دسترسی نامحدود
برای کاربرانی که ثبت نام کرده اند
برای ارتباط با ما می توانید از طریق شماره موبایل زیر از طریق تماس و پیامک با ما در ارتباط باشید
در صورت عدم پاسخ گویی از طریق پیامک با پشتیبان در ارتباط باشید
برای کاربرانی که ثبت نام کرده اند
درصورت عدم همخوانی توضیحات با کتاب
از ساعت 7 صبح تا 10 شب
ویرایش: [1 ed.]
نویسندگان: Ishaani Priyadarshini (editor). Rohit Sharma (editor)
سری:
ISBN (شابک) : 036746666X, 9780367466664
ناشر: CRC Press
سال نشر: 2022
تعداد صفحات: 320
[223]
زبان: English
فرمت فایل : PDF (درصورت درخواست کاربر به PDF، EPUB یا AZW3 تبدیل می شود)
حجم فایل: 17 Mb
در صورت ایرانی بودن نویسنده امکان دانلود وجود ندارد و مبلغ عودت داده خواهد شد
در صورت تبدیل فایل کتاب Artificial Intelligence and Cybersecurity: Advances and Innovations (Green Engineering and Technology) به فرمت های PDF، EPUB، AZW3، MOBI و یا DJVU می توانید به پشتیبان اطلاع دهید تا فایل مورد نظر را تبدیل نمایند.
توجه داشته باشید کتاب هوش مصنوعی و امنیت سایبری: پیشرفتها و نوآوریها (مهندسی و فناوری سبز) نسخه زبان اصلی می باشد و کتاب ترجمه شده به فارسی نمی باشد. وبسایت اینترنشنال لایبرری ارائه دهنده کتاب های زبان اصلی می باشد و هیچ گونه کتاب ترجمه شده یا نوشته شده به فارسی را ارائه نمی دهد.
هوش مصنوعی و امنیت سایبری دو حوزه نوظهور هستند که سهم خارقالعادهای در پیشرفت فناوری دارند. با افزایش حملات سایبری، نیاز به شناسایی تهدیدها و خنثی کردن حملات وجود دارد. این کتاب شامل پیشرفتهای اخیری است که هوش مصنوعی به دنیای امنیت سایبری میآورد.
هوش مصنوعی و امنیت سایبری: پیشرفتها و نوآوریها پیادهسازی سیستم پیشرفتهای را برای شهرهای هوشمند با استفاده از هوش مصنوعی فراهم میکند. این به گردش کار چارچوب عملکردی کامل میپردازد و مفاهیم پایه و سطح بالا را بررسی میکند. این کتاب بر اساس آخرین فناوریها است که چالشها، مسائل و پیشرفتهای عمده را پوشش میدهد و مدیریت هوشمند دادهها و سیستمهای خودکار را مورد بحث قرار میدهد.
این کتاب ویرایششده یک پلت فرم بینرشتهای برتر برای محققان، پزشکان و مربیان فراهم میکند. این مقاله جدیدترین نوآوری ها، روندها و نگرانی ها و همچنین چالش ها و راه حل های عملی اتخاذ شده در زمینه های هوش مصنوعی و امنیت سایبری را ارائه و مورد بحث قرار می دهد.
Artificial Intelligence and Cybersecurity are two emerging fields that have phenomenal contributions towards technological advancement. As cyber-attacks increase, there is a need to identify threats and thwart attacks. This book will incorporate the recent developments that artificial intelligence brings to the cybersecurity world.
Artificial Intelligence and Cybersecurity: Advances and Innovations provides advanced system implementation for Smart Cities using Artificial Intelligence. It addresses the complete functional framework workflow and explores basic and high-level concepts. The book is based on the latest technologies covering major challenges, issues, and advances, and discusses intelligent data management and automated systems.
This edited book provides a premier interdisciplinary platform for researchers, practitioners, and educators. It presents and discusses the most recent innovations, trends, and concerns as well as practical challenges and solutions adopted in the fields of Artificial Intelligence and Cybersecurity.
Cover Half Title Series Page Title Page Copyright Page Table of Contents Preface About the Editors Contributors Chapter 1 Heart Disease Prediction: A Comparative Study Based on a Machine-Learning Approach Introduction Literature Survey AI Diagnosis Process Datasets and Attributes Data Cleaning Feature Selection Machine Learning XGBoost Result Analysis Confusion Matrix Receiver Operating Curve (ROC Conclusion and Future Scope Acknowledgements Bibliography Chapter 2 AI Impacts on Photonic Crystal Sensing for the Detection of Tumors Introduction Biological Sensing Tumors and Their Classification Projected PCF-Based Refractive Index Sensor Artificial Intelligence Algorithm Helps to Detect Tumors Result and Discussion Conclusion Acknowledgement Declaration Conflict of Interest References Chapter 3 Cybersecurity Solutions and Communication Technologies for Internet of Things Applications Introduction Cybersecurity in IoT Architecture Cybersecurity at the Perception Layer Cybersecurity at the Network Layer Cybersecurity at the Processing Layer Cybersecurity at the Application Layer Cybersecurity at the Service Management Layer Security Mechanisms for IoT Services Encryption Standard Encryption Mechanism Lightweight Cryptography Random Number Generator Secure Hardware Intrusion Detection System Major IoT Communication Technologies Zigbee Bluetooth Low Energy 6LoWPAN CoAP LoRaWAN Computational Intelligence-Enabled Cybersecurity for IoT Conclusion References Chapter 4 Cyberattacks and Risk Management Strategy in Internet of Things Architecture Introduction Cybersecurity-Oriented IoT Architecture Sensing Layer Network Layer Middleware Layer Application Layer Attacks on IoT Devices Initial Reconnaissance Physical Attacks Man-in-the-Middle Attack Ransomware Brute Force Attacks Botnets Denial-of-Service (DoS) Attack Cybersecurity Risk Management Qualitative Approach Quantitative Approach Artificial Intelligence (AI) in Cybersecurity Machine Learning Decision Trees K-Nearest Neighbors Support Vector Machines Artificial Neural Networks Quantum-Resistant Cybersecurity Technologies Multivariate Cryptography Code-Based Signatures Hash-Based Signatures Lattice-Based Cryptography Conclusion References Chapter 5 Blockchain-Based Cybersecurity Solutions for Industry 4.0 Applications Introduction Four-Layered Cybersecurity-Oriented IoT Architecture Sensing Layer Network Layer Middleware Layer Application Layer Security Threats in Industry 4.0 Cyberespionage Denial-of-Service Supply Chain and Extended Systems Smart Security and Smart Factory Advanced Persistent Threat Logistics Active Supervision Cybersecurity Solutions for Factories Controlled Industrial Environment Research Software Defined Networking (SDN Direct-to-Machine Approach in CPS Ensemble Intelligence in Advanced Manufacturing Behavioral Models and Critical State Distance Blockchain for Industry 4.0 Applications Need for Blockchain Smart Contracts for Industry 4.0 Blockchain-Based Industry 4.0 Applications IIoT ICPS Autonomous Robots and Vehicles Cybersecurity Simulation Software Conclusion References Chapter 6 A Review of Precision Agriculture Based on Embedded System Applications Introduction Benefits of the Platform for Smart Agriculture Literature Survey Remote Sensing Intelligent Systems Internet of Things (IoT Proposed System Smart Precision Agri-Farm Using Proposed IoT Method Comparison of Various Methods in the Precision Agriculture (PA) Field Discussion Performance Standard Is Too Accurate Shortage of Scientific Identification Techniques Are Too Specific Conclusion References Chapter 7 Facial Feature-Based Human Emotion Detection Using Machine Learning: An Overview Introduction Making Car Passengers Safe Facial Expression Detection in Interviews Correct Passengers Are Picked Up by Taxi Drivers Video Games Testing Unlocking Phones Investigation Class Attendance Airport Security Hotels, Casinos and Bars Literature Review Methodology a) Feature-based approach (i) Geometric feature-matching technology (ii) Elastic bunch graph b) Holistic-based approach (i) Statistical approach (ii) Artificial intelligence methods c) Hybrid approach Discussion and Conclusion References Chapter 8 A Comprehensive Study of Security in Electronic Commerce Frameworks in the Modern Era of Technology Background Study Significance of Electronic Commerce A Comparative Study of Traditional Commerce versus E-Commerce Prerequisite to E-Commerce Security Security Systems in E-Commerce Security Measures in E-commerce Role of E-Commerce in Daily Life Role of E-Commerce in Trade Facilitation Role of E-Commerce in Cross-Border Transfer Services Role of E-Commerce in Cybersecurity Role of E-Commerce in Daily Customer Interaction Role of E-Commerce in International Internet Connectivity Internet Security in E-Commerce Secure Sockets Layer (SSL SSL Certificate Encompassing E-Commerce Transaction Security SSL Certificate Requirements Securing SSL Certificate Digital Certificates Importance of Security in Online Transactions Ways to Secure Online Transactions Secure Hypertext Transfer Protocol (SHTTP Working of HTTP SHTTP Certificate Overview SEO Edges Secure Digital Transactions Various Methodologies to Protect E-Commerce Sites from Hacking Major Strategies Employed to Curtail Fraud in E-Commerce Payment Systems in E-Commerce Conclusion References Chapter 9 Identification of Paddy Diseases by Various Algorithms–A Review Introduction Literature Review Detection Image Processing Methods Artificial Neural Networks Knowledge Based Fuzzy Logic Classification Remote Sensing Membership Function Feature-Based Rules Neural Networks Support Vector Machine (SVM Remote Sensing Quantification Fuzzy Logic Neural Networks Expert System SVM Discussion Methods Are Too Precise Operations Quality Is Too Exact Lack of Scientific Recognition Conclusion References Chapter 10 A Multimodal Biosignal Compression Technique for Monitoring Health in Wearable Devices Introduction Methodology Transfer Learning (TL Multimodal Autoencoder (M-AE Proposed Methodology Performance Assessment Performance Assessment Measures Experimental Data Experimental Results Discussion Conclusion References Chapter 11 A Comprehensive Study on Metaheuristics, Big Data and Deep Neural Network Strategies Introduction Metaheuristics and Big Data Deep Neural Network (DNN A Brief History of DL Feed Forward Neural Network (FNN Application of Metaheuristics Algorithms Application of Metaheuristic Algorithm in NN Training Genetic Algorithm (GA) and NN PSO and NN Key Concepts of DNN Gradient Descent (GD Optimisation Algorithms (OAs Activation Functions Logistic Regression (LR Conventional Optimisation Approaches Conclusions References Chapter 12 Communication Strategies for Interaction in Social Networks: A Multilingual Perspective Introduction Communication Strategies Politeness in Multilingual and Multicultural Communication Politeness in Social Network Communications The Framework of Politeness Multilingualism and Multiculturalism Multilingualism and Language Education Conclusion References Index