Amazon cover image
Image from Amazon.com
Image from Google Jackets

AI in Cybersecurity / edited by Leslie F. Sikos.

Contributor(s): Material type: TextTextLanguage: English Series: Intelligent Systems Reference Library ; 151Publication details: Cham, Switzerland : Springer, 2019.Edition: 1st ed. 2019Description: 1 online resource (XVII, 205 pages 49 illustrations, 29 illustrations in color.)ISBN:
  • 9783319988429
ISSN:
  • 9783319988412
Subject(s): Additional physical formats: Print version:: AI in cybersecurity.; Printed edition:: No title; Printed edition:: No title; Printed edition:: No titleDDC classification:
  • 006.3 23 SIK
Contents:
OWL Ontologies in Cybersecurity: Conceptual Modeling of Cyber-Knowledge -- Knowledge Representation of Network Semantics for Reasoning-Powered Cyber-Situational Awareness -- The Security of Machine Learning Systems -- Patch Before Exploited: An Approach to Identify Targeted Software Vulnerabilities -- Applying Artificial Intelligence Methods to Network Attack Detection -- Machine Learning Algorithms for Network Intrusion Detection -- Android Application Analysis using Machine Learning Techniques.
Summary: This book presents a collection of state-of-the-art AI approaches to cybersecurity and cyberthreat intelligence, offering strategic defense mechanisms for malware, addressing cybercrime, and assessing vulnerabilities to yield proactive rather than reactive countermeasures. The current variety and scope of cybersecurity threats far exceed the capabilities of even the most skilled security professionals. In addition, analyzing yesterday's security incidents no longer enables experts to predict and prevent tomorrow's attacks, which necessitates approaches that go far beyond identifying known threats. Nevertheless, there are promising avenues: complex behavior matching can isolate threats based on the actions taken, while machine learning can help detect anomalies, prevent malware infections, discover signs of illicit activities, and protect assets from hackers. In turn, knowledge representation enables automated reasoning over network data, helping achieve cybersituational awareness. Bringing together contributions by high-caliber experts, this book suggests new research directions in this critical and rapidly growing field.
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
Holdings
Item type Current library Collection Call number Status Barcode
General Books General Books CUTN Central Library Generalia Non-fiction 006.3 SIK (Browse shelf(Opens below)) Available 49555

OWL Ontologies in Cybersecurity: Conceptual Modeling of Cyber-Knowledge -- Knowledge Representation of Network Semantics for Reasoning-Powered Cyber-Situational Awareness -- The Security of Machine Learning Systems -- Patch Before Exploited: An Approach to Identify Targeted Software Vulnerabilities -- Applying Artificial Intelligence Methods to Network Attack Detection -- Machine Learning Algorithms for Network Intrusion Detection -- Android Application Analysis using Machine Learning Techniques.

This book presents a collection of state-of-the-art AI approaches to cybersecurity and cyberthreat intelligence, offering strategic defense mechanisms for malware, addressing cybercrime, and assessing vulnerabilities to yield proactive rather than reactive countermeasures. The current variety and scope of cybersecurity threats far exceed the capabilities of even the most skilled security professionals. In addition, analyzing yesterday's security incidents no longer enables experts to predict and prevent tomorrow's attacks, which necessitates approaches that go far beyond identifying known threats. Nevertheless, there are promising avenues: complex behavior matching can isolate threats based on the actions taken, while machine learning can help detect anomalies, prevent malware infections, discover signs of illicit activities, and protect assets from hackers. In turn, knowledge representation enables automated reasoning over network data, helping achieve cybersituational awareness. Bringing together contributions by high-caliber experts, this book suggests new research directions in this critical and rapidly growing field.

There are no comments on this title.

to post a comment.