MARC details
000 -LEADER |
fixed length control field |
03014cam a22004215i 4500 |
003 - CONTROL NUMBER IDENTIFIER |
control field |
CUTN |
005 - DATE AND TIME OF LATEST TRANSACTION |
control field |
20240806101355.0 |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION |
fixed length control field |
181111s2019 gw |||| o |||| 0|eng |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
International Standard Book Number |
9783319988429 |
022 ## - INTERNATIONAL STANDARD SERIAL NUMBER |
International Standard Serial Number |
9783319988412 |
041 ## - LANGUAGE CODE |
Language |
English |
072 #7 - SUBJECT CATEGORY CODE |
Subject category code |
TEC009000 |
Source |
bisacsh |
072 #7 - SUBJECT CATEGORY CODE |
Subject category code |
UYQ |
Source |
bicssc |
072 #7 - SUBJECT CATEGORY CODE |
Subject category code |
UYQ |
Source |
thema |
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER |
Classification number |
006.3 |
Edition number |
23 |
Item number |
SIK |
245 00 - TITLE STATEMENT |
Title |
AI in Cybersecurity / |
Statement of responsibility, etc |
edited by Leslie F. Sikos. |
250 ## - EDITION STATEMENT |
Edition statement |
1st ed. 2019. |
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT) |
Place of publication, distribution, etc |
Cham, Switzerland : |
Name of publisher, distributor, etc |
Springer, |
Date of publication, distribution, etc |
2019. |
300 ## - PHYSICAL DESCRIPTION |
Extent |
1 online resource (XVII, 205 pages 49 illustrations, 29 illustrations in color.) |
505 0# - FORMATTED CONTENTS NOTE |
Contents |
OWL Ontologies in Cybersecurity: Conceptual Modeling of Cyber-Knowledge -- Knowledge Representation of Network Semantics for Reasoning-Powered Cyber-Situational Awareness -- The Security of Machine Learning Systems -- Patch Before Exploited: An Approach to Identify Targeted Software Vulnerabilities -- Applying Artificial Intelligence Methods to Network Attack Detection -- Machine Learning Algorithms for Network Intrusion Detection -- Android Application Analysis using Machine Learning Techniques. |
520 ## - SUMMARY, ETC. |
Summary, etc |
This book presents a collection of state-of-the-art AI approaches to cybersecurity and cyberthreat intelligence, offering strategic defense mechanisms for malware, addressing cybercrime, and assessing vulnerabilities to yield proactive rather than reactive countermeasures. The current variety and scope of cybersecurity threats far exceed the capabilities of even the most skilled security professionals. In addition, analyzing yesterday's security incidents no longer enables experts to predict and prevent tomorrow's attacks, which necessitates approaches that go far beyond identifying known threats. Nevertheless, there are promising avenues: complex behavior matching can isolate threats based on the actions taken, while machine learning can help detect anomalies, prevent malware infections, discover signs of illicit activities, and protect assets from hackers. In turn, knowledge representation enables automated reasoning over network data, helping achieve cybersituational awareness. Bringing together contributions by high-caliber experts, this book suggests new research directions in this critical and rapidly growing field. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name as entry element |
Artificial intelligence. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name as entry element |
Computational intelligence. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name as entry element |
Data protection. |
650 14 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name as entry element |
Computational Intelligence. |
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name as entry element |
Artificial Intelligence. |
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name as entry element |
Security. |
700 1# - ADDED ENTRY--PERSONAL NAME |
Personal name |
Sikos, Leslie F. |
942 ## - ADDED ENTRY ELEMENTS (KOHA) |
Source of classification or shelving scheme |
Dewey Decimal Classification |
Koha item type |
General Books |
490 1# - SERIES STATEMENT |
Series statement |
Intelligent Systems Reference Library, |
International Standard Serial Number |
1868-4394 ; |
Volume number/sequential designation |
151 |
700 1# - ADDED ENTRY--PERSONAL NAME |
Relator term |
editor. |
776 08 - ADDITIONAL PHYSICAL FORM ENTRY |
Display text |
Print version: |
Title |
AI in cybersecurity. |
International Standard Book Number |
9783319988412 |
Record control number |
(DLC) 2018950921 |
776 08 - ADDITIONAL PHYSICAL FORM ENTRY |
Display text |
Printed edition: |
International Standard Book Number |
9783030075392 |
776 08 - ADDITIONAL PHYSICAL FORM ENTRY |
Display text |
Printed edition: |
International Standard Book Number |
9783319988412 |
776 08 - ADDITIONAL PHYSICAL FORM ENTRY |
Display text |
Printed edition: |
International Standard Book Number |
9783319988436 |
830 #0 - SERIES ADDED ENTRY--UNIFORM TITLE |
Uniform title |
Intelligent Systems Reference Library, |
Volume number/sequential designation |
151 |
906 ## - LOCAL DATA ELEMENT F, LDF (RLIN) |
a |
0 |
b |
ibc |
c |
origres |
d |
u |
e |
ncip |
f |
20 |
g |
y-gencatlg |