AI in Cybersecurity / (Record no. 43310)

MARC details
000 -LEADER
fixed length control field 03014cam a22004215i 4500
003 - CONTROL NUMBER IDENTIFIER
control field CUTN
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20240806101355.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 181111s2019 gw |||| o |||| 0|eng
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9783319988429
022 ## - INTERNATIONAL STANDARD SERIAL NUMBER
International Standard Serial Number 9783319988412
041 ## - LANGUAGE CODE
Language English
072 #7 - SUBJECT CATEGORY CODE
Subject category code TEC009000
Source bisacsh
072 #7 - SUBJECT CATEGORY CODE
Subject category code UYQ
Source bicssc
072 #7 - SUBJECT CATEGORY CODE
Subject category code UYQ
Source thema
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 006.3
Edition number 23
Item number SIK
245 00 - TITLE STATEMENT
Title AI in Cybersecurity /
Statement of responsibility, etc edited by Leslie F. Sikos.
250 ## - EDITION STATEMENT
Edition statement 1st ed. 2019.
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT)
Place of publication, distribution, etc Cham, Switzerland :
Name of publisher, distributor, etc Springer,
Date of publication, distribution, etc 2019.
300 ## - PHYSICAL DESCRIPTION
Extent 1 online resource (XVII, 205 pages 49 illustrations, 29 illustrations in color.)
505 0# - FORMATTED CONTENTS NOTE
Contents OWL Ontologies in Cybersecurity: Conceptual Modeling of Cyber-Knowledge -- Knowledge Representation of Network Semantics for Reasoning-Powered Cyber-Situational Awareness -- The Security of Machine Learning Systems -- Patch Before Exploited: An Approach to Identify Targeted Software Vulnerabilities -- Applying Artificial Intelligence Methods to Network Attack Detection -- Machine Learning Algorithms for Network Intrusion Detection -- Android Application Analysis using Machine Learning Techniques.
520 ## - SUMMARY, ETC.
Summary, etc This book presents a collection of state-of-the-art AI approaches to cybersecurity and cyberthreat intelligence, offering strategic defense mechanisms for malware, addressing cybercrime, and assessing vulnerabilities to yield proactive rather than reactive countermeasures. The current variety and scope of cybersecurity threats far exceed the capabilities of even the most skilled security professionals. In addition, analyzing yesterday's security incidents no longer enables experts to predict and prevent tomorrow's attacks, which necessitates approaches that go far beyond identifying known threats. Nevertheless, there are promising avenues: complex behavior matching can isolate threats based on the actions taken, while machine learning can help detect anomalies, prevent malware infections, discover signs of illicit activities, and protect assets from hackers. In turn, knowledge representation enables automated reasoning over network data, helping achieve cybersituational awareness. Bringing together contributions by high-caliber experts, this book suggests new research directions in this critical and rapidly growing field.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Artificial intelligence.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computational intelligence.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Data protection.
650 14 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computational Intelligence.
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Artificial Intelligence.
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Security.
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Sikos, Leslie F.
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Source of classification or shelving scheme Dewey Decimal Classification
Koha item type General Books
490 1# - SERIES STATEMENT
Series statement Intelligent Systems Reference Library,
International Standard Serial Number 1868-4394 ;
Volume number/sequential designation 151
700 1# - ADDED ENTRY--PERSONAL NAME
Relator term editor.
776 08 - ADDITIONAL PHYSICAL FORM ENTRY
Display text Print version:
Title AI in cybersecurity.
International Standard Book Number 9783319988412
Record control number (DLC) 2018950921
776 08 - ADDITIONAL PHYSICAL FORM ENTRY
Display text Printed edition:
International Standard Book Number 9783030075392
776 08 - ADDITIONAL PHYSICAL FORM ENTRY
Display text Printed edition:
International Standard Book Number 9783319988412
776 08 - ADDITIONAL PHYSICAL FORM ENTRY
Display text Printed edition:
International Standard Book Number 9783319988436
830 #0 - SERIES ADDED ENTRY--UNIFORM TITLE
Uniform title Intelligent Systems Reference Library,
Volume number/sequential designation 151
906 ## - LOCAL DATA ELEMENT F, LDF (RLIN)
a 0
b ibc
c origres
d u
e ncip
f 20
g y-gencatlg
Holdings
Withdrawn status Lost status Source of classification or shelving scheme Damaged status Not for loan Collection code Home library Location Shelving location Date of Cataloging Total Checkouts Full call number Barcode Date last seen Price effective from Koha item type
    Dewey Decimal Classification     Non-fiction CUTN Central Library CUTN Central Library Generalia 06/08/2024   006.3 SIK 49555 06/08/2024 06/08/2024 General Books