Combating Security Challenges in the Age of Big Data

Combating Security Challenges in the Age of Big Data

Author: Zubair Md. Fadlullah

Publisher: Springer Nature

Published: 2020-05-26

Total Pages: 271

ISBN-13: 3030356426

DOWNLOAD EBOOK

This book addresses the key security challenges in the big data centric computing and network systems, and discusses how to tackle them using a mix of conventional and state-of-the-art techniques. The incentive for joining big data and advanced analytics is no longer in doubt for businesses and ordinary users alike. Technology giants like Google, Microsoft, Amazon, Facebook, Apple, and companies like Uber, Airbnb, NVIDIA, Expedia, and so forth are continuing to explore new ways to collect and analyze big data to provide their customers with interactive services and new experiences. With any discussion of big data, security is not, however, far behind. Large scale data breaches and privacy leaks at governmental and financial institutions, social platforms, power grids, and so forth, are on the rise that cost billions of dollars. The book explains how the security needs and implementations are inherently different at different stages of the big data centric system, namely at the point of big data sensing and collection, delivery over existing networks, and analytics at the data centers. Thus, the book sheds light on how conventional security provisioning techniques like authentication and encryption need to scale well with all the stages of the big data centric system to effectively combat security threats and vulnerabilities. The book also uncovers the state-of-the-art technologies like deep learning and blockchain which can dramatically change the security landscape in the big data era.


AI-Enabled Threat Detection and Security Analysis for Industrial IoT

AI-Enabled Threat Detection and Security Analysis for Industrial IoT

Author: Hadis Karimipour

Publisher: Springer Nature

Published: 2021-08-03

Total Pages: 250

ISBN-13: 3030766136

DOWNLOAD EBOOK

This contributed volume provides the state-of-the-art development on security and privacy for cyber-physical systems (CPS) and industrial Internet of Things (IIoT). More specifically, this book discusses the security challenges in CPS and IIoT systems as well as how Artificial Intelligence (AI) and Machine Learning (ML) can be used to address these challenges. Furthermore, this book proposes various defence strategies, including intelligent cyber-attack and anomaly detection algorithms for different IIoT applications. Each chapter corresponds to an important snapshot including an overview of the opportunities and challenges of realizing the AI in IIoT environments, issues related to data security, privacy and application of blockchain technology in the IIoT environment. This book also examines more advanced and specific topics in AI-based solutions developed for efficient anomaly detection in IIoT environments. Different AI/ML techniques including deep representation learning, Snapshot Ensemble Deep Neural Network (SEDNN), federated learning and multi-stage learning are discussed and analysed as well. Researchers and professionals working in computer security with an emphasis on the scientific foundations and engineering techniques for securing IIoT systems and their underlying computing and communicating systems will find this book useful as a reference. The content of this book will be particularly useful for advanced-level students studying computer science, computer technology, cyber security, and information systems. It also applies to advanced-level students studying electrical engineering and system engineering, who would benefit from the case studies.


Artificial Intelligence for Cybersecurity

Artificial Intelligence for Cybersecurity

Author: Mark Stamp

Publisher: Springer Nature

Published: 2022-07-15

Total Pages: 388

ISBN-13: 3030970876

DOWNLOAD EBOOK

This book explores new and novel applications of machine learning, deep learning, and artificial intelligence that are related to major challenges in the field of cybersecurity. The provided research goes beyond simply applying AI techniques to datasets and instead delves into deeper issues that arise at the interface between deep learning and cybersecurity. This book also provides insight into the difficult "how" and "why" questions that arise in AI within the security domain. For example, this book includes chapters covering "explainable AI", "adversarial learning", "resilient AI", and a wide variety of related topics. It’s not limited to any specific cybersecurity subtopics and the chapters touch upon a wide range of cybersecurity domains, ranging from malware to biometrics and more. Researchers and advanced level students working and studying in the fields of cybersecurity (equivalently, information security) or artificial intelligence (including deep learning, machine learning, big data, and related fields) will want to purchase this book as a reference. Practitioners working within these fields will also be interested in purchasing this book.


Implications of Artificial Intelligence for Cybersecurity

Implications of Artificial Intelligence for Cybersecurity

Author: National Academies of Sciences, Engineering, and Medicine

Publisher: National Academies Press

Published: 2020-01-27

Total Pages: 99

ISBN-13: 0309494508

DOWNLOAD EBOOK

In recent years, interest and progress in the area of artificial intelligence (AI) and machine learning (ML) have boomed, with new applications vigorously pursued across many sectors. At the same time, the computing and communications technologies on which we have come to rely present serious security concerns: cyberattacks have escalated in number, frequency, and impact, drawing increased attention to the vulnerabilities of cyber systems and the need to increase their security. In the face of this changing landscape, there is significant concern and interest among policymakers, security practitioners, technologists, researchers, and the public about the potential implications of AI and ML for cybersecurity. The National Academies of Sciences, Engineering, and Medicine convened a workshop on March 12-13, 2019 to discuss and explore these concerns. This publication summarizes the presentations and discussions from the workshop.


The New Advanced Society

The New Advanced Society

Author: Sandeep Kumar Panda

Publisher: John Wiley & Sons

Published: 2022-04-05

Total Pages: 516

ISBN-13: 1119824478

DOWNLOAD EBOOK

THE NEW ADVANCED SOCIETY Included in this book are the fundamentals of Society 5.0, artificial intelligence, and the industrial Internet of Things, featuring their working principles and application in different sectors. A 360-degree view of the different dimensions of the digital revolution is presented in this book, including the various industries transforming industrial manufacturing, the security and challenges ahead, and the far-reaching implications for society and the economy. The main objective of this edited book is to cover the impact that the new advanced society has on several platforms such as smart manufacturing systems, where artificial intelligence can be integrated with existing systems to make them smart, new business models and strategies, where anything and everything is possible through the internet and cloud, smart food chain systems, where food products can be delivered to any corner of the world at any time and in any situation, smart transport systems in which robots and self-driven cars are taking the lead, advances in security systems to assure people of their privacy and safety, and smart healthcare systems, where biochips can be incorporated into the human body to predict deadly diseases at early stages. Finally, it can be understood that the social reformation of Society 5.0 will lead to a society where every person leads an active and healthy life. Audience The targeted audience for this book includes research scholars and industry engineers in artificial intelligence and information technology, engineering students, cybersecurity experts, government research agencies and policymakers, business leaders, and entrepreneurs. Sandeep Kumar Panda, PhD is an associate professor in the Department of Data Science and Artificial Intelligence at IcfaiTech (Faculty of Science and Technology), ICFAI Foundation for Higher Education, Hyderabad. His research areas include artificial intelligence, IoT, blockchain technology, cloud computing, cryptography, computational intelligence, and software engineering. Ramesh Kumar Mohapatra, PhD is an assistant professor in the Department of Computer Science and Engineering, National Institute of Technology, Rourkela, Odisha, India. His research interests include optical character recognition, document image analysis, video processing, secure computing, and machine learning. Subhrakanta Panda, PhD is an assistant professor in the Department of Computer Science and Information Systems, BITS-PILANI, Hyderabad Campus, Jawahar Nagar, Hyderabad, India. His research interests include social network analysis, cloud computing, security testing, and blockchain. S. Balamurugan, PhD is the Director of Research and Development, Intelligent Research Consultancy Services (iRCS), Coimbatore, Tamilnadu, India. He is also Director of the Albert Einstein Engineering and Research Labs (AEER Labs), as well as Vice-Chairman, Renewable Energy Society of India (RESI), India. He has published 45 books, 200+ international journals/ conferences, and 35 patents.


Implementing Computational Intelligence Techniques for Security Systems Design

Implementing Computational Intelligence Techniques for Security Systems Design

Author: Albastaki, Yousif Abdullatif

Publisher: IGI Global

Published: 2020-02-14

Total Pages: 332

ISBN-13: 1799824209

DOWNLOAD EBOOK

Recently, cryptology problems, such as designing good cryptographic systems and analyzing them, have been challenging researchers. Many algorithms that take advantage of approaches based on computational intelligence techniques, such as genetic algorithms, genetic programming, and so on, have been proposed to solve these issues. Implementing Computational Intelligence Techniques for Security Systems Design is an essential research book that explores the application of computational intelligence and other advanced techniques in information security, which will contribute to a better understanding of the factors that influence successful security systems design. Featuring a range of topics such as encryption, self-healing systems, and cyber fraud, this book is ideal for security analysts, IT specialists, computer engineers, software developers, technologists, academicians, researchers, practitioners, and students.


Advanced Network Security Techniques

Advanced Network Security Techniques

Author: Cybellium

Publisher: Cybellium

Published:

Total Pages: 227

ISBN-13: 1836797591

DOWNLOAD EBOOK

Welcome to the forefront of knowledge with Cybellium, your trusted partner in mastering the cutting-edge fields of IT, Artificial Intelligence, Cyber Security, Business, Economics and Science. Designed for professionals, students, and enthusiasts alike, our comprehensive books empower you to stay ahead in a rapidly evolving digital world. * Expert Insights: Our books provide deep, actionable insights that bridge the gap between theory and practical application. * Up-to-Date Content: Stay current with the latest advancements, trends, and best practices in IT, Al, Cybersecurity, Business, Economics and Science. Each guide is regularly updated to reflect the newest developments and challenges. * Comprehensive Coverage: Whether you're a beginner or an advanced learner, Cybellium books cover a wide range of topics, from foundational principles to specialized knowledge, tailored to your level of expertise. Become part of a global network of learners and professionals who trust Cybellium to guide their educational journey. www.cybellium.com


Fusion of Artificial Intelligence and Machine Learning in Advanced Image Processing

Fusion of Artificial Intelligence and Machine Learning in Advanced Image Processing

Author: Arun Kumar Rana

Publisher: CRC Press

Published: 2024-11-22

Total Pages: 271

ISBN-13: 1040051707

DOWNLOAD EBOOK

This book focuses on the fusion of artificial intelligence and machine learning in advanced image processing, data analysis, and cyber security, as well as compiles and discusses various engineering solutions using various artificial intelligence paradigms. It looks at recent technological advancements and considers how artificial intelligence, machine learning, deep learning, soft computing, and evolutionary computing techniques can be used to design, implement, and optimize advanced image processing, data analysis, and cyber security engineering solutions. It will readers develop the insight required to use the tools of digital imaging to solve new problems. The book is divided into sections that deal with Artificial intelligence and machine learning in medicine and healthcare Intelligent decision-making and analysis technology Machine learning and deep learning for agriculture Artificial intelligence and machine learning for security solutions Automation in image processing Fusion of Artificial Intelligence and Machine Learning for Advanced Image Processing, Data Analysis, and Cyber Security offers a selection of chapters on the application of artificial intelligence and machine learning for advanced image processing, data analysis, and cyber security. This book will surely enhance the knowledge of readers interested in these areas.


Artificial Intelligence Techniques for a Scalable Energy Transition

Artificial Intelligence Techniques for a Scalable Energy Transition

Author: Moamar Sayed-Mouchaweh

Publisher: Springer

Published: 2021-06-21

Total Pages: 382

ISBN-13: 9783030427283

DOWNLOAD EBOOK

This book presents research in artificial techniques using intelligence for energy transition, outlining several applications including production systems, energy production, energy distribution, energy management, renewable energy production, cyber security, industry 4.0 and internet of things etc. The book goes beyond standard application by placing a specific focus on the use of AI techniques to address the challenges related to the different applications and topics of energy transition. The contributions are classified according to the market and actor interactions (service providers, manufacturers, customers, integrators, utilities etc.), to the SG architecture model (physical layer, infrastructure layer, and business layer), to the digital twin of SG (business model, operational model, fault/transient model, and asset model), and to the application domain (demand side management, load monitoring, micro grids, energy consulting (residents, utilities), energy saving, dynamic pricing revenue management and smart meters, etc.).