Detection of Phishing Websites / |r Lakshmipathi Gejjala, Muthukumar Arunachalam, Bala Manikanta Eswar Duggisetty, Jaswanth Kumar Reddy Vardireddy -- |g 8. |t Real-Time Object Detection in Video for Traffic Monitoring / |r Sai Deepak Alapati, Muthukumar Arunachalam, Chandana Chennamsetty, Pujitha Dantam, Anusha Dabbara. |
520 | |a "The ubiquity and pervasive access to internet resources 24/7 by anyone from anywhere is enabling access to endless professional, educational, technical, business, industrial, medical, and government resources worldwide. To guarantee internet integrity and availability with confidentiality, the provision of proper and effective cyber security is critical for any organization across the world.AI Tools for Protecting and Preventing Sophisticated Cyber Attacks illuminates the most effective and practical applications of artificial intelligence (AI) in securing critical cyber infrastructure and internet communities worldwide. The book presents a collection of selected peer-reviewed chapters addressing the most important issues, technical solutions, and future research directions in cyber security. Covering topics such as assessment metrics, information security, and toolkits, this premier reference source is an essential resource for cyber security experts, cyber systems administrators, IT experts, internet and computer network professionals, organizational leaders, students and educators of higher education, researchers, and academicians."--Publisher's website. | ||
650 | 0 | |a Computer security. |9 327365 | |
650 | 0 | |a Artificial intelligence. |9 314134 | |
650 | 0 | |a Computer networks |x Security measures. |9 328166 | |
650 | 0 | |a Computer crimes |x Prevention. |9 371778 | |
700 | 1 | |a Babulak, Eduard, |d 1957- |e editor. | |
776 | 1 | 8 | |w (OCoLC)1369147531 |
856 | 4 | 0 | |u https://ezproxy.aut.ac.nz/login?url=https://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-6684-7110-4 |z IGI Global e-Book Collection |x TEMPORARY ERM URL |
942 | |c EB |n 0 | ||
999 | |c 1793799 |d 1793799 |