Illumination of Artificial Intelligence in Cybersecurity and Forensics
Title | Illumination of Artificial Intelligence in Cybersecurity and Forensics PDF eBook |
Author | Sanjay Misra |
Publisher | Springer Nature |
Pages | 378 |
Release | 2022-02-08 |
Genre | Computers |
ISBN | 3030934535 |
This book covers a variety of topics that span from industry to academics: hybrid AI model for IDS in IoT, intelligent authentication framework for IoMT mobile devices for extracting bioelectrical signals, security audit in terms of vulnerability analysis to protect the electronic medical records in healthcare system using AI, classification using CNN a multi-face recognition attendance system with anti-spoofing capability, challenges in face morphing attack detection, a dimensionality reduction and feature-level fusion technique for morphing attack detection (MAD) systems, findings and discussion on AI-assisted forensics, challenges and open issues in the application of AI in forensics, a terrorist computational model that uses Baum–Welch optimization to improve the intelligence and predictive accuracy of the activities of criminal elements, a novel method for detecting security violations in IDSs, graphical-based city block distance algorithm method for E-payment systems, image encryption, and AI methods in ransomware mitigation and detection. It assists the reader in exploring new research areas, wherein AI can be applied to offer solutions through the contribution from researchers and academia.
Strategies for E-Commerce Data Security: Cloud, Blockchain, AI, and Machine Learning
Title | Strategies for E-Commerce Data Security: Cloud, Blockchain, AI, and Machine Learning PDF eBook |
Author | Goel, Pawan Kumar |
Publisher | IGI Global |
Pages | 689 |
Release | 2024-08-22 |
Genre | Business & Economics |
ISBN |
In the landscape of e-commerce, data security has become a concern as businesses navigate the complexities of sensitive customer information protection and cyber threat mitigation. Strategies involving cloud computing, blockchain technology, artificial intelligence, and machine learning offer solutions to strengthen data security and ensure transactional integrity. Implementing these technologies requires a balance of innovation and efficient security protocols. The development and adoption of security strategies is necessary to positively integrate cutting-edge technologies for effective security in online business. Strategies for E-Commerce Data Security: Cloud, Blockchain, AI, and Machine Learning addresses the need for advanced security measures, while examining the current state of e-commerce data security. It explores strategies such as cloud computing, blockchain, artificial intelligence, and machine learning. This book covers topics such as cybersecurity, cloud technology, and forensics, and is a useful resource for computer engineers, business owners, security professionals, government officials, academicians, scientists, and researchers.
Network Security Empowered by Artificial Intelligence
Title | Network Security Empowered by Artificial Intelligence PDF eBook |
Author | Yingying Chen |
Publisher | Springer Nature |
Pages | 443 |
Release | |
Genre | |
ISBN | 3031535103 |
Handbook of Security and Privacy of AI-Enabled Healthcare Systems and Internet of Medical Things
Title | Handbook of Security and Privacy of AI-Enabled Healthcare Systems and Internet of Medical Things PDF eBook |
Author | Agbotiname Lucky Imoize |
Publisher | CRC Press |
Pages | 536 |
Release | 2023-10-25 |
Genre | Technology & Engineering |
ISBN | 1000963268 |
The fast-growing number of patients suffering from various ailments has overstretched the carrying capacity of traditional healthcare systems. This handbook addresses the increased need to tackle security issues and preserve patients’ privacy concerns in Artificial Intelligence of Medical Things (AIoMT) devices and systems. Handbook of Security and Privacy of AI-Enabled Healthcare Systems and the Internet of Medical Things provides new insights into the deployment, application, management, and benefits of AIoMT by examining real-world scenarios. The handbook takes a critical look at existing security designs and offers solutions to revamp traditional security architecture, including the new design of effi cient intrusion detection algorithms, attack prevention techniques, and both cryptographic and noncryptographic solutions. The handbook goes on to discuss the critical security and privacy issues that affect all parties in the healthcare ecosystem and provides practical AI-based solutions. This handbook offers new and valuable information that will be highly beneficial to educators, researchers, and others. .
Big Data and Edge Intelligence for Enhanced Cyber Defense
Title | Big Data and Edge Intelligence for Enhanced Cyber Defense PDF eBook |
Author | Chhabi Rani Panigrahi |
Publisher | CRC Press |
Pages | 200 |
Release | 2024-07-31 |
Genre | Computers |
ISBN | 1040048366 |
An unfortunate outcome of the growth of the Internet and mobile technologies has been the challenge of countering cybercrime. This book introduces and explains the latest trends and techniques of edge artificial intelligence (EdgeAI) intended to help cyber security experts design robust cyber defense systems (CDS), including host-based and network-based intrusion detection system and digital forensic intelligence. This book discusses the direct confluence of EdgeAI with big data, as well as demonstrating detailed reviews of recent cyber threats and their countermeasure. It provides computational intelligence techniques and automated reasoning models capable of fast training and timely data processing of cyber security big data, in addition to other basic information related to network security. In addition, it provides a brief overview of modern cyber security threats and outlines the advantages of using EdgeAI to counter these threats, as well as exploring various cyber defense mechanisms (CDM) based on detection type and approaches. Specific challenging areas pertaining to cyber defense through EdgeAI, such as improving digital forensic intelligence, proactive and adaptive defense of network infrastructure, and bio-inspired CDM, are also discussed. This book is intended as a reference for academics and students in the field of network and cybersecurity, particularly on the topics of intrusion detection systems, smart grid, EdgeAI, and bio-inspired cyber defense principles. The front-line EdgeAI techniques discussed will also be of use to cybersecurity engineers in their work enhancing cyber defense systems.
Artificial Intelligence and Blockchain for Future Cybersecurity Applications
Title | Artificial Intelligence and Blockchain for Future Cybersecurity Applications PDF eBook |
Author | Yassine Maleh |
Publisher | Springer Nature |
Pages | 376 |
Release | 2021-04-30 |
Genre | Computers |
ISBN | 3030745759 |
This book presents state-of-the-art research on artificial intelligence and blockchain for future cybersecurity applications. The accepted book chapters covered many themes, including artificial intelligence and blockchain challenges, models and applications, cyber threats and intrusions analysis and detection, and many other applications for smart cyber ecosystems. It aspires to provide a relevant reference for students, researchers, engineers, and professionals working in this particular area or those interested in grasping its diverse facets and exploring the latest advances on artificial intelligence and blockchain for future cybersecurity applications.
Key Digital Trends Shaping the Future of Information and Management Science
Title | Key Digital Trends Shaping the Future of Information and Management Science PDF eBook |
Author | Lalit Garg |
Publisher | Springer Nature |
Pages | 640 |
Release | 2023-05-15 |
Genre | Technology & Engineering |
ISBN | 3031311531 |
This book (proceedings of ISMS 2022) is intended to be used as a reference by students and researchers who collect scientific and technical contributions with respect to models, tools, technologies and applications in the field of information systems and management science. This textbook shows how to exploit information systems in a technology-rich management field. The book introduces concepts, principles, methods, and procedures that will be valuable to students and scholars in thinking about existing organization systems, proposing new systems, and working with management professionals in implementing new information systems.