E-Book, Englisch, 417 Seiten, eBook
Reihe: Internet of Things
Gunjan / Ansari / Usman Modern Approaches in IoT and Machine Learning for Cyber Security
1. Auflage 2023
ISBN: 978-3-031-09955-7
Verlag: Springer International Publishing
Format: PDF
Kopierschutz: 1 - PDF Watermark
Latest Trends in AI
E-Book, Englisch, 417 Seiten, eBook
Reihe: Internet of Things
ISBN: 978-3-031-09955-7
Verlag: Springer International Publishing
Format: PDF
Kopierschutz: 1 - PDF Watermark
Zielgruppe
Research
Autoren/Hrsg.
Weitere Infos & Material
Introduction.- Being secure, vigilant and resilient in the age of Industry 4.0.- Facing new cyber risks in the age of smart production.- Leveraging AI for threat detection.- Being resilient when attacks inevitably hit home.- Security for the Industrial Internet of Things.- Reinventing the Internet to Secure the Digital Economy.- The future of cybersecurity.- Adapting data science for security challenges.- Big data analytics for cybersecurity.- Data Analytics and Decision Support for Cybersecurity.- Data Science in Cybersecurity and Cyberthreat Intelligence.- Integrating cyber security and data science for social media.- Data warehousing and data mining techniques for cyber security.- Machine learning and deep learning methods for cybersecurity.- Machine Learning and Big Data Processing for Cybersecurity Data Analysis.- Blockchain's roles in strengthening cybersecurity and protecting privacy.- Using virtual environments for the assessment of cybersecurity issues in IoT scenarios.- Security considerations for secure and trustworthy smart home system in the IoT environment.- Cyber security challenges for IoT-based smart grid networks.- Evaluating critical security issues of the IoT world.- Internet of Things security and forensics.- Applying Artificial Intelligence Techniques to Prevent Cyber Assaults.- Cyber security and the role of intelligent systems in addressing its challenges.- Cyber security of water SCADA systems.- Bio-inspiring cyber security and cloud services.- AI enabled blockchain smart contracts.- Cyber security and the evolution in intrusion detection systems.- A cyber security study of a SCADA energy management system.- Security analysis and recommendations for AI/ML enabled automated cyber medical systems.- Making knowledge tradable in edge-AI enabled IoT.- Artificial intelligence and national security.- Conclusion.