Artificial Intelligence and Cyber Security in Industry 4.0

This book provides theoretical background and state-of-the-art findings in artificial intelligence and cybersecurity for industry 4.0 and helps in implementing AI-based cybersecurity applications. Machine learning-based security approaches are vulnerable to poison datasets which can be caused by a l...

Full description

Bibliographic Details
Other Authors: Sarveshwaran, Velliangiri (Editor), Chen, Joy Iong-Zong (Editor), Pelusi, Danilo (Editor)
Format: eBook
Language:English
Published: Singapore Springer Nature Singapore 2023, 2023
Edition:1st ed. 2023
Series:Advanced Technologies and Societal Change
Subjects:
Online Access:
Collection: Springer eBooks 2005- - Collection details see MPG.ReNa
LEADER 03745nmm a2200433 u 4500
001 EB002167386
003 EBX01000000000000001304718
005 00000000000000.0
007 cr|||||||||||||||||||||
008 230704 ||| eng
020 |a 9789819921157 
100 1 |a Sarveshwaran, Velliangiri  |e [editor] 
245 0 0 |a Artificial Intelligence and Cyber Security in Industry 4.0  |h Elektronische Ressource  |c edited by Velliangiri Sarveshwaran, Joy Iong-Zong Chen, Danilo Pelusi 
250 |a 1st ed. 2023 
260 |a Singapore  |b Springer Nature Singapore  |c 2023, 2023 
300 |a VIII, 373 p. 100 illus., 86 illus. in color  |b online resource 
505 0 |a Introduction to Artificial Intelligence and Cyber Security for Industry -- Role of AI and its impact on the development of cyber security applications -- AI and IoT in Manufacturing and related Security Perspectives for Industry 4.0 -- IoT Security Vulnerabilities and Defensive Measures in Industry 4.0 -- Adopting Artificial Intelligence in ITIL for Information Security Management - Way forward in Industry 4.0 -- Intelligent Autonomous Drones in Industry 4.0 -- A review on automatic generation of attack trees and its application to automotive cybersecurity -- Malware Analysis using Machine Learning Tools and Techniques in IT Industry -- USE OF MACHINE LEARNING IN FORENSICS AND COMPUTER SECURITY -- Control of feed drives in CNC machine tools using artificial immune adaptive strategy -- Efficient Anomaly Detection for Empowering Cyber Security by Using Adaptive Deep Learning Model -- Intrusion Detection in IoT based Healthcare Using ML and DL approaches: A Case Study -- War Strategy Algorithm based GAN model for Detecting the Malware Attacks in Modern Digital Age -- ML algorithms for providing financial security in banking sectors with the prediction of loan risks -- Machine Learning based DDoS Attack Detection using Support Vector Machine -- Artificial Intelligence based Cyber Security Applications 
653 |a Machine learning 
653 |a Big data 
653 |a Wireless communication systems 
653 |a Wireless and Mobile Communication 
653 |a Mobile communication systems 
653 |a Machine Learning 
653 |a Internet of things 
653 |a Computational intelligence 
653 |a Artificial Intelligence 
653 |a Computational Intelligence 
653 |a Internet of Things 
653 |a Artificial intelligence 
653 |a Big Data 
700 1 |a Chen, Joy Iong-Zong  |e [editor] 
700 1 |a Pelusi, Danilo  |e [editor] 
041 0 7 |a eng  |2 ISO 639-2 
989 |b Springer  |a Springer eBooks 2005- 
490 0 |a Advanced Technologies and Societal Change 
028 5 0 |a 10.1007/978-981-99-2115-7 
856 4 0 |u https://doi.org/10.1007/978-981-99-2115-7?nosfx=y  |x Verlag  |3 Volltext 
082 0 |a 006.3 
520 |a This book provides theoretical background and state-of-the-art findings in artificial intelligence and cybersecurity for industry 4.0 and helps in implementing AI-based cybersecurity applications. Machine learning-based security approaches are vulnerable to poison datasets which can be caused by a legitimate defender's misclassification or attackers aiming to evade detection by contaminating the training data set. There also exist gaps between the test environment and the real world. Therefore, it is critical to check the potentials and limitations of AI-based security technologies in terms of metrics such as security, performance, cost, time, and consider how to incorporate them into the real world by addressing the gaps appropriately. This book focuses on state-of-the-art findings from both academia and industry in big data security relevant sciences, technologies, and applications