Big data and edge intelligence for enhanced cyber defense: principles and research
An unfortunate outcome of the growth of the Internet and mobile technologies has been the challenge of countering cybercrime. This book introduces and explains the latest trends and techniques of edge artificial intelligence (EdgeAI) intended to help cyber security experts design robust cyber defens...
Gespeichert in:
Weitere beteiligte Personen: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | Englisch |
Veröffentlicht: |
Boca Raton
CRC Press
2024
|
Schriftenreihe: | Edge AI in Future Computing
|
Schlagwörter: | |
Links: | https://learning.oreilly.com/library/view/-/9781040048443/?ar |
Zusammenfassung: | An unfortunate outcome of the growth of the Internet and mobile technologies has been the challenge of countering cybercrime. This book introduces and explains the latest trends and techniques of edge artificial intelligence (EdgeAI) intended to help cyber security experts design robust cyber defense systems (CDS), including host-based and network-based intrusion detection system and digital forensic intelligence. This book discusses the direct confluence of EdgeAI with big data, as well as demonstrating detailed reviews of recent cyber threats and their countermeasure. It provides computational intelligence techniques and automated reasoning models capable of fast training and timely data processing of cyber security big data, in addition to other basic information related to network security. In addition, it provides a brief overview of modern cyber security threats and outlines the advantages of using EdgeAI to counter these threats, as well as exploring various cyber defense mechanisms (CDM) based on detection type and approaches. Specific challenging areas pertaining to cyber defense through EdgeAI, such as improving digital forensic intelligence, proactive and adaptive defense of network infrastructure, and bio-inspired CDM, are also discussed. This book is intended as a reference for academics and students in the field of network and cybersecurity, particularly on the topics of intrusion detection systems, smart grid, EdgeAI, and bio-inspired cyber defense principles. The front-line EdgeAI techniques discussed will also be of use to cybersecurity engineers in their work enhancing cyber defense systems. |
Beschreibung: | Online resource; title from PDF title page (Taylor & Francis, viewed July 25, 2024) |
Umfang: | 1 Online-Ressource (clxxxviii, 12 Seiten). |
ISBN: | 9781003215523 1003215521 9781040048443 1040048447 9781040048368 1040048366 |
Internformat
MARC
LEADER | 00000nam a22000002 4500 | ||
---|---|---|---|
001 | ZDB-30-ORH-110157869 | ||
003 | DE-627-1 | ||
005 | 20241202095348.0 | ||
007 | cr uuu---uuuuu | ||
008 | 241202s2024 xx |||||o 00| ||eng c | ||
020 | |a 9781003215523 |c electronic bk. |9 978-1-003-21552-3 | ||
020 | |a 1003215521 |c electronic bk. |9 1-003-21552-1 | ||
020 | |a 9781040048443 |c electronic bk. : EPUB |9 978-1-040-04844-3 | ||
020 | |a 1040048447 |c electronic bk. : EPUB |9 1-040-04844-7 | ||
020 | |a 9781040048368 |c electronic bk. : PDF |9 978-1-040-04836-8 | ||
020 | |a 1040048366 |c electronic bk. : PDF |9 1-040-04836-6 | ||
035 | |a (DE-627-1)110157869 | ||
035 | |a (DE-599)KEP110157869 | ||
035 | |a (ORHE)9781040048443 | ||
035 | |a (DE-627-1)110157869 | ||
040 | |a DE-627 |b ger |c DE-627 |e rda | ||
041 | |a eng | ||
072 | 7 | |a COM |2 bisacsh | |
072 | 7 | |a COM |2 bisacsh | |
072 | 7 | |a COM |2 bisacsh | |
072 | 7 | |a UB |2 bicssc | |
082 | 0 | |a 005.8 |2 23/eng/20240725 | |
245 | 1 | 0 | |a Big data and edge intelligence for enhanced cyber defense |b principles and research |c edited by Ranjit Panigrahi [and 4 others] |
264 | 1 | |a Boca Raton |b CRC Press |c 2024 | |
300 | |a 1 Online-Ressource (clxxxviii, 12 Seiten). | ||
336 | |a Text |b txt |2 rdacontent | ||
337 | |a Computermedien |b c |2 rdamedia | ||
338 | |a Online-Ressource |b cr |2 rdacarrier | ||
490 | 0 | |a Edge AI in Future Computing | |
500 | |a Online resource; title from PDF title page (Taylor & Francis, viewed July 25, 2024) | ||
520 | |a An unfortunate outcome of the growth of the Internet and mobile technologies has been the challenge of countering cybercrime. This book introduces and explains the latest trends and techniques of edge artificial intelligence (EdgeAI) intended to help cyber security experts design robust cyber defense systems (CDS), including host-based and network-based intrusion detection system and digital forensic intelligence. This book discusses the direct confluence of EdgeAI with big data, as well as demonstrating detailed reviews of recent cyber threats and their countermeasure. It provides computational intelligence techniques and automated reasoning models capable of fast training and timely data processing of cyber security big data, in addition to other basic information related to network security. In addition, it provides a brief overview of modern cyber security threats and outlines the advantages of using EdgeAI to counter these threats, as well as exploring various cyber defense mechanisms (CDM) based on detection type and approaches. Specific challenging areas pertaining to cyber defense through EdgeAI, such as improving digital forensic intelligence, proactive and adaptive defense of network infrastructure, and bio-inspired CDM, are also discussed. This book is intended as a reference for academics and students in the field of network and cybersecurity, particularly on the topics of intrusion detection systems, smart grid, EdgeAI, and bio-inspired cyber defense principles. The front-line EdgeAI techniques discussed will also be of use to cybersecurity engineers in their work enhancing cyber defense systems. | ||
650 | 0 | |a Computer security | |
650 | 4 | |a Sécurité informatique | |
650 | 4 | |a COMPUTERS / Computer Engineering | |
650 | 4 | |a COMPUTERS / Security / General | |
650 | 4 | |a COMPUTERS / Artificial Intelligence | |
700 | 1 | |a Panigrahi, Ranjit |d 1979- |e HerausgeberIn |4 edt | |
966 | 4 | 0 | |l DE-91 |p ZDB-30-ORH |q TUM_PDA_ORH |u https://learning.oreilly.com/library/view/-/9781040048443/?ar |m X:ORHE |x Aggregator |z lizenzpflichtig |3 Volltext |
912 | |a ZDB-30-ORH | ||
951 | |a BO | ||
912 | |a ZDB-30-ORH | ||
049 | |a DE-91 |
Datensatz im Suchindex
DE-BY-TUM_katkey | ZDB-30-ORH-110157869 |
---|---|
_version_ | 1821494924248350720 |
adam_text | |
any_adam_object | |
author2 | Panigrahi, Ranjit 1979- |
author2_role | edt |
author2_variant | r p rp |
author_facet | Panigrahi, Ranjit 1979- |
building | Verbundindex |
bvnumber | localTUM |
collection | ZDB-30-ORH |
ctrlnum | (DE-627-1)110157869 (DE-599)KEP110157869 (ORHE)9781040048443 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03551nam a22005052 4500</leader><controlfield tag="001">ZDB-30-ORH-110157869</controlfield><controlfield tag="003">DE-627-1</controlfield><controlfield tag="005">20241202095348.0</controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">241202s2024 xx |||||o 00| ||eng c</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781003215523</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">978-1-003-21552-3</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1003215521</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">1-003-21552-1</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781040048443</subfield><subfield code="c">electronic bk. : EPUB</subfield><subfield code="9">978-1-040-04844-3</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1040048447</subfield><subfield code="c">electronic bk. : EPUB</subfield><subfield code="9">1-040-04844-7</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781040048368</subfield><subfield code="c">electronic bk. : PDF</subfield><subfield code="9">978-1-040-04836-8</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1040048366</subfield><subfield code="c">electronic bk. : PDF</subfield><subfield code="9">1-040-04836-6</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)110157869</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)KEP110157869</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ORHE)9781040048443</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)110157869</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">UB</subfield><subfield code="2">bicssc</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23/eng/20240725</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Big data and edge intelligence for enhanced cyber defense</subfield><subfield code="b">principles and research</subfield><subfield code="c">edited by Ranjit Panigrahi [and 4 others]</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Boca Raton</subfield><subfield code="b">CRC Press</subfield><subfield code="c">2024</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (clxxxviii, 12 Seiten).</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">Edge AI in Future Computing</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Online resource; title from PDF title page (Taylor & Francis, viewed July 25, 2024)</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">An unfortunate outcome of the growth of the Internet and mobile technologies has been the challenge of countering cybercrime. This book introduces and explains the latest trends and techniques of edge artificial intelligence (EdgeAI) intended to help cyber security experts design robust cyber defense systems (CDS), including host-based and network-based intrusion detection system and digital forensic intelligence. This book discusses the direct confluence of EdgeAI with big data, as well as demonstrating detailed reviews of recent cyber threats and their countermeasure. It provides computational intelligence techniques and automated reasoning models capable of fast training and timely data processing of cyber security big data, in addition to other basic information related to network security. In addition, it provides a brief overview of modern cyber security threats and outlines the advantages of using EdgeAI to counter these threats, as well as exploring various cyber defense mechanisms (CDM) based on detection type and approaches. Specific challenging areas pertaining to cyber defense through EdgeAI, such as improving digital forensic intelligence, proactive and adaptive defense of network infrastructure, and bio-inspired CDM, are also discussed. This book is intended as a reference for academics and students in the field of network and cybersecurity, particularly on the topics of intrusion detection systems, smart grid, EdgeAI, and bio-inspired cyber defense principles. The front-line EdgeAI techniques discussed will also be of use to cybersecurity engineers in their work enhancing cyber defense systems.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Sécurité informatique</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">COMPUTERS / Computer Engineering</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">COMPUTERS / Security / General</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">COMPUTERS / Artificial Intelligence</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Panigrahi, Ranjit</subfield><subfield code="d">1979-</subfield><subfield code="e">HerausgeberIn</subfield><subfield code="4">edt</subfield></datafield><datafield tag="966" ind1="4" ind2="0"><subfield code="l">DE-91</subfield><subfield code="p">ZDB-30-ORH</subfield><subfield code="q">TUM_PDA_ORH</subfield><subfield code="u">https://learning.oreilly.com/library/view/-/9781040048443/?ar</subfield><subfield code="m">X:ORHE</subfield><subfield code="x">Aggregator</subfield><subfield code="z">lizenzpflichtig</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">BO</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield></datafield></record></collection> |
id | ZDB-30-ORH-110157869 |
illustrated | Not Illustrated |
indexdate | 2025-01-17T11:22:06Z |
institution | BVB |
isbn | 9781003215523 1003215521 9781040048443 1040048447 9781040048368 1040048366 |
language | English |
open_access_boolean | |
owner | DE-91 DE-BY-TUM |
owner_facet | DE-91 DE-BY-TUM |
physical | 1 Online-Ressource (clxxxviii, 12 Seiten). |
psigel | ZDB-30-ORH TUM_PDA_ORH ZDB-30-ORH |
publishDate | 2024 |
publishDateSearch | 2024 |
publishDateSort | 2024 |
publisher | CRC Press |
record_format | marc |
series2 | Edge AI in Future Computing |
spelling | Big data and edge intelligence for enhanced cyber defense principles and research edited by Ranjit Panigrahi [and 4 others] Boca Raton CRC Press 2024 1 Online-Ressource (clxxxviii, 12 Seiten). Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier Edge AI in Future Computing Online resource; title from PDF title page (Taylor & Francis, viewed July 25, 2024) An unfortunate outcome of the growth of the Internet and mobile technologies has been the challenge of countering cybercrime. This book introduces and explains the latest trends and techniques of edge artificial intelligence (EdgeAI) intended to help cyber security experts design robust cyber defense systems (CDS), including host-based and network-based intrusion detection system and digital forensic intelligence. This book discusses the direct confluence of EdgeAI with big data, as well as demonstrating detailed reviews of recent cyber threats and their countermeasure. It provides computational intelligence techniques and automated reasoning models capable of fast training and timely data processing of cyber security big data, in addition to other basic information related to network security. In addition, it provides a brief overview of modern cyber security threats and outlines the advantages of using EdgeAI to counter these threats, as well as exploring various cyber defense mechanisms (CDM) based on detection type and approaches. Specific challenging areas pertaining to cyber defense through EdgeAI, such as improving digital forensic intelligence, proactive and adaptive defense of network infrastructure, and bio-inspired CDM, are also discussed. This book is intended as a reference for academics and students in the field of network and cybersecurity, particularly on the topics of intrusion detection systems, smart grid, EdgeAI, and bio-inspired cyber defense principles. The front-line EdgeAI techniques discussed will also be of use to cybersecurity engineers in their work enhancing cyber defense systems. Computer security Sécurité informatique COMPUTERS / Computer Engineering COMPUTERS / Security / General COMPUTERS / Artificial Intelligence Panigrahi, Ranjit 1979- HerausgeberIn edt |
spellingShingle | Big data and edge intelligence for enhanced cyber defense principles and research Computer security Sécurité informatique COMPUTERS / Computer Engineering COMPUTERS / Security / General COMPUTERS / Artificial Intelligence |
title | Big data and edge intelligence for enhanced cyber defense principles and research |
title_auth | Big data and edge intelligence for enhanced cyber defense principles and research |
title_exact_search | Big data and edge intelligence for enhanced cyber defense principles and research |
title_full | Big data and edge intelligence for enhanced cyber defense principles and research edited by Ranjit Panigrahi [and 4 others] |
title_fullStr | Big data and edge intelligence for enhanced cyber defense principles and research edited by Ranjit Panigrahi [and 4 others] |
title_full_unstemmed | Big data and edge intelligence for enhanced cyber defense principles and research edited by Ranjit Panigrahi [and 4 others] |
title_short | Big data and edge intelligence for enhanced cyber defense |
title_sort | big data and edge intelligence for enhanced cyber defense principles and research |
title_sub | principles and research |
topic | Computer security Sécurité informatique COMPUTERS / Computer Engineering COMPUTERS / Security / General COMPUTERS / Artificial Intelligence |
topic_facet | Computer security Sécurité informatique COMPUTERS / Computer Engineering COMPUTERS / Security / General COMPUTERS / Artificial Intelligence |
work_keys_str_mv | AT panigrahiranjit bigdataandedgeintelligenceforenhancedcyberdefenseprinciplesandresearch |