Understanding AI in Cybersecurity and Secure AI : Challenges, Strategies and Trends
This book presents an overview of the emerging topics in Artificial Intelligence (AI) and cybersecurity and addresses the latest AI models that could be potentially applied to a range of cybersecurity areas. Furthermore, it provides different techniques of how to make the AI algorithms secure from a...
Saved in:
| Main Authors | , , , , |
|---|---|
| Format | Electronic eBook |
| Language | English |
| Published |
Cham :
Springer Nature Switzerland : Imprint: Springer,
2025.
|
| Edition | 1st ed. 2025. |
| Series | Progress in IS
|
| Subjects | |
| Online Access | Full text |
| ISBN | 9783031915246 9783031915239 |
| ISSN | 2196-8713 |
| Physical Description | 1 online zdroj |
Cover
| LEADER | 00000nam a2200000 i 4500 | ||
|---|---|---|---|
| 001 | 114320 | ||
| 003 | CZ-ZlUTB | ||
| 005 | 20251126155335.0 | ||
| 006 | m o d | ||
| 007 | cr un||||||||| | ||
| 008 | 250626s2025 xx o ||| 0 eng d | ||
| 020 | |a 9783031915246 |q (electronic bk.) | ||
| 020 | |z 9783031915239 | ||
| 040 | |a EBZ |b eng |c EBZ |e rda | ||
| 100 | 1 | |a Sharma, Dilli Prasad. |4 aut | |
| 245 | 1 | 0 | |a Understanding AI in Cybersecurity and Secure AI : |b Challenges, Strategies and Trends / |c by Dilli Prasad Sharma, Arash Habibi Lashkari, Mahdi Daghmehchi Firoozjaei, Samaneh Mahdavifar, Pulei Xiong. |
| 250 | |a 1st ed. 2025. | ||
| 264 | 1 | |a Cham : |b Springer Nature Switzerland : |b Imprint: Springer, |c 2025. | |
| 300 | |a 1 online zdroj | ||
| 336 | |a text |b txt |2 rdacontent | ||
| 337 | |a počítač |b c |2 rdamedia | ||
| 338 | |a online zdroj |b cr |2 rdacarrier | ||
| 490 | 1 | |a Progress in IS, |x 2196-8713 | |
| 505 | 0 | |a Part I: General -- Chapter 1: Why AI and Security? -- Chapter 2: Understanding AI and ML -- Part II: AI in Security -- Chapter 3: AI in Security -- Chapter 4: AI for Network Security -- Chapter 5: AI for Software Security -- Chapter 6: AI for Cloud Security -- Chapter 7: AI for IoT and OT Security -- Part III: Secure AI -- Chapter 8: AI Security and Privacy -- Chapter 9: Defense Methods for Adversarial Attacks and Privacy Issues in Secure AI -- Chapter 10: General Framework for AI Security and Privacy -- Chapter 11: AI Safety and Fairness -- Chapter 12: AI Security Challenges, Opportunities and Future Work -- Chapter 13: Conclusion. | |
| 506 | |a Plný text je dostupný pouze z IP adres počítačů Univerzity Tomáše Bati ve Zlíně nebo vzdáleným přístupem pro zaměstnance a studenty | ||
| 520 | |a This book presents an overview of the emerging topics in Artificial Intelligence (AI) and cybersecurity and addresses the latest AI models that could be potentially applied to a range of cybersecurity areas. Furthermore, it provides different techniques of how to make the AI algorithms secure from adversarial attacks. The book presents the cyber threat landscape and explains the various spectrums of AI and the applications and limitations of AI in cybersecurity. Moreover, it explores the applications and limitations of secure AI. The authors discuss the three categories of machine learning (ML) models and reviews cutting-edge recent Deep Learning (DL) models. Furthermore, the book provides a general AI framework in security as well as different modules of the framework; similarly, chapter four proposes a general framework for secure AI. It explains different aspects of network security including malware and attacks. The book also includes a comprehensive study of various scopes of application security; categorised into three groups of smartphone, web application, and desktop application and delves into the concepts of cloud security. The authors discuss state-of-the-art Internet of Things (IoT) security and describe various challenges of AI for cybersecurity, such as data diversity, model customising, explainability, and time complexity and includes some future work. They provide a comprehensive understanding of adversarial machine learning including the up-to-date adversarial attacks and defences. The book finishes off with a discussion of the challenges and future work in secure AI. Overall, this book covers applications of AI models to various fields of cybersecurity and appeals not only to an scholarly audience but also to professionals wanting to learn more about the new developments in these areas. | ||
| 588 | |a Print Version Record. | ||
| 650 | 0 | |a Computer security. | |
| 650 | 0 | |a Medical informatics |x Security measures. | |
| 655 | 7 | |a elektronické knihy |7 fd186907 |2 czenas | |
| 655 | 9 | |a electronic books |2 eczenas | |
| 700 | 1 | |a Habibi Lashkari, Arash. |4 aut | |
| 700 | 1 | |a Firoozjaei, Mahdi Daghmehchi. |4 aut | |
| 700 | 1 | |a Mahdavifar, Samaneh. |4 aut | |
| 700 | 1 | |a Xiong, Pulei. |4 aut | |
| 830 | 0 | |a Progress in IS | |
| 856 | 4 | 0 | |u https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=4232109&authtype=ip,shib&custid=s3936755 |
| 942 | |2 udc | ||
| 992 | |c EBOOK-TN |c EBSCO | ||
| 993 | |x NEPOSILAT |y EIZ | ||
| 999 | |c 114320 |d 114320 | ||