AI tools for protecting and preventing sophisticated cyber attacks:
The ubiquity and pervasive access to internet resources 24/7 by anyone from anywhere is enabling access to endless professional, educational, technical, business, industrial, medical, and government resources worldwide. To guarantee internet integrity and availability with confidentiality, the provi...
Gespeichert in:
Weitere Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Hershey PA, USA
IGI Global
[2023]
|
Schriftenreihe: | Advances in Information Security, Privacy, and Ethics (AISPE)
|
Schlagworte: | |
Online-Zugang: | DE-91 DE-706 DE-83 DE-898 DE-1050 Volltext |
Zusammenfassung: | The ubiquity and pervasive access to internet resources 24/7 by anyone from anywhere is enabling access to endless professional, educational, technical, business, industrial, medical, and government resources worldwide. To guarantee internet integrity and availability with confidentiality, the provision of proper and effective cyber security is critical for any organization across the world.AI Tools for Protecting and Preventing Sophisticated Cyber Attacks illuminates the most effective and practical applications of artificial intelligence (AI) in securing critical cyber infrastructure and internet communities worldwide. The book presents a collection of selected peer-reviewed chapters addressing the most important issues, technical solutions, and future research directions in cyber security. Covering topics such as assessment metrics, information security, and toolkits, this premier reference source is an essential resource for cyber security experts, cyber systems administrators, IT experts, internet and computer network professionals, organizational leaders, students and educators of higher education, researchers, and academicians.. |
Beschreibung: | 1 Online-Ressource (xvi, 233 Seiten) |
ISBN: | 9781668471128 |
DOI: | 10.4018/978-1-6684-7110-4 |
Internformat
MARC
LEADER | 00000nam a2200000zc 4500 | ||
---|---|---|---|
001 | BV049300925 | ||
003 | DE-604 | ||
005 | 20231018 | ||
007 | cr|uuu---uuuuu | ||
008 | 230828s2023 xx o|||| 00||| eng d | ||
020 | |a 9781668471128 |9 978-1-66847-112-8 | ||
024 | 7 | |a 10.4018/978-1-6684-7110-4 |2 doi | |
035 | |a (ZDB-98-IGB)00306192 | ||
035 | |a (ZDB-98-IGB)9781668471128 | ||
035 | |a (OCoLC)1401215532 | ||
035 | |a (DE-599)BVBBV049300925 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-91 |a DE-706 |a DE-83 |a DE-898 |a DE-1050 | ||
082 | 0 | |a 005.8 | |
084 | |a WIR 523 |2 stub | ||
084 | |a DAT 000 |2 stub | ||
245 | 1 | 0 | |a AI tools for protecting and preventing sophisticated cyber attacks |c Eduard Babulak (National Science Foundation, USA) |
246 | 1 | 3 | |a Artificial intelligence tools for protecting and preventing sophisticated cyber attacks |
264 | 1 | |a Hershey PA, USA |b IGI Global |c [2023] | |
300 | |a 1 Online-Ressource (xvi, 233 Seiten) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
490 | 0 | |a Advances in Information Security, Privacy, and Ethics (AISPE) | |
520 | |a The ubiquity and pervasive access to internet resources 24/7 by anyone from anywhere is enabling access to endless professional, educational, technical, business, industrial, medical, and government resources worldwide. To guarantee internet integrity and availability with confidentiality, the provision of proper and effective cyber security is critical for any organization across the world.AI Tools for Protecting and Preventing Sophisticated Cyber Attacks illuminates the most effective and practical applications of artificial intelligence (AI) in securing critical cyber infrastructure and internet communities worldwide. The book presents a collection of selected peer-reviewed chapters addressing the most important issues, technical solutions, and future research directions in cyber security. Covering topics such as assessment metrics, information security, and toolkits, this premier reference source is an essential resource for cyber security experts, cyber systems administrators, IT experts, internet and computer network professionals, organizational leaders, students and educators of higher education, researchers, and academicians.. | ||
650 | 4 | |a Artificial intelligence | |
650 | 4 | |a Computer crimes |x Prevention | |
650 | 4 | |a Computer networks |x Security measures | |
650 | 4 | |a Computer security | |
700 | 1 | |a Babulak, Eduard |4 edt | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 9781668471104 |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 1668471108 |
856 | 4 | 0 | |u https://doi.org/10.4018/978-1-6684-7110-4 |x Verlag |z URL des Erstveröffentlichers |3 Volltext |
912 | |a ZDB-98-IGB | ||
943 | 1 | |a oai:aleph.bib-bvb.de:BVB01-034562166 | |
966 | e | |u https://doi.org/10.4018/978-1-6684-7110-4 |l DE-91 |p ZDB-98-IGB |q TUM_Paketkauf_2023 |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.4018/978-1-6684-7110-4 |l DE-706 |p ZDB-98-IGB |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.4018/978-1-6684-7110-4 |l DE-83 |p ZDB-98-IGB |q TUB_EBS_IGB |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.4018/978-1-6684-7110-4 |l DE-898 |p ZDB-98-IGB |q FHR_PDA_IGB |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.4018/978-1-6684-7110-4 |l DE-1050 |p ZDB-98-IGB |x Verlag |3 Volltext |
Datensatz im Suchindex
_version_ | 1818715324605792256 |
---|---|
adam_text | |
adam_txt | |
any_adam_object | |
any_adam_object_boolean | |
author2 | Babulak, Eduard |
author2_role | edt |
author2_variant | e b eb |
author_facet | Babulak, Eduard |
building | Verbundindex |
bvnumber | BV049300925 |
classification_tum | WIR 523 DAT 000 |
collection | ZDB-98-IGB |
ctrlnum | (ZDB-98-IGB)00306192 (ZDB-98-IGB)9781668471128 (OCoLC)1401215532 (DE-599)BVBBV049300925 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik Wirtschaftswissenschaften |
discipline_str_mv | Informatik Wirtschaftswissenschaften |
doi_str_mv | 10.4018/978-1-6684-7110-4 |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>00000nam a2200000zc 4500</leader><controlfield tag="001">BV049300925</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20231018</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">230828s2023 xx o|||| 00||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781668471128</subfield><subfield code="9">978-1-66847-112-8</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.4018/978-1-6684-7110-4</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-98-IGB)00306192</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-98-IGB)9781668471128</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1401215532</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV049300925</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield><subfield code="a">DE-706</subfield><subfield code="a">DE-83</subfield><subfield code="a">DE-898</subfield><subfield code="a">DE-1050</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">WIR 523</subfield><subfield code="2">stub</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 000</subfield><subfield code="2">stub</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">AI tools for protecting and preventing sophisticated cyber attacks</subfield><subfield code="c">Eduard Babulak (National Science Foundation, USA)</subfield></datafield><datafield tag="246" ind1="1" ind2="3"><subfield code="a">Artificial intelligence tools for protecting and preventing sophisticated cyber attacks</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Hershey PA, USA</subfield><subfield code="b">IGI Global</subfield><subfield code="c">[2023]</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (xvi, 233 Seiten)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">Advances in Information Security, Privacy, and Ethics (AISPE)</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">The ubiquity and pervasive access to internet resources 24/7 by anyone from anywhere is enabling access to endless professional, educational, technical, business, industrial, medical, and government resources worldwide. To guarantee internet integrity and availability with confidentiality, the provision of proper and effective cyber security is critical for any organization across the world.AI Tools for Protecting and Preventing Sophisticated Cyber Attacks illuminates the most effective and practical applications of artificial intelligence (AI) in securing critical cyber infrastructure and internet communities worldwide. The book presents a collection of selected peer-reviewed chapters addressing the most important issues, technical solutions, and future research directions in cyber security. Covering topics such as assessment metrics, information security, and toolkits, this premier reference source is an essential resource for cyber security experts, cyber systems administrators, IT experts, internet and computer network professionals, organizational leaders, students and educators of higher education, researchers, and academicians..</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Artificial intelligence</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer crimes</subfield><subfield code="x">Prevention</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Babulak, Eduard</subfield><subfield code="4">edt</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">9781668471104</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">1668471108</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.4018/978-1-6684-7110-4</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Erstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-98-IGB</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-034562166</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.4018/978-1-6684-7110-4</subfield><subfield code="l">DE-91</subfield><subfield code="p">ZDB-98-IGB</subfield><subfield code="q">TUM_Paketkauf_2023</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.4018/978-1-6684-7110-4</subfield><subfield code="l">DE-706</subfield><subfield code="p">ZDB-98-IGB</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.4018/978-1-6684-7110-4</subfield><subfield code="l">DE-83</subfield><subfield code="p">ZDB-98-IGB</subfield><subfield code="q">TUB_EBS_IGB</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.4018/978-1-6684-7110-4</subfield><subfield code="l">DE-898</subfield><subfield code="p">ZDB-98-IGB</subfield><subfield code="q">FHR_PDA_IGB</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.4018/978-1-6684-7110-4</subfield><subfield code="l">DE-1050</subfield><subfield code="p">ZDB-98-IGB</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV049300925 |
illustrated | Not Illustrated |
index_date | 2024-07-03T22:39:09Z |
indexdate | 2024-12-17T19:01:33Z |
institution | BVB |
isbn | 9781668471128 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-034562166 |
oclc_num | 1401215532 |
open_access_boolean | |
owner | DE-91 DE-BY-TUM DE-706 DE-83 DE-898 DE-BY-UBR DE-1050 |
owner_facet | DE-91 DE-BY-TUM DE-706 DE-83 DE-898 DE-BY-UBR DE-1050 |
physical | 1 Online-Ressource (xvi, 233 Seiten) |
psigel | ZDB-98-IGB ZDB-98-IGB TUM_Paketkauf_2023 ZDB-98-IGB TUB_EBS_IGB ZDB-98-IGB FHR_PDA_IGB |
publishDate | 2023 |
publishDateSearch | 2023 |
publishDateSort | 2023 |
publisher | IGI Global |
record_format | marc |
series2 | Advances in Information Security, Privacy, and Ethics (AISPE) |
spelling | AI tools for protecting and preventing sophisticated cyber attacks Eduard Babulak (National Science Foundation, USA) Artificial intelligence tools for protecting and preventing sophisticated cyber attacks Hershey PA, USA IGI Global [2023] 1 Online-Ressource (xvi, 233 Seiten) txt rdacontent c rdamedia cr rdacarrier Advances in Information Security, Privacy, and Ethics (AISPE) The ubiquity and pervasive access to internet resources 24/7 by anyone from anywhere is enabling access to endless professional, educational, technical, business, industrial, medical, and government resources worldwide. To guarantee internet integrity and availability with confidentiality, the provision of proper and effective cyber security is critical for any organization across the world.AI Tools for Protecting and Preventing Sophisticated Cyber Attacks illuminates the most effective and practical applications of artificial intelligence (AI) in securing critical cyber infrastructure and internet communities worldwide. The book presents a collection of selected peer-reviewed chapters addressing the most important issues, technical solutions, and future research directions in cyber security. Covering topics such as assessment metrics, information security, and toolkits, this premier reference source is an essential resource for cyber security experts, cyber systems administrators, IT experts, internet and computer network professionals, organizational leaders, students and educators of higher education, researchers, and academicians.. Artificial intelligence Computer crimes Prevention Computer networks Security measures Computer security Babulak, Eduard edt Erscheint auch als Druck-Ausgabe 9781668471104 Erscheint auch als Druck-Ausgabe 1668471108 https://doi.org/10.4018/978-1-6684-7110-4 Verlag URL des Erstveröffentlichers Volltext |
spellingShingle | AI tools for protecting and preventing sophisticated cyber attacks Artificial intelligence Computer crimes Prevention Computer networks Security measures Computer security |
title | AI tools for protecting and preventing sophisticated cyber attacks |
title_alt | Artificial intelligence tools for protecting and preventing sophisticated cyber attacks |
title_auth | AI tools for protecting and preventing sophisticated cyber attacks |
title_exact_search | AI tools for protecting and preventing sophisticated cyber attacks |
title_exact_search_txtP | AI tools for protecting and preventing sophisticated cyber attacks |
title_full | AI tools for protecting and preventing sophisticated cyber attacks Eduard Babulak (National Science Foundation, USA) |
title_fullStr | AI tools for protecting and preventing sophisticated cyber attacks Eduard Babulak (National Science Foundation, USA) |
title_full_unstemmed | AI tools for protecting and preventing sophisticated cyber attacks Eduard Babulak (National Science Foundation, USA) |
title_short | AI tools for protecting and preventing sophisticated cyber attacks |
title_sort | ai tools for protecting and preventing sophisticated cyber attacks |
topic | Artificial intelligence Computer crimes Prevention Computer networks Security measures Computer security |
topic_facet | Artificial intelligence Computer crimes Prevention Computer networks Security measures Computer security |
url | https://doi.org/10.4018/978-1-6684-7110-4 |
work_keys_str_mv | AT babulakeduard aitoolsforprotectingandpreventingsophisticatedcyberattacks AT babulakeduard artificialintelligencetoolsforprotectingandpreventingsophisticatedcyberattacks |