Machine intelligence applications in...
Maleh, Yassine, (1987-)

Linked to FindBook      Google Book      Amazon      博客來     
  • Machine intelligence applications in cyber-risk management
  • Record Type: Electronic resources : Monograph/item
    Title/Author: Machine intelligence applications in cyber-risk management/ Mohammed Amin Almaiah, Yassine Maleh, editors.
    other author: Maleh, Yassine,
    Published: Hershey, Pennsylvania :IGI Global, : 2025.,
    Description: 1 online resource (xix, 492 p.) :ill.
    [NT 15003449]: Preface -- Section 1. Foundations of Cyber-Risk and Emerging Technologies -- Chapter 1. Advancements and Challenges in the Internet of Drones Security Issues: A Comprehensive Review -- Chapter 2. Security Challenges and Solutions inIoT: An In-Depth Review of Anomaly Detection and Intrusion Prevention -- Chapter 3. Analysis of Blackhole Attack in RPL-Based 6LoWPAN Network Using Contiki-NG -- Chapter 4. DIS Flooding Attack Impact in RPL-Based 6LowPAN Network -- Section2. Machine Intelligence for Malware Detection and Cybersecurity -- Chapter 5. Artificial Intelligence, Terrorism, and Cyber Security: Challenges and Opportunities -- Chapter 6. AI-Based Solutions for Malware Detection and Prevention -- Chapter 7. Evolving AI-Based Malware Detection: A Hybrid Approach Combining Transfer Learning and Explainable AI -- Chapter 8. Phishing URL Detection Using BiLSTM With Attention Mechanism -- Section 3. Machine Intelligence and Cyber-Risk Management -- Chapter 9. Cyber Risk Assessment Using Machine Learning Algorithms -- Chapter 10. Explainable AI for Transparent Cyber-Risk Assessment and Decision-Making -- Chapter 11. Application of Information Theoretical Models for AI-Driven Cybersecurity Systems -- Chapter 12. Machine Learning Techniques for Network Security -- Section 4. Cyber-Risk and Anomaly Detection -- Chapter 13. Anomaly Detection Algorithms in Cybersecurity -- Chapter 14. Real-Time Threat Detection in Cybersecurity: Leveraging Machine Learning Algorithms for Enhanced Anomaly Detection -- Chapter 15. Intrusion Detection for Wireless Sensor Networks Using Parrot Algorithm -- Chapter 16. Mining Cybersecurity Intelligence From Spam Emails Using the AI-Based Generative Adversarial Network -- Section 5. Ethical Considerations in Machine Intelligence for Cyber Risk Management -- Chapter 17. Ethical and Legal Implications of AI in Cybersecurity -- Chapter 18. Future Trends and Innovation in Machine Intelligence for Cyber Risk Management -- Compilation of References -- About the Contributors -- Index.
    Subject: Computer security - Technological innovations. -
    Online resource: https://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/979-8-3693-7540-2
    ISBN: 9798369375426
Location:  Year:  Volume Number: 
Items
  • 1 records • Pages 1 •
 
W9521069 電子資源 11.線上閱覽_V 電子書 EB QA76.9.A25 M3133 2025eb 一般使用(Normal) On shelf 0
  • 1 records • Pages 1 •
Multimedia
Reviews
Export
pickup library
 
 
Change password
Login