Artificial Intelligence for Cybersecurity

This book explores new and novel applications of machine learning, deep learning, and artificial intelligence that are related to major challenges in the field of cybersecurity. The provided research goes beyond simply applying AI techniques to datasets and instead delves into deeper issues that ari...

Full description

Bibliographic Details
Other Authors: Stamp, Mark (Editor), Aaron Visaggio, Corrado (Editor), Mercaldo, Francesco (Editor), Di Troia, Fabio (Editor)
Format: eBook
Language:English
Published: Cham Springer International Publishing 2022, 2022
Edition:1st ed. 2022
Series:Advances in Information Security
Subjects:
Online Access:
Collection: Springer eBooks 2005- - Collection details see MPG.ReNa
LEADER 03604nmm a2200361 u 4500
001 EB002018622
003 EBX01000000000000001181520
005 00000000000000.0
007 cr|||||||||||||||||||||
008 220804 ||| eng
020 |a 9783030970871 
100 1 |a Stamp, Mark  |e [editor] 
245 0 0 |a Artificial Intelligence for Cybersecurity  |h Elektronische Ressource  |c edited by Mark Stamp, Corrado Aaron Visaggio, Francesco Mercaldo, Fabio Di Troia 
250 |a 1st ed. 2022 
260 |a Cham  |b Springer International Publishing  |c 2022, 2022 
300 |a XVI, 380 p. 184 illus., 155 illus. in color  |b online resource 
505 0 |a Part I: Malware-Related Topics -- Generation of Adversarial Malware and Benign Examples using Reinforcement Learning -- Auxiliary-Classifier GAN for Malware Analysis -- Assessing the Robustness of an Image-based Malware Classifier with Small Level Perturbations Techniques -- Detecting Botnets Through Deep Learning and Network Flow Analysis -- Interpretability of Machine Learning-Based Results of Malware Detection Using a Set of Rules -- Mobile Malware Detection using Consortium Blockchain -- BERT for Malware Classification -- Machine Learning for Malware Evolution Detection -- Part II: Other Security Topics -- Gambling for Success: The Lottery Ticket Hypothesis in Deep Learning-based Side-channel Analysis -- Evaluating Deep Learning Models and Adversarial Attacks on Accelerometer-Based Gesture Authentication -- Clickbait Detection for YouTube Videos -- Survivability Using Artificial Intelligence Assisted Cyber Risk Warning -- Machine Learning and Deep Learning for Fixed-Text Keystroke Dynamics -- Machine Learning-Based Analysis of Free-Text Keystroke Dynamic -- Free-Text Keystroke Dynamics for User Authentication 
653 |a Machine learning 
653 |a Mobile and Network Security 
653 |a Computer networks / Security measures 
653 |a Machine Learning 
653 |a Artificial Intelligence 
653 |a Artificial intelligence 
700 1 |a Aaron Visaggio, Corrado  |e [editor] 
700 1 |a Mercaldo, Francesco  |e [editor] 
700 1 |a Di Troia, Fabio  |e [editor] 
041 0 7 |a eng  |2 ISO 639-2 
989 |b Springer  |a Springer eBooks 2005- 
490 0 |a Advances in Information Security 
028 5 0 |a 10.1007/978-3-030-97087-1 
856 4 0 |u https://doi.org/10.1007/978-3-030-97087-1?nosfx=y  |x Verlag  |3 Volltext 
082 0 |a 006.31 
520 |a This book explores new and novel applications of machine learning, deep learning, and artificial intelligence that are related to major challenges in the field of cybersecurity. The provided research goes beyond simply applying AI techniques to datasets and instead delves into deeper issues that arise at the interface between deep learning and cybersecurity. This book also provides insight into the difficult "how" and "why" questions that arise in AI within the security domain. For example, this book includes chapters covering "explainable AI", "adversarial learning", "resilient AI", and a wide variety of related topics. It’s not limited to any specific cybersecurity subtopics and the chapters touch upon a wide range of cybersecurity domains, ranging from malware to biometrics and more. Researchers and advanced level students working and studying in the fields of cybersecurity (equivalently, information security) or artificial intelligence (including deep learning, machine learning, big data, and related fields) will want to purchase this book as a reference. Practitioners working within these fields will also be interested in purchasing this book