TY - GEN N2 - This book highlights the applications and theory of artificial intelligence in the domain of cybersecurity. The book proposes new approaches and ideas to present applications of innovative approaches in real-time environments. In the past few decades, there has been an exponential rise in the application of artificial intelligence technologies (such as deep learning, machine learning, blockchain) for solving complex and intricate problems arising in the domain of cybersecurity. The versatility of these techniques has made them a favorite among scientists and researchers working in diverse areas. This book serves as a reference for young scholars, researchers, and industry professionals working in the field of Artificial Intelligence and Cybersecurity. . DO - 10.1007/978-3-031-28581-3 DO - doi AB - This book highlights the applications and theory of artificial intelligence in the domain of cybersecurity. The book proposes new approaches and ideas to present applications of innovative approaches in real-time environments. In the past few decades, there has been an exponential rise in the application of artificial intelligence technologies (such as deep learning, machine learning, blockchain) for solving complex and intricate problems arising in the domain of cybersecurity. The versatility of these techniques has made them a favorite among scientists and researchers working in diverse areas. This book serves as a reference for young scholars, researchers, and industry professionals working in the field of Artificial Intelligence and Cybersecurity. . T1 - Artificial intelligence in cyber security :theories and applications / AU - Bhardwaj, Tushar, AU - Upadhyay, Himanshu, AU - Sharma, Tarun K., AU - Fernandes, Steven L., VL - volume 240 CN - QA76.9.A25 ID - 1482296 KW - Sécurité informatique. KW - Intelligence artificielle. KW - Computer security. KW - Artificial intelligence. SN - 9783031285813 SN - 3031285816 TI - Artificial intelligence in cyber security :theories and applications / LK - https://univsouthin.idm.oclc.org/login?url=https://link.springer.com/10.1007/978-3-031-28581-3 UR - https://univsouthin.idm.oclc.org/login?url=https://link.springer.com/10.1007/978-3-031-28581-3 ER -