語系:
繁體中文
English
說明(常見問題)
回圖書館首頁
手機版館藏查詢
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Explainable AI for cybersecurity
~
Pan, Zhixin.
FindBook
Google Book
Amazon
博客來
Explainable AI for cybersecurity
紀錄類型:
書目-電子資源 : Monograph/item
正題名/作者:
Explainable AI for cybersecurity/ by Zhixin Pan, Prabhat Mishra.
作者:
Pan, Zhixin.
其他作者:
Mishra, Prabhat.
出版者:
Cham :Springer Nature Switzerland : : 2023.,
面頁冊數:
xviii, 243 p. :ill. (chiefly color), digital ;24 cm.
內容註:
Part 1: Introduction -- Chapter 1. Cybersecurity Landscape for Computer Systems -- Chapter 2. Explainable Artificial Intelligence -- Part 2: Detection of Software Vulnerabilities -- Chapter 3. Malware Detection using Explainable AI -- Chapter 4. Spectre and Meltdown Detection using Explainable AI -- Part 3: Detection of Hardware Vulnerabilities -- Chapter 5. Hardware Trojan Detection using Reinforcement Learning -- Chapter 6. Hardware Trojan Detection using Side-Channel Analysis -- Chapter 7. Hardware Trojan Detection using Shapley Ensemble Boosting -- Part 4: Mitigation of AI Vulnerabilities -- Chapter 8. Mitigation of Adversarial Machine Learning -- Chapter 9. AI Trojan Attacks and Countermeasures -- Part 5: Acceleration of Explainable AI -- Chapter 10. Hardware Acceleration of Explainable AI -- Chapter 11. Explainable AI Acceleration using Tensor Processing Units -- Part 6: Conclusion -- Chapter 12. The Future of AI-Enabled Cybersecurity.
Contained By:
Springer Nature eBook
標題:
Artificial intelligence - Data processing. -
電子資源:
https://doi.org/10.1007/978-3-031-46479-9
ISBN:
9783031464799
Explainable AI for cybersecurity
Pan, Zhixin.
Explainable AI for cybersecurity
[electronic resource] /by Zhixin Pan, Prabhat Mishra. - Cham :Springer Nature Switzerland :2023. - xviii, 243 p. :ill. (chiefly color), digital ;24 cm.
Part 1: Introduction -- Chapter 1. Cybersecurity Landscape for Computer Systems -- Chapter 2. Explainable Artificial Intelligence -- Part 2: Detection of Software Vulnerabilities -- Chapter 3. Malware Detection using Explainable AI -- Chapter 4. Spectre and Meltdown Detection using Explainable AI -- Part 3: Detection of Hardware Vulnerabilities -- Chapter 5. Hardware Trojan Detection using Reinforcement Learning -- Chapter 6. Hardware Trojan Detection using Side-Channel Analysis -- Chapter 7. Hardware Trojan Detection using Shapley Ensemble Boosting -- Part 4: Mitigation of AI Vulnerabilities -- Chapter 8. Mitigation of Adversarial Machine Learning -- Chapter 9. AI Trojan Attacks and Countermeasures -- Part 5: Acceleration of Explainable AI -- Chapter 10. Hardware Acceleration of Explainable AI -- Chapter 11. Explainable AI Acceleration using Tensor Processing Units -- Part 6: Conclusion -- Chapter 12. The Future of AI-Enabled Cybersecurity.
This book provides a comprehensive overview of security vulnerabilities and state-of-the-art countermeasures using explainable artificial intelligence (AI) Specifically, it describes how explainable AI can be effectively used for detection and mitigation of hardware vulnerabilities (e.g., hardware Trojans) as well as software attacks (e.g., malware and ransomware) It provides insights into the security threats towards machine learning models and presents effective countermeasures. It also explores hardware acceleration of explainable AI algorithms. The reader will be able to comprehend a complete picture of cybersecurity challenges and how to detect them using explainable AI. This book serves as a single source of reference for students, researchers, engineers, and practitioners for designing secure and trustworthy systems. Introduces a wide variety of software and hardware vulnerabilities; Describes solutions for detecting security attacks using explainable AI; Presents a fast and robust framework using hardware acceleration and mitigation of adversarial attacks.
ISBN: 9783031464799
Standard No.: 10.1007/978-3-031-46479-9doiSubjects--Topical Terms:
655284
Artificial intelligence
--Data processing.
LC Class. No.: Q342 / .P36 2023
Dewey Class. No.: 006.3
Explainable AI for cybersecurity
LDR
:03030nmm a2200325 a 4500
001
2390029
003
DE-He213
005
20231212134846.0
006
m d
007
cr nn 008maaau
008
250916s2023 sz s 0 eng d
020
$a
9783031464799
$q
(electronic bk.)
020
$a
9783031464782
$q
(paper)
024
7
$a
10.1007/978-3-031-46479-9
$2
doi
035
$a
978-3-031-46479-9
040
$a
GP
$c
GP
041
0
$a
eng
050
4
$a
Q342
$b
.P36 2023
072
7
$a
UYQ
$2
bicssc
072
7
$a
TEC009000
$2
bisacsh
072
7
$a
UYQ
$2
thema
082
0 4
$a
006.3
$2
23
090
$a
Q342
$b
.P187 2023
100
1
$a
Pan, Zhixin.
$3
3756114
245
1 0
$a
Explainable AI for cybersecurity
$h
[electronic resource] /
$c
by Zhixin Pan, Prabhat Mishra.
260
$a
Cham :
$b
Springer Nature Switzerland :
$b
Imprint: Springer,
$c
2023.
300
$a
xviii, 243 p. :
$b
ill. (chiefly color), digital ;
$c
24 cm.
505
0
$a
Part 1: Introduction -- Chapter 1. Cybersecurity Landscape for Computer Systems -- Chapter 2. Explainable Artificial Intelligence -- Part 2: Detection of Software Vulnerabilities -- Chapter 3. Malware Detection using Explainable AI -- Chapter 4. Spectre and Meltdown Detection using Explainable AI -- Part 3: Detection of Hardware Vulnerabilities -- Chapter 5. Hardware Trojan Detection using Reinforcement Learning -- Chapter 6. Hardware Trojan Detection using Side-Channel Analysis -- Chapter 7. Hardware Trojan Detection using Shapley Ensemble Boosting -- Part 4: Mitigation of AI Vulnerabilities -- Chapter 8. Mitigation of Adversarial Machine Learning -- Chapter 9. AI Trojan Attacks and Countermeasures -- Part 5: Acceleration of Explainable AI -- Chapter 10. Hardware Acceleration of Explainable AI -- Chapter 11. Explainable AI Acceleration using Tensor Processing Units -- Part 6: Conclusion -- Chapter 12. The Future of AI-Enabled Cybersecurity.
520
$a
This book provides a comprehensive overview of security vulnerabilities and state-of-the-art countermeasures using explainable artificial intelligence (AI) Specifically, it describes how explainable AI can be effectively used for detection and mitigation of hardware vulnerabilities (e.g., hardware Trojans) as well as software attacks (e.g., malware and ransomware) It provides insights into the security threats towards machine learning models and presents effective countermeasures. It also explores hardware acceleration of explainable AI algorithms. The reader will be able to comprehend a complete picture of cybersecurity challenges and how to detect them using explainable AI. This book serves as a single source of reference for students, researchers, engineers, and practitioners for designing secure and trustworthy systems. Introduces a wide variety of software and hardware vulnerabilities; Describes solutions for detecting security attacks using explainable AI; Presents a fast and robust framework using hardware acceleration and mitigation of adversarial attacks.
650
0
$a
Artificial intelligence
$x
Data processing.
$3
655284
650
0
$a
Internet of things
$x
Security measures.
$3
3217048
650
1 4
$a
Computational Intelligence.
$3
1001631
650
2 4
$a
Electronic Circuits and Systems.
$3
3538814
650
2 4
$a
Data and Information Security.
$3
3538510
650
2 4
$a
Electronics Design and Verification.
$3
3592716
650
2 4
$a
Embedded Systems.
$3
3592715
650
2 4
$a
Artificial Intelligence.
$3
769149
700
1
$a
Mishra, Prabhat.
$3
896585
710
2
$a
SpringerLink (Online service)
$3
836513
773
0
$t
Springer Nature eBook
856
4 0
$u
https://doi.org/10.1007/978-3-031-46479-9
950
$a
Intelligent Technologies and Robotics (SpringerNature-42732)
筆 0 讀者評論
館藏地:
全部
電子資源
出版年:
卷號:
館藏
1 筆 • 頁數 1 •
1
條碼號
典藏地名稱
館藏流通類別
資料類型
索書號
使用類型
借閱狀態
預約狀態
備註欄
附件
W9500793
電子資源
11.線上閱覽_V
電子書
EB Q342 .P36 2023
一般使用(Normal)
在架
0
1 筆 • 頁數 1 •
1
多媒體
評論
新增評論
分享你的心得
Export
取書館
處理中
...
變更密碼
登入