Computational intelligence for cybersecurity management and applications:
As cyberattacks continue to grow in complexity and number, computational intelligence is helping under-resourced security analysts stay one step ahead of threats. Drawing on threat intelligence from millions of studies, blogs, and news articles, computational intelligence techniques such as machine...
Gespeichert in:
Weitere beteiligte Personen: | , , |
---|---|
Format: | Elektronisch E-Book |
Sprache: | Englisch |
Veröffentlicht: |
Boca Raton, FL
CRC Press
2023
|
Ausgabe: | First edition. |
Schlagwörter: | |
Links: | https://learning.oreilly.com/library/view/-/9781000853414/?ar |
Zusammenfassung: | As cyberattacks continue to grow in complexity and number, computational intelligence is helping under-resourced security analysts stay one step ahead of threats. Drawing on threat intelligence from millions of studies, blogs, and news articles, computational intelligence techniques such as machine learning and automatic natural language processing quickly provide the means to identify real threats and dramatically reduce response times. The book collects and reports on recent high-quality research addressing different cybersecurity challenges. It: explores the newest developments in the use of computational intelligence and AI for cybersecurity applications provides several case studies related to computational intelligence techniques for cybersecurity in a wide range of applications (smart health care, blockchain, cyber-physical system, etc.) integrates theoretical and practical aspects of computational intelligence for cybersecurity so that any reader, from novice to expert, may understand the book's explanations of key topics. It offers comprehensive coverage of the essential topics, including: machine learning and deep learning for cybersecurity blockchain for cybersecurity and privacy security engineering for cyber-physical systems AI and data analytics techniques for cybersecurity in smart systems trust in digital systems This book discusses the current state-of-the-art and practical solutions for the following cybersecurity and privacy issues using artificial intelligence techniques and cutting-edge technology. Readers interested in learning more about computational intelligence techniques for cybersecurity applications and management will find this book invaluable. They will get insight into potential avenues for future study on these topics and be able to prioritize their efforts better. |
Beschreibung: | Includes bibliographical references and index. - Description based on online resource; title from digital title page (viewed on March 28, 2023) |
Umfang: | 1 Online-Ressource |
ISBN: | 9781000853346 1000853349 9781000853414 1000853411 9781003319917 1003319912 |
Internformat
MARC
LEADER | 00000cam a22000002 4500 | ||
---|---|---|---|
001 | ZDB-30-ORH-096166622 | ||
003 | DE-627-1 | ||
005 | 20240228121937.0 | ||
007 | cr uuu---uuuuu | ||
008 | 230907s2023 xx |||||o 00| ||eng c | ||
020 | |a 9781000853346 |c electronic book |9 978-1-000-85334-6 | ||
020 | |a 1000853349 |c electronic book |9 1-000-85334-9 | ||
020 | |a 9781000853414 |c electronic bk. |9 978-1-000-85341-4 | ||
020 | |a 1000853411 |c electronic bk. |9 1-000-85341-1 | ||
020 | |a 9781003319917 |c electronic bk. |9 978-1-003-31991-7 | ||
020 | |a 1003319912 |c electronic bk. |9 1-003-31991-2 | ||
035 | |a (DE-627-1)096166622 | ||
035 | |a (DE-599)KEP096166622 | ||
035 | |a (ORHE)9781000853414 | ||
035 | |a (DE-627-1)096166622 | ||
040 | |a DE-627 |b ger |c DE-627 |e rda | ||
041 | |a eng | ||
072 | 7 | |a COM |2 bisacsh | |
072 | 7 | |a COM |2 bisacsh | |
072 | 7 | |a COM |2 bisacsh | |
072 | 7 | |a UYQ |2 bicssc | |
082 | 0 | |a 658.478 |2 23 | |
245 | 1 | 0 | |a Computational intelligence for cybersecurity management and applications |c edited by Yassine Maleh, Mamoun Alazab, and Soufyane Mounir |
250 | |a First edition. | ||
264 | 1 | |a Boca Raton, FL |b CRC Press |c 2023 | |
264 | 4 | |c ©2023 | |
300 | |a 1 Online-Ressource | ||
336 | |a Text |b txt |2 rdacontent | ||
337 | |a Computermedien |b c |2 rdamedia | ||
338 | |a Online-Ressource |b cr |2 rdacarrier | ||
500 | |a Includes bibliographical references and index. - Description based on online resource; title from digital title page (viewed on March 28, 2023) | ||
520 | |a As cyberattacks continue to grow in complexity and number, computational intelligence is helping under-resourced security analysts stay one step ahead of threats. Drawing on threat intelligence from millions of studies, blogs, and news articles, computational intelligence techniques such as machine learning and automatic natural language processing quickly provide the means to identify real threats and dramatically reduce response times. The book collects and reports on recent high-quality research addressing different cybersecurity challenges. It: explores the newest developments in the use of computational intelligence and AI for cybersecurity applications provides several case studies related to computational intelligence techniques for cybersecurity in a wide range of applications (smart health care, blockchain, cyber-physical system, etc.) integrates theoretical and practical aspects of computational intelligence for cybersecurity so that any reader, from novice to expert, may understand the book's explanations of key topics. It offers comprehensive coverage of the essential topics, including: machine learning and deep learning for cybersecurity blockchain for cybersecurity and privacy security engineering for cyber-physical systems AI and data analytics techniques for cybersecurity in smart systems trust in digital systems This book discusses the current state-of-the-art and practical solutions for the following cybersecurity and privacy issues using artificial intelligence techniques and cutting-edge technology. Readers interested in learning more about computational intelligence techniques for cybersecurity applications and management will find this book invaluable. They will get insight into potential avenues for future study on these topics and be able to prioritize their efforts better. | ||
650 | 0 | |a Computer security |x Management | |
650 | 0 | |a Computational intelligence | |
650 | 4 | |a Sécurité informatique ; Gestion | |
650 | 4 | |a Intelligence informatique | |
650 | 4 | |a COMPUTERS / Artificial Intelligence | |
650 | 4 | |a COMPUTERS / Security / General | |
650 | 4 | |a COMPUTERS / Networking / Security | |
650 | 4 | |a Computational intelligence | |
650 | 4 | |a Computer security ; Management | |
700 | 1 | |a Maleh, Yassine |d 1987- |e HerausgeberIn |4 edt | |
700 | 1 | |a Alazab, Mamoun |d 1980- |e HerausgeberIn |4 edt | |
700 | 1 | |a Mounir, Soufyane |e HerausgeberIn |4 edt | |
776 | 1 | |z 1032335033 | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 1032335033 |
966 | 4 | 0 | |l DE-91 |p ZDB-30-ORH |q TUM_PDA_ORH |u https://learning.oreilly.com/library/view/-/9781000853414/?ar |m X:ORHE |x Aggregator |z lizenzpflichtig |3 Volltext |
912 | |a ZDB-30-ORH | ||
951 | |a BO | ||
912 | |a ZDB-30-ORH | ||
049 | |a DE-91 |
Datensatz im Suchindex
DE-BY-TUM_katkey | ZDB-30-ORH-096166622 |
---|---|
_version_ | 1821494938896957440 |
adam_text | |
any_adam_object | |
author2 | Maleh, Yassine 1987- Alazab, Mamoun 1980- Mounir, Soufyane |
author2_role | edt edt edt |
author2_variant | y m ym m a ma s m sm |
author_facet | Maleh, Yassine 1987- Alazab, Mamoun 1980- Mounir, Soufyane |
building | Verbundindex |
bvnumber | localTUM |
collection | ZDB-30-ORH |
ctrlnum | (DE-627-1)096166622 (DE-599)KEP096166622 (ORHE)9781000853414 |
dewey-full | 658.478 |
dewey-hundreds | 600 - Technology (Applied sciences) |
dewey-ones | 658 - General management |
dewey-raw | 658.478 |
dewey-search | 658.478 |
dewey-sort | 3658.478 |
dewey-tens | 650 - Management and auxiliary services |
discipline | Wirtschaftswissenschaften |
edition | First edition. |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>04162cam a22006132 4500</leader><controlfield tag="001">ZDB-30-ORH-096166622</controlfield><controlfield tag="003">DE-627-1</controlfield><controlfield tag="005">20240228121937.0</controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">230907s2023 xx |||||o 00| ||eng c</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781000853346</subfield><subfield code="c">electronic book</subfield><subfield code="9">978-1-000-85334-6</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1000853349</subfield><subfield code="c">electronic book</subfield><subfield code="9">1-000-85334-9</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781000853414</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">978-1-000-85341-4</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1000853411</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">1-000-85341-1</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781003319917</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">978-1-003-31991-7</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1003319912</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">1-003-31991-2</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)096166622</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)KEP096166622</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ORHE)9781000853414</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)096166622</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">UYQ</subfield><subfield code="2">bicssc</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">658.478</subfield><subfield code="2">23</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Computational intelligence for cybersecurity management and applications</subfield><subfield code="c">edited by Yassine Maleh, Mamoun Alazab, and Soufyane Mounir</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">First edition.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Boca Raton, FL</subfield><subfield code="b">CRC Press</subfield><subfield code="c">2023</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">©2023</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index. - Description based on online resource; title from digital title page (viewed on March 28, 2023)</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">As cyberattacks continue to grow in complexity and number, computational intelligence is helping under-resourced security analysts stay one step ahead of threats. Drawing on threat intelligence from millions of studies, blogs, and news articles, computational intelligence techniques such as machine learning and automatic natural language processing quickly provide the means to identify real threats and dramatically reduce response times. The book collects and reports on recent high-quality research addressing different cybersecurity challenges. It: explores the newest developments in the use of computational intelligence and AI for cybersecurity applications provides several case studies related to computational intelligence techniques for cybersecurity in a wide range of applications (smart health care, blockchain, cyber-physical system, etc.) integrates theoretical and practical aspects of computational intelligence for cybersecurity so that any reader, from novice to expert, may understand the book's explanations of key topics. It offers comprehensive coverage of the essential topics, including: machine learning and deep learning for cybersecurity blockchain for cybersecurity and privacy security engineering for cyber-physical systems AI and data analytics techniques for cybersecurity in smart systems trust in digital systems This book discusses the current state-of-the-art and practical solutions for the following cybersecurity and privacy issues using artificial intelligence techniques and cutting-edge technology. Readers interested in learning more about computational intelligence techniques for cybersecurity applications and management will find this book invaluable. They will get insight into potential avenues for future study on these topics and be able to prioritize their efforts better.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer security</subfield><subfield code="x">Management</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computational intelligence</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Sécurité informatique ; Gestion</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Intelligence informatique</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">COMPUTERS / Artificial Intelligence</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">COMPUTERS / Security / General</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">COMPUTERS / Networking / Security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computational intelligence</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security ; Management</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Maleh, Yassine</subfield><subfield code="d">1987-</subfield><subfield code="e">HerausgeberIn</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Alazab, Mamoun</subfield><subfield code="d">1980-</subfield><subfield code="e">HerausgeberIn</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Mounir, Soufyane</subfield><subfield code="e">HerausgeberIn</subfield><subfield code="4">edt</subfield></datafield><datafield tag="776" ind1="1" ind2=" "><subfield code="z">1032335033</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">1032335033</subfield></datafield><datafield tag="966" ind1="4" ind2="0"><subfield code="l">DE-91</subfield><subfield code="p">ZDB-30-ORH</subfield><subfield code="q">TUM_PDA_ORH</subfield><subfield code="u">https://learning.oreilly.com/library/view/-/9781000853414/?ar</subfield><subfield code="m">X:ORHE</subfield><subfield code="x">Aggregator</subfield><subfield code="z">lizenzpflichtig</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">BO</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield></datafield></record></collection> |
id | ZDB-30-ORH-096166622 |
illustrated | Not Illustrated |
indexdate | 2025-01-17T11:22:20Z |
institution | BVB |
isbn | 9781000853346 1000853349 9781000853414 1000853411 9781003319917 1003319912 |
language | English |
open_access_boolean | |
owner | DE-91 DE-BY-TUM |
owner_facet | DE-91 DE-BY-TUM |
physical | 1 Online-Ressource |
psigel | ZDB-30-ORH TUM_PDA_ORH ZDB-30-ORH |
publishDate | 2023 |
publishDateSearch | 2023 |
publishDateSort | 2023 |
publisher | CRC Press |
record_format | marc |
spelling | Computational intelligence for cybersecurity management and applications edited by Yassine Maleh, Mamoun Alazab, and Soufyane Mounir First edition. Boca Raton, FL CRC Press 2023 ©2023 1 Online-Ressource Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier Includes bibliographical references and index. - Description based on online resource; title from digital title page (viewed on March 28, 2023) As cyberattacks continue to grow in complexity and number, computational intelligence is helping under-resourced security analysts stay one step ahead of threats. Drawing on threat intelligence from millions of studies, blogs, and news articles, computational intelligence techniques such as machine learning and automatic natural language processing quickly provide the means to identify real threats and dramatically reduce response times. The book collects and reports on recent high-quality research addressing different cybersecurity challenges. It: explores the newest developments in the use of computational intelligence and AI for cybersecurity applications provides several case studies related to computational intelligence techniques for cybersecurity in a wide range of applications (smart health care, blockchain, cyber-physical system, etc.) integrates theoretical and practical aspects of computational intelligence for cybersecurity so that any reader, from novice to expert, may understand the book's explanations of key topics. It offers comprehensive coverage of the essential topics, including: machine learning and deep learning for cybersecurity blockchain for cybersecurity and privacy security engineering for cyber-physical systems AI and data analytics techniques for cybersecurity in smart systems trust in digital systems This book discusses the current state-of-the-art and practical solutions for the following cybersecurity and privacy issues using artificial intelligence techniques and cutting-edge technology. Readers interested in learning more about computational intelligence techniques for cybersecurity applications and management will find this book invaluable. They will get insight into potential avenues for future study on these topics and be able to prioritize their efforts better. Computer security Management Computational intelligence Sécurité informatique ; Gestion Intelligence informatique COMPUTERS / Artificial Intelligence COMPUTERS / Security / General COMPUTERS / Networking / Security Computer security ; Management Maleh, Yassine 1987- HerausgeberIn edt Alazab, Mamoun 1980- HerausgeberIn edt Mounir, Soufyane HerausgeberIn edt 1032335033 Erscheint auch als Druck-Ausgabe 1032335033 |
spellingShingle | Computational intelligence for cybersecurity management and applications Computer security Management Computational intelligence Sécurité informatique ; Gestion Intelligence informatique COMPUTERS / Artificial Intelligence COMPUTERS / Security / General COMPUTERS / Networking / Security Computer security ; Management |
title | Computational intelligence for cybersecurity management and applications |
title_auth | Computational intelligence for cybersecurity management and applications |
title_exact_search | Computational intelligence for cybersecurity management and applications |
title_full | Computational intelligence for cybersecurity management and applications edited by Yassine Maleh, Mamoun Alazab, and Soufyane Mounir |
title_fullStr | Computational intelligence for cybersecurity management and applications edited by Yassine Maleh, Mamoun Alazab, and Soufyane Mounir |
title_full_unstemmed | Computational intelligence for cybersecurity management and applications edited by Yassine Maleh, Mamoun Alazab, and Soufyane Mounir |
title_short | Computational intelligence for cybersecurity management and applications |
title_sort | computational intelligence for cybersecurity management and applications |
topic | Computer security Management Computational intelligence Sécurité informatique ; Gestion Intelligence informatique COMPUTERS / Artificial Intelligence COMPUTERS / Security / General COMPUTERS / Networking / Security Computer security ; Management |
topic_facet | Computer security Management Computational intelligence Sécurité informatique ; Gestion Intelligence informatique COMPUTERS / Artificial Intelligence COMPUTERS / Security / General COMPUTERS / Networking / Security Computer security ; Management |
work_keys_str_mv | AT malehyassine computationalintelligenceforcybersecuritymanagementandapplications AT alazabmamoun computationalintelligenceforcybersecuritymanagementandapplications AT mounirsoufyane computationalintelligenceforcybersecuritymanagementandapplications |