Machine learning for cyber agents: attack and defence
The cyber world has been both enhanced and endangered by AI. On the one hand, the performance of many existing security services has been improved, and new tools created. On the other, it entails new cyber threats both through evolved attacking capacities and through its own imperfections and vulner...
Gespeichert in:
Hauptverfasser: | , |
---|---|
Format: | Buch |
Sprache: | English |
Veröffentlicht: |
Cham, Switzerland
Springer
[2022]
|
Schriftenreihe: | Advanced sciences and technologies for security applications
|
Schlagworte: | |
Zusammenfassung: | The cyber world has been both enhanced and endangered by AI. On the one hand, the performance of many existing security services has been improved, and new tools created. On the other, it entails new cyber threats both through evolved attacking capacities and through its own imperfections and vulnerabilities. Moreover, quantum computers are further pushing the boundaries of what is possible, by making machine learning cyber agents faster and smarter.With the abundance of often-confusing information and lack of trust in the diverse applications of AI-based technologies, it is essential to have a book that can explain, from a cyber security standpoint, why and at what stage the emerging, powerful technology of machine learning can and should be mistrusted, and how to benefit from it while avoiding potentially disastrous consequences. In addition, this book sheds light on another highly sensitive area – the application of machine learning for offensive purposes, an aspect that is widely misunderstood, under-represented in the academic literature and requires immediate expert attention |
Beschreibung: | 1. Introduction.- 2. Understanding Machine Learning.- 3. Defence.- 4. Attack.- 5. Feasibility and Misconceptions.- 6. International resonance.- 7. Prospects.- 8. Conclusion. |
Beschreibung: | xv, 227 Seiten Illustrationen 379 grams |
ISBN: | 9783030915872 |
Internformat
MARC
LEADER | 00000nam a2200000 c 4500 | ||
---|---|---|---|
001 | BV048851506 | ||
003 | DE-604 | ||
005 | 20230412 | ||
007 | t | ||
008 | 230308s2022 a||| |||| 00||| eng d | ||
020 | |a 9783030915872 |c pbk |9 978-3-030-91587-2 | ||
024 | 3 | |a 9783030915872 | |
035 | |a (OCoLC)1376413631 | ||
035 | |a (DE-599)BVBBV048851506 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-29T | ||
100 | 1 | |a Abaimov, Stanislav |d 1989- |e Verfasser |0 (DE-588)117973985X |4 aut | |
245 | 1 | 0 | |a Machine learning for cyber agents |b attack and defence |c Stanislav Abaimov, Maurizio Martellini |
264 | 1 | |a Cham, Switzerland |b Springer |c [2022] | |
300 | |a xv, 227 Seiten |b Illustrationen |c 379 grams | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
490 | 0 | |a Advanced sciences and technologies for security applications | |
500 | |a 1. Introduction.- 2. Understanding Machine Learning.- 3. Defence.- 4. Attack.- 5. Feasibility and Misconceptions.- 6. International resonance.- 7. Prospects.- 8. Conclusion. | ||
520 | |a The cyber world has been both enhanced and endangered by AI. On the one hand, the performance of many existing security services has been improved, and new tools created. On the other, it entails new cyber threats both through evolved attacking capacities and through its own imperfections and vulnerabilities. Moreover, quantum computers are further pushing the boundaries of what is possible, by making machine learning cyber agents faster and smarter.With the abundance of often-confusing information and lack of trust in the diverse applications of AI-based technologies, it is essential to have a book that can explain, from a cyber security standpoint, why and at what stage the emerging, powerful technology of machine learning can and should be mistrusted, and how to benefit from it while avoiding potentially disastrous consequences. In addition, this book sheds light on another highly sensitive area – the application of machine learning for offensive purposes, an aspect that is widely misunderstood, under-represented in the academic literature and requires immediate expert attention | ||
650 | 4 | |a Data protection | |
650 | 4 | |a Computer networks—Security measures | |
650 | 4 | |a Security systems | |
650 | 4 | |a Machine learning | |
653 | |a Hardcover, Softcover / Informatik, EDV/Informatik | ||
700 | 1 | |a Martellini, Maurizio |d 1953- |e Verfasser |0 (DE-588)1179739744 |4 aut | |
776 | 0 | 8 | |i Erscheint auch als |n Online-Ausgabe |z 978-3-030-91585-8 |
999 | |a oai:aleph.bib-bvb.de:BVB01-034116770 |
Datensatz im Suchindex
_version_ | 1804184971576868864 |
---|---|
adam_txt | |
any_adam_object | |
any_adam_object_boolean | |
author | Abaimov, Stanislav 1989- Martellini, Maurizio 1953- |
author_GND | (DE-588)117973985X (DE-588)1179739744 |
author_facet | Abaimov, Stanislav 1989- Martellini, Maurizio 1953- |
author_role | aut aut |
author_sort | Abaimov, Stanislav 1989- |
author_variant | s a sa m m mm |
building | Verbundindex |
bvnumber | BV048851506 |
ctrlnum | (OCoLC)1376413631 (DE-599)BVBBV048851506 |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02592nam a2200385 c 4500</leader><controlfield tag="001">BV048851506</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20230412 </controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">230308s2022 a||| |||| 00||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783030915872</subfield><subfield code="c">pbk</subfield><subfield code="9">978-3-030-91587-2</subfield></datafield><datafield tag="024" ind1="3" ind2=" "><subfield code="a">9783030915872</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1376413631</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV048851506</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-29T</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Abaimov, Stanislav</subfield><subfield code="d">1989-</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)117973985X</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Machine learning for cyber agents</subfield><subfield code="b">attack and defence</subfield><subfield code="c">Stanislav Abaimov, Maurizio Martellini</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Cham, Switzerland</subfield><subfield code="b">Springer</subfield><subfield code="c">[2022]</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">xv, 227 Seiten</subfield><subfield code="b">Illustrationen</subfield><subfield code="c">379 grams</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">Advanced sciences and technologies for security applications</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">1. Introduction.- 2. Understanding Machine Learning.- 3. Defence.- 4. Attack.- 5. Feasibility and Misconceptions.- 6. International resonance.- 7. Prospects.- 8. Conclusion.</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">The cyber world has been both enhanced and endangered by AI. On the one hand, the performance of many existing security services has been improved, and new tools created. On the other, it entails new cyber threats both through evolved attacking capacities and through its own imperfections and vulnerabilities. Moreover, quantum computers are further pushing the boundaries of what is possible, by making machine learning cyber agents faster and smarter.With the abundance of often-confusing information and lack of trust in the diverse applications of AI-based technologies, it is essential to have a book that can explain, from a cyber security standpoint, why and at what stage the emerging, powerful technology of machine learning can and should be mistrusted, and how to benefit from it while avoiding potentially disastrous consequences. In addition, this book sheds light on another highly sensitive area – the application of machine learning for offensive purposes, an aspect that is widely misunderstood, under-represented in the academic literature and requires immediate expert attention</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data protection</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks—Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Security systems</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Machine learning</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Hardcover, Softcover / Informatik, EDV/Informatik</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Martellini, Maurizio</subfield><subfield code="d">1953-</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)1179739744</subfield><subfield code="4">aut</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Online-Ausgabe</subfield><subfield code="z">978-3-030-91585-8</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-034116770</subfield></datafield></record></collection> |
id | DE-604.BV048851506 |
illustrated | Illustrated |
index_date | 2024-07-03T21:40:18Z |
indexdate | 2024-07-10T09:47:49Z |
institution | BVB |
isbn | 9783030915872 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-034116770 |
oclc_num | 1376413631 |
open_access_boolean | |
owner | DE-29T |
owner_facet | DE-29T |
physical | xv, 227 Seiten Illustrationen 379 grams |
publishDate | 2022 |
publishDateSearch | 2022 |
publishDateSort | 2022 |
publisher | Springer |
record_format | marc |
series2 | Advanced sciences and technologies for security applications |
spelling | Abaimov, Stanislav 1989- Verfasser (DE-588)117973985X aut Machine learning for cyber agents attack and defence Stanislav Abaimov, Maurizio Martellini Cham, Switzerland Springer [2022] xv, 227 Seiten Illustrationen 379 grams txt rdacontent n rdamedia nc rdacarrier Advanced sciences and technologies for security applications 1. Introduction.- 2. Understanding Machine Learning.- 3. Defence.- 4. Attack.- 5. Feasibility and Misconceptions.- 6. International resonance.- 7. Prospects.- 8. Conclusion. The cyber world has been both enhanced and endangered by AI. On the one hand, the performance of many existing security services has been improved, and new tools created. On the other, it entails new cyber threats both through evolved attacking capacities and through its own imperfections and vulnerabilities. Moreover, quantum computers are further pushing the boundaries of what is possible, by making machine learning cyber agents faster and smarter.With the abundance of often-confusing information and lack of trust in the diverse applications of AI-based technologies, it is essential to have a book that can explain, from a cyber security standpoint, why and at what stage the emerging, powerful technology of machine learning can and should be mistrusted, and how to benefit from it while avoiding potentially disastrous consequences. In addition, this book sheds light on another highly sensitive area – the application of machine learning for offensive purposes, an aspect that is widely misunderstood, under-represented in the academic literature and requires immediate expert attention Data protection Computer networks—Security measures Security systems Machine learning Hardcover, Softcover / Informatik, EDV/Informatik Martellini, Maurizio 1953- Verfasser (DE-588)1179739744 aut Erscheint auch als Online-Ausgabe 978-3-030-91585-8 |
spellingShingle | Abaimov, Stanislav 1989- Martellini, Maurizio 1953- Machine learning for cyber agents attack and defence Data protection Computer networks—Security measures Security systems Machine learning |
title | Machine learning for cyber agents attack and defence |
title_auth | Machine learning for cyber agents attack and defence |
title_exact_search | Machine learning for cyber agents attack and defence |
title_exact_search_txtP | Machine learning for cyber agents attack and defence |
title_full | Machine learning for cyber agents attack and defence Stanislav Abaimov, Maurizio Martellini |
title_fullStr | Machine learning for cyber agents attack and defence Stanislav Abaimov, Maurizio Martellini |
title_full_unstemmed | Machine learning for cyber agents attack and defence Stanislav Abaimov, Maurizio Martellini |
title_short | Machine learning for cyber agents |
title_sort | machine learning for cyber agents attack and defence |
title_sub | attack and defence |
topic | Data protection Computer networks—Security measures Security systems Machine learning |
topic_facet | Data protection Computer networks—Security measures Security systems Machine learning |
work_keys_str_mv | AT abaimovstanislav machinelearningforcyberagentsattackanddefence AT martellinimaurizio machinelearningforcyberagentsattackanddefence |