AI-Driven Cybersecurity and Threat Intelligence (Registro nro. 274896)

MARC details
000 -LIDER
fixed length control field 04980nam a22005295i 4500
001 - CONTROL NUMBER
control field 978-3-031-54497-2
003 - CONTROL NUMBER IDENTIFIER
control field DE-He213
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20250516160028.0
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION
fixed length control field cr nn 008mamaa
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 240428s2024 sz | s |||| 0|eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9783031544972
-- 978-3-031-54497-2
050 #4 - LIBRARY OF CONGRESS CALL NUMBER
Classification number TK5105.59
072 #7 - SUBJECT CATEGORY CODE
Subject category code UTN
Source bicssc
072 #7 - SUBJECT CATEGORY CODE
Subject category code COM043050
Source bisacsh
072 #7 - SUBJECT CATEGORY CODE
Subject category code UTN
Source thema
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 005.8
Edition number 23
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Sarker, Iqbal H.
Relator term author.
Relator code aut
-- http://id.loc.gov/vocabulary/relators/aut
245 10 - TITLE STATEMENT
Title AI-Driven Cybersecurity and Threat Intelligence
Medium [electronic resource] :
Remainder of title Cyber Automation, Intelligent Decision-Making and Explainability /
Statement of responsibility, etc. by Iqbal H. Sarker.
250 ## - EDITION STATEMENT
Edition statement 1st ed. 2024.
264 #1 -
-- Cham :
-- Springer Nature Switzerland :
-- Imprint: Springer,
-- 2024.
300 ## - PHYSICAL DESCRIPTION
Extent XVII, 200 p. 43 illus., 29 illus. in color.
Other physical details online resource.
336 ## -
-- text
-- txt
-- rdacontent
337 ## -
-- computer
-- c
-- rdamedia
338 ## -
-- online resource
-- cr
-- rdacarrier
347 ## -
-- text file
-- PDF
-- rda
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note Part I Preliminaries -- 1. Introduction to AI-Driven Cybersecurity and Threat Intelligence -- 2. Cybersecurity Background Knowledge: Terminologies, Attack Frameworks and Security Life Cycle -- Part II AI/XAI Methods and Emerging Technologies -- 3. Learning Technologies: Towards Machine Learning and Deep Learning for Cybersecurity -- 4. Detecting Anomalies and Multi-Attacks through Cyber Learning: An Experimental Analysis -- 5. Generative AI for Cybersecurity -- 6. Cybersecurity Data Science: Towards Advanced Analytics, Knowledge and Rule Discovery for Explainable AI Modeling -- Part III Real-World Application Areas with Research Issues -- 7. AI-Enabled Cybersecurity for IoT and Smart City Applications -- 8. AI for Enhancing ICS/OT Cybersecurity -- 9. AI for Critical Infrastructure Protection and Resilience -- 10. CyberAI: A Comprehensive Summary of AI Variants, Explainable and Responsible AI for Cybersecurity.
520 ## - SUMMARY, ETC.
Summary, etc. This book explores the dynamics of how AI (Artificial Intelligence) technology intersects with cybersecurity challenges and threat intelligence as they evolve. Integrating AI into cybersecurity not only offers enhanced defense mechanisms, but this book introduces a paradigm shift illustrating how one conceptualize, detect and mitigate cyber threats. An in-depth exploration of AI-driven solutions is presented, including machine learning algorithms, data science modeling, generative AI modeling, threat intelligence frameworks and Explainable AI (XAI) models. As a roadmap or comprehensive guide to leveraging AI/XAI to defend digital ecosystems against evolving cyber threats, this book provides insights, modeling, real-world applications and research issues. Throughout this journey, the authors discover innovation, challenges, and opportunities. It provides a holistic perspective on the transformative role of AI in securing the digital world. Overall, the use of AI can transform the way one detects, responds and defends against threats, by enabling proactive threat detection, rapid response and adaptive defense mechanisms. AI-driven cybersecurity systems excel at analyzing vast datasets rapidly, identifying patterns that indicate malicious activities, detecting threats in real time as well as conducting predictive analytics for proactive solution. Moreover, AI enhances the ability to detect anomalies, predict potential threats, and respond swiftly, preventing risks from escalated. As cyber threats become increasingly diverse and relentless, incorporating AI/XAI into cybersecurity is not just a choice, but a necessity for improving resilience and staying ahead of ever-changing threats. This book targets advanced-level students in computer science as a secondary textbook. Researchers and industry professionals working in various areas, such as Cyber AI, Explainable and Responsible AI, Human-AI Collaboration, Automation and Intelligent Systems, Adaptive and Robust Security Systems, Cybersecurity Data Science and Data-Driven Decision Making will also find this book useful as reference book.
541 ## - IMMEDIATE SOURCE OF ACQUISITION NOTE
Owner UABC ;
Method of acquisition Perpetuidad
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Término temático o nombre geográfico como elemento de entrada Computer networks
Subdivisión general Security measures.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Término temático o nombre geográfico como elemento de entrada Artificial intelligence.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Término temático o nombre geográfico como elemento de entrada Machine learning.
650 14 - SUBJECT ADDED ENTRY--TOPICAL TERM
Término temático o nombre geográfico como elemento de entrada Mobile and Network Security.
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM
Término temático o nombre geográfico como elemento de entrada Artificial Intelligence.
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM
Término temático o nombre geográfico como elemento de entrada Machine Learning.
710 2# - ADDED ENTRY--CORPORATE NAME
Corporate name or jurisdiction name as entry element SpringerLink (Online service)
773 0# - HOST ITEM ENTRY
Title Springer Nature eBook
776 08 - ADDITIONAL PHYSICAL FORM ENTRY
Relationship information Printed edition:
International Standard Book Number 9783031544965
776 08 - ADDITIONAL PHYSICAL FORM ENTRY
Relationship information Printed edition:
International Standard Book Number 9783031544989
776 08 - ADDITIONAL PHYSICAL FORM ENTRY
Relationship information Printed edition:
International Standard Book Number 9783031544996
856 40 - ELECTRONIC LOCATION AND ACCESS
Public note Libro electrónico
Uniform Resource Identifier http://libcon.rec.uabc.mx:2048/login?url=https://doi.org/10.1007/978-3-031-54497-2
912 ## -
-- ZDB-2-SCS
912 ## -
-- ZDB-2-SXCS
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Koha item type Libro Electrónico
Existencias
Estado de retiro Colección Ubicación permanente Ubicación actual Fecha de ingreso Total Checkouts Date last seen Número de copia Tipo de material
  Colección de Libros Electrónicos Biblioteca Electrónica Biblioteca Electrónica 16/05/2025   16/05/2025 1 Libro Electrónico

Con tecnología Koha