Understanding AI in Cybersecurity and Secure AI : Challenges, Strategies and Trends

This book presents an overview of the emerging topics in Artificial Intelligence (AI) and cybersecurity and addresses the latest AI models that could be potentially applied to a range of cybersecurity areas. Furthermore, it provides different techniques of how to make the AI algorithms secure from a...

Full description

Saved in:
Bibliographic Details
Main Authors Sharma, Dilli Prasad (Author), Habibi Lashkari, Arash (Author), Firoozjaei, Mahdi Daghmehchi (Author), Mahdavifar, Samaneh (Author), Xiong, Pulei (Author)
Format Electronic eBook
LanguageEnglish
Published Cham : Springer Nature Switzerland : Imprint: Springer, 2025.
Edition1st ed. 2025.
SeriesProgress in IS
Subjects
Online AccessFull text
ISBN9783031915246
9783031915239
ISSN2196-8713
Physical Description1 online zdroj

Cover

LEADER 00000nam a2200000 i 4500
001 114320
003 CZ-ZlUTB
005 20251126155335.0
006 m o d
007 cr un|||||||||
008 250626s2025 xx o ||| 0 eng d
020 |a 9783031915246  |q (electronic bk.) 
020 |z 9783031915239 
040 |a EBZ  |b eng  |c EBZ  |e rda 
100 1 |a Sharma, Dilli Prasad.  |4 aut 
245 1 0 |a Understanding AI in Cybersecurity and Secure AI :  |b Challenges, Strategies and Trends /  |c by Dilli Prasad Sharma, Arash Habibi Lashkari, Mahdi Daghmehchi Firoozjaei, Samaneh Mahdavifar, Pulei Xiong. 
250 |a 1st ed. 2025. 
264 1 |a Cham :  |b Springer Nature Switzerland :  |b Imprint: Springer,  |c 2025. 
300 |a 1 online zdroj 
336 |a text  |b txt  |2 rdacontent 
337 |a počítač  |b c  |2 rdamedia 
338 |a online zdroj  |b cr  |2 rdacarrier 
490 1 |a Progress in IS,  |x 2196-8713 
505 0 |a Part I: General -- Chapter 1: Why AI and Security? -- Chapter 2: Understanding AI and ML -- Part II: AI in Security -- Chapter 3: AI in Security -- Chapter 4: AI for Network Security -- Chapter 5: AI for Software Security -- Chapter 6: AI for Cloud Security -- Chapter 7: AI for IoT and OT Security -- Part III: Secure AI -- Chapter 8: AI Security and Privacy -- Chapter 9: Defense Methods for Adversarial Attacks and Privacy Issues in Secure AI -- Chapter 10: General Framework for AI Security and Privacy -- Chapter 11: AI Safety and Fairness -- Chapter 12: AI Security Challenges, Opportunities and Future Work -- Chapter 13: Conclusion. 
506 |a Plný text je dostupný pouze z IP adres počítačů Univerzity Tomáše Bati ve Zlíně nebo vzdáleným přístupem pro zaměstnance a studenty 
520 |a This book presents an overview of the emerging topics in Artificial Intelligence (AI) and cybersecurity and addresses the latest AI models that could be potentially applied to a range of cybersecurity areas. Furthermore, it provides different techniques of how to make the AI algorithms secure from adversarial attacks. The book presents the cyber threat landscape and explains the various spectrums of AI and the applications and limitations of AI in cybersecurity. Moreover, it explores the applications and limitations of secure AI. The authors discuss the three categories of machine learning (ML) models and reviews cutting-edge recent Deep Learning (DL) models. Furthermore, the book provides a general AI framework in security as well as different modules of the framework; similarly, chapter four proposes a general framework for secure AI. It explains different aspects of network security including malware and attacks. The book also includes a comprehensive study of various scopes of application security; categorised into three groups of smartphone, web application, and desktop application and delves into the concepts of cloud security. The authors discuss state-of-the-art Internet of Things (IoT) security and describe various challenges of AI for cybersecurity, such as data diversity, model customising, explainability, and time complexity and includes some future work. They provide a comprehensive understanding of adversarial machine learning including the up-to-date adversarial attacks and defences. The book finishes off with a discussion of the challenges and future work in secure AI. Overall, this book covers applications of AI models to various fields of cybersecurity and appeals not only to an scholarly audience but also to professionals wanting to learn more about the new developments in these areas. 
588 |a Print Version Record. 
650 0 |a Computer security. 
650 0 |a Medical informatics  |x Security measures. 
655 7 |a elektronické knihy  |7 fd186907  |2 czenas 
655 9 |a electronic books  |2 eczenas 
700 1 |a Habibi Lashkari, Arash.  |4 aut 
700 1 |a Firoozjaei, Mahdi Daghmehchi.  |4 aut 
700 1 |a Mahdavifar, Samaneh.  |4 aut 
700 1 |a Xiong, Pulei.  |4 aut 
830 0 |a Progress in IS 
856 4 0 |u https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=4232109&authtype=ip,shib&custid=s3936755 
942 |2 udc 
992 |c EBOOK-TN  |c EBSCO 
993 |x NEPOSILAT  |y EIZ 
999 |c 114320  |d 114320