Linked e-resources

Details

Intro
Preface
Contents
1 Introduction to Artificial Intelligence and Cybersecurity for Industry
Introduction
Classification of Cyberattacks (See Fig. 1.1)
Types of Cybersecurity
Tools Used in Cybersecurity
Firewall
Honeypots
How Does Artificial Intelligence Work? (See Fig. 1.3)
AI Implementation Methods
Machine Learning
Deep Learning
Background Information on AI Methods and Cybersecurity Applications
The Significance of Cybersecurity
How AI Can Be Applied on Cybersecurity Issues
AI Techniques Used for Cybersecurity
Security Expert Systems

Deep Learning Detection for Misinformation
Benefits of AI in Cybersecurity
Detecting False Information Using Neural Networks
Using Neural Networks to Find Objectionable YouTube Content
Challenges Faced with Integration of AI in Cybersecurity
Classification Error
Intensive Requirement for Resources
Public Perception
Discussion
Conclusion
References
2 Role of AI and Its Impact on the Development of Cyber Security Applications
Introduction
Overview of Artificial Intelligence
Literature Survey
Artificial Intelligence Techniques for Cyber Security

Various Artificial Intelligence Tools and Techniques Are Mentioned Below
Machine Learning Algorithm Used to Train a Machine
Why AI is Preferred Over Current Anomaly Detection and Prevention Systems?
Use Cases of Artificial Intelligence in Cyber Security
Applications of AI in Cyber Security
AI Solutions for Cyber Security [26]
Limitations of AI in Security
Ethical Issues Related to AI [27]
AI-Based Threat to Cyber Security [27]
Conclusion
References
3 AI and IoT in Manufacturing and Related Security Perspectives for Industry 4.0
Introduction

Role of AI in Manufacturing
Related Works
Technologies
Impact of AI in Manufacturing
Uses Cases of AI in Manufacturing
IoT in Manufacturing
Related Works
Technologies
Need of IIoT Security
Applications
Vulnerabilities and Challenges
Quality Control
Threat Recognition
Configuration of the Hardware
Encryption of Data
Confidentiality of Data
Integration of Cyber-Physical Systems
Devices Pairing Key Establishment
Device Management
Conclusion and Future Work
References
4 IoT Security Vulnerabilities and Defensive Measures in Industry 4.0

Introduction
IoT/IIoT Security Challenges and Requirements
IoT/IIoT Security Challenges
Requirements for IoT/IIoT Security
IoT Architecture and Security Attacks
Architecture of IoT
IoT Security Attacks in Architectural Perspective
Preventive Techniques and Mechanisms of IoT/IIoT Security
Preventive Techniques of IoT Security Attacks
Mechanisms for Combating IoT/IIoT Security Attacks
Conclusion
References
5 Adopting Artificial Intelligence in ITIL for Information Security Management-Way Forward in Industry 4.0
Introduction
Definition of AI

Browse Subjects

Show more subjects...

Statistics

from
to
Export