Computational Intelligence for Cybersecurity Management and Applications 1st Edition
by Yassine Maleh (Editor), Mamoun Alazab (Editor), Soufyane Mounir (Editor)
Publisher finelybook 出版社: CRC Press; 1st edition (April 28, 2023)
Language 语言: English
Print Length 页数: 240 pages
ISBN-10: 1032335033
ISBN-13: 9781032335032
Book Description
By finelybook
As cyberattacks continue to grow in complexity and number, computational intelligence is helping under-resourced security analysts stay one step ahead of threats. Drawing on threat intelligence from millions of studies, blogs, and news articles, computational intelligence techniques such as machine learning and automatic natural language processing quickly provide the means to identify real threats and dramatically reduce response times.
Computational Intelligence for Cybersecurity Management and Applications collects and reports on recent high-quality research addressing different cybersecurity challenges. It:
Explore the newest developments in the use of computational intelligence and AI for cybersecurity applications;
Provide several case studies related to computational intelligence techniques for cybersecurity in a wide range of applications (Smart Healthcare, Blockchain, Cyber-Physical System, etc.);
Integrate theoretical and practical aspects of computational intelligence for cybersecurity so that any reader, from novice to expert, may understand the book’s explanations of key topics.
The book offers comprehensive coverage of the essential topics, including:
Machine Learning and Deep Learning for cybersecurity
Blockchain for cybersecurity and privacy
Security engineering for Cyber-physical systems
AI and Data Analytics techniques for cybersecurity in smart systems
Trust in digital systems
This book discusses the current state of the art and practical solutions for the following cybersecurity and privacy issues using artificial intelligence techniques and cutting-edge technology. Readers interested in learning more about computational intelligence techniques for cybersecurity applications and management will find this book invaluable. They will get insight into potential avenues for future study on these topics and be able to prioritize their efforts better.