001482296 000__ 03473cam\\2200613\i\4500 001482296 001__ 1482296 001482296 003__ OCoLC 001482296 005__ 20231128003330.0 001482296 006__ m\\\\\o\\d\\\\\\\\ 001482296 007__ cr\cn\nnnunnun 001482296 008__ 231010s2023\\\\sz\a\\\\ob\\\\000\0\eng\d 001482296 019__ $$a1402200040 001482296 020__ $$a9783031285813$$q(electronic bk.) 001482296 020__ $$a3031285816$$q(electronic bk.) 001482296 020__ $$z3031285808 001482296 020__ $$z9783031285806 001482296 0247_ $$a10.1007/978-3-031-28581-3$$2doi 001482296 035__ $$aSP(OCoLC)1402167859 001482296 040__ $$aGW5XE$$beng$$erda$$epn$$cGW5XE$$dYDX$$dOCLCO 001482296 049__ $$aISEA 001482296 050_4 $$aQA76.9.A25 001482296 08204 $$a005.8$$223/eng/20231010 001482296 24500 $$aArtificial intelligence in cyber security :$$btheories and applications /$$cTushar Bhardwaj, Himanshu Upadhyay, Tarun Kumar Sharma, Steven Lawrence Fernandes, editors. 001482296 264_1 $$aCham :$$bSpringer,$$c[2023] 001482296 264_4 $$c©2023 001482296 300__ $$a1 online resource (x, 138 pages) :$$billustrations (some color). 001482296 336__ $$atext$$btxt$$2rdacontent 001482296 337__ $$acomputer$$bc$$2rdamedia 001482296 338__ $$aonline resource$$bcr$$2rdacarrier 001482296 4901_ $$aIntelligent systems reference library ;$$vvolume 240 001482296 504__ $$aIncludes bibliographical references. 001482296 5050_ $$aA Comprehensive Review On Cloud Security Using Machine Learning Techniques -- Energy Enhanced Routing Protocol for Heterogeneous Networks using Artificial Intelligence -- Integration of Machine Learning with Cybersecurity: Applications and Challenges -- Deep Learning Approach for Detection of Fraudulent Credit Card Transactions. 001482296 506__ $$aAccess limited to authorized users. 001482296 520__ $$aThis book highlights the applications and theory of artificial intelligence in the domain of cybersecurity. The book proposes new approaches and ideas to present applications of innovative approaches in real-time environments. In the past few decades, there has been an exponential rise in the application of artificial intelligence technologies (such as deep learning, machine learning, blockchain) for solving complex and intricate problems arising in the domain of cybersecurity. The versatility of these techniques has made them a favorite among scientists and researchers working in diverse areas. This book serves as a reference for young scholars, researchers, and industry professionals working in the field of Artificial Intelligence and Cybersecurity. . 001482296 588__ $$aDescription based on print version record. 001482296 650_6 $$aSécurité informatique. 001482296 650_6 $$aIntelligence artificielle. 001482296 650_0 $$aComputer security. 001482296 650_0 $$aArtificial intelligence.$$xMedical applications$$0(DLC)sh 88003000 001482296 655_0 $$aElectronic books. 001482296 7001_ $$aBhardwaj, Tushar,$$eeditor. 001482296 7001_ $$aUpadhyay, Himanshu,$$eeditor. 001482296 7001_ $$aSharma, Tarun K.,$$eeditor. 001482296 7001_ $$aFernandes, Steven L.,$$eeditor. 001482296 77608 $$iPrint version:$$tARTIFICIAL INTELLIGENCE IN CYBER SECURITY.$$d[Place of publication not identified] : SPRINGER INTERNATIONAL PU, 2023$$z3031285808$$w(OCoLC)1370488354 001482296 830_0 $$aIntelligent systems reference library ;$$vv. 240. 001482296 852__ $$bebk 001482296 85640 $$3Springer Nature$$uhttps://univsouthin.idm.oclc.org/login?url=https://link.springer.com/10.1007/978-3-031-28581-3$$zOnline Access$$91397441.1 001482296 909CO $$ooai:library.usi.edu:1482296$$pGLOBAL_SET 001482296 980__ $$aBIB 001482296 980__ $$aEBOOK 001482296 982__ $$aEbook 001482296 983__ $$aOnline 001482296 994__ $$a92$$bISE