دسترسی نامحدود
برای کاربرانی که ثبت نام کرده اند
برای ارتباط با ما می توانید از طریق شماره موبایل زیر از طریق تماس و پیامک با ما در ارتباط باشید
در صورت عدم پاسخ گویی از طریق پیامک با پشتیبان در ارتباط باشید
برای کاربرانی که ثبت نام کرده اند
درصورت عدم همخوانی توضیحات با کتاب
از ساعت 7 صبح تا 10 شب
ویرایش: [1st ed. 2021]
نویسندگان: Sanjay Misra (editor). Amit Kumar Tyagi (editor)
سری: Studies in Computational Intelligence, 972
ISBN (شابک) : 303072235X, 9783030722357
ناشر: Springer
سال نشر: 2021
تعداد صفحات: 477
زبان: English
فرمت فایل : EPUB (درصورت درخواست کاربر به PDF، EPUB یا AZW3 تبدیل می شود)
حجم فایل: 45 Mb
در صورت تبدیل فایل کتاب Artificial Intelligence for Cyber Security: Methods, Issues and Possible Horizons or Opportunities به فرمت های PDF، EPUB، AZW3، MOBI و یا DJVU می توانید به پشتیبان اطلاع دهید تا فایل مورد نظر را تبدیل نمایند.
توجه داشته باشید کتاب هوش مصنوعی برای امنیت سایبری: روشها، مسائل و افقها یا فرصتهای ممکن نسخه زبان اصلی می باشد و کتاب ترجمه شده به فارسی نمی باشد. وبسایت اینترنشنال لایبرری ارائه دهنده کتاب های زبان اصلی می باشد و هیچ گونه کتاب ترجمه شده یا نوشته شده به فارسی را ارائه نمی دهد.
Preface Contents A Deep Learning Framework to Preserve Privacy in Federated (Collaborative) Learning 1 Introduction 2 Problem Statement 2.1 System Model 2.2 Attack Model 3 Literature Review 3.1 General 3.2 Problem Specific 4 Preliminaries 4.1 Homomorphic Encryption 4.2 Additive Homomorphic Encryption 4.3 More Approaches to Related Problem 5 Solution Design 5.1 Initialization 5.2 Upload Parameters 5.3 Secure Cryptographic Protocol Between Server `A\' and Server `B\' 5.4 Retrieve Parameters 6 Security Analysis 6.1 The Partial DLP 7 Experimental Setup and Analysis 7.1 Increased Communication Factor Analysis 7.2 Implementation Details 7.3 Comparison of Different Techniques 8 Conclusion and Future Work References Significance of Feature Selection and Pruning Algorithms in Machine Learning Classification of E-Mails 1 Introduction 2 Related Works 3 Theoretical Background 3.1 Feature Selection Architecture 3.2 Feature Ranking Methods 4 Proposed Methodology 4.1 System Model 4.2 Feature Selection and Pruning Algorithms 5 Results and Analysis 5.1 Experiment 1: Feature Selection Using Feature Evaluator Method 5.2 Experiment 2: Feature Selected Classifier 5.3 Experiment 3: Scheme-Independent Feature Selection 5.4 Experiment 4: Fast Feature Selection Using Ranking 5.5 Experiment 5 and 6: Counting the Cost and Cost-Sensitive Classification Versus Cost-Sensitive Learning 6 Conclusion References Biometric Fingerprint Generation Using Generative Adversarial Networks 1 Introduction 2 Related Work 2.1 Deep Learning 2.2 Deep Generative Modelling 2.3 Generative Adversarial Networks (GANs) 2.4 How GANs Work 2.5 Training a GAN 2.6 Cost Function for the GAN 2.7 Deep Convolutional Generative Adversarial Network (DCGAN) 2.8 Cybersecurity and GANs 3 Model Architecture for the Biometric Fingerprint GAN 3.1 Generator Architecture 3.2 Discriminator Architecture 4 Model Training 4.1 Biometric Fingerprint Dataset 4.2 Fingerprint Feature Extraction and Matching 4.3 Experimental Setup 5 Results 5.1 NFIQ2 Fingerprint Quality Analysis 5.2 BOZORTH3 Fingerprint Matching Results 5.3 NFIQ2 Quality Analysis on Matched Samples 6 Conclusion and Future Works References Assessing Cybersecurity Economic Risks in Virtual Power Plant UsingDeep Learning Techniques 1 Introduction 2 Assessing Cybersecurity Economics, Economics Risk and Frameworks in VPP 2.1 Measuring Cybersecurity Costs and Quantifying 2.2 Modelling and Measuring the Economic Risks in Cybersecurity 2.3 ROI Models 2.4 Cyber Risk Quantification and Cyber Risk Mitigation Frameworks 3 Proposed Model 3.1 Data and Methodology 4 Results and Discussions 5 Conclusions Appendix: NIST Cybersecurity Frameworks (in Brief) References Biometric E-Voting System for Cybersecurity 1 Introduction 2 Related Work 2.1 The Present Voting System 2.2 Enabling Technology for Bio-EVS 3 System Analysis and Methodology 3.1 Analysis of the Proposed Biometric-Based E-Voting System 3.2 Specifications and Designs 4 System Implementation and Evaluation 4.1 System Implementation 4.2 System Testing 5 Conclusion and Future Work References Wrapper Based Approach for Network Intrusion Detection Model with Combination of Dual Filtering Technique of Resample and SMOTE 1 Introduction 2 Review of Literature 2.1 Introduction 2.2 Machine Learning 2.3 Imbalance Dataset 3 Research Method 3.1 Data Source 3.2 Feature Selection 3.3 Class Imbalance 4 Implementation, Results and Experimental Work 4.1 Performance Metrics (Measurement) 4.2 Experimental Result Analysis 4.3 Performance Comparison 5 Conclusion References Proactive Network Packet Classification Using Artificial Intelligence 1 Introduction 2 Background and Literature Survey 3 Proposed System 4 Implementation 5 Conclusion and Future Scope References Security and Information Assurance for IoT-Based Big Data 1 Introduction 2 Security and Privacy of Internet of Things 2.1 Security of IoT and Big Data 3 Cryptography and the Three-Des Algorithm 3.1 Triple DES 4 Related Work 5 Methodology 5.1 Application of Triple Data Encryption Standard 5.2 Data Gathered from IoT 5.3 The GATEWAY 6 Result and Discussions 7 Conclusion and Future Direction References Privacy Preservation Approaches for Social Network Data Publishing 1 Introduction 2 Social Network Data Publishing 3 Privacy Breaches 4 Privacy Preservation Approaches 5 K-Degree Anonymization Approach 5.1 Graph Clustering 6 k-NMF Anonymization Approach 7 Differential Privacy Approach 8 Conclusion References An Obfuscation Technique for Malware Detection and Protection in Sandboxing 1 Introduction 2 Related Works 3 Background Information 4 Proposed Methodology 5 Results and Discussions 6 Conclusion and Future Work References Secure Data Sharing with Interplanetary File System for Pharmaceutical Data 1 Introduction 2 Materials/Techniques 2.1 Role of RFID in Pharmaceutical Industry 2.2 Security Issues in IoT 2.3 Block Chain Technology 2.4 Working of Interplanetary File System 2.5 Block Chain Architecture for Secure Pharmaceutical Data Storage with IPFS 2.6 System Flow for Secure Storage and Access in the Proposed Consortium Block Chain Network 2.7 Consortium Block Chain Smart Contract Design-Block Based Node Authentication and Access Policy 2.8 Scope of LSTM over RNN 3 Implementation 3.1 Entities Used in Simulation 4 Results and Discussions 4.1 AES-256 Encryption and Decryption of QR Code Information 4.2 Comparison of Security Analysis with Other Related Works 5 Conclusion Appendix References Blockchain-Enabled Verification System 1 Introduction 2 Terms, Definitions and Related Work 2.1 Related Work 3 Research Method and Requirements Definition 4 Verification Concept 4.1 Blockchain for Verification 4.2 Taxonomy 4.3 Claiming Tokens 4.4 Voting Process 5 Architecture 5.1 Scenarios 5.2 Physical View 5.3 Deployment View 5.4 Logical View 5.5 Process View 6 Prototype and Evaluation 6.1 Technology Stack 6.2 Functioning of the Prototype 6.3 Evaluation 7 Conclusion 7.1 Future Work References Threat Artificial Intelligence and Cyber Security in Health Care Institutions 1 Introduction 2 Preliminaries 2.1 Artificial Neural Networks 2.2 The General Data Protection Regulation 3 Case Study—An Entropic Approach to Data Attainment and Processing 4 Threat Consciousness 4.1 The Best-Case Scenario 4.2 The Worst-Case Scenario 5 Conclusions and Future Work References Description of a Network Attack Ontology Presented Formally 1 Introduction 2 Taxonomy 3 A Formal Description of the Network Attack Ontology 3.1 Concepts of Network Attacks 3.2 Relations 3.3 Constraints on Classes 3.4 Denial of Service Scenario 4 Attack Scenario Examples: The SCO Attack, SpamHaus and Solarwinds 4.1 SCO Attack 4.2 Spamhaus DDoS Attack 4.3 Solarwinds Supply Chain Attack 5 Conclusions and Future Work References A Long Short Term Memory Model for Credit Card Fraud Detection 1 Introduction 2 Related Works 3 System Design 3.1 Datasets Description and Source 3.2 Data Pre-processing 3.3 Feature Conversion 3.4 PCA (Principal Component Analysis) 3.5 Data Normalization 3.6 LSTM-Recurrent Neural Network Classification 4 Implementation Technique 4.1 Loading Datasets 4.2 LSTM-RNN Implementation 4.3 Classification 4.4 System Evaluation 4.5 Comparison of Proposed System with Some Existing Works Using Detection Rate/Precision, Accuracy and Recall 5 Conclusion References Application of Machine Learning for Ransomware Detection in IoT Devices 1 Introduction 2 The Fundamental Concepts of IoT 2.1 The Security Issues of the Internet of Things 2.2 Research Trends in IoT and Artificial Intelligence (A.I.) Techniques 3 Overview Concepts of Ransomware 3.1 Ransomware Lifecycle 3.2 Taxonomy of IoT Security 4 Practical Case of Ransomware Detection in IoT Devices Using Machine Learning Techniques 4.1 Modeling the Power Consumption 4.2 Refining the Model for the Wi-Fi Consumption 4.3 The CPU Consumption 4.4 The Long Short-Term Memory (LSTM) 5 Proposed Method 6 Results and Discussion 7 Conclusion and Future Work References Machine Learning Algorithm for Cryptocurrencies Price Prediction 1 Introduction 2 The Function of Money 2.1 Research Trends in Cryptocurrencies and Artificial Intelligence (AI) Techniques 2.2 Prediction Models for Cryptocurrency 2.3 Machine Learning Comparison for Cryptocurrencies Price Prediction 3 Motivation—The Rationale for Choosing Machine Learning Techniques for Cryptocurrencies Price Prediction 4 Practical Case of Cryptocurrency Prediction with Machine Learning Techniques 4.1 Data Description and Preprocessing 4.2 Long Short-Term Memory (LSTM) 5 The Proposed LSTM 6 Results and Discussion 7 Conclusion and Future Research Direction References Metaheuristic Techniques in Attack and Defense Strategies for Cybersecurity: A Systematic Review 1 Introduction 2 Methods 3 Results 3.1 Malware Detection 3.2 Cipher Attacks 3.3 Distributed Denial of Service 3.4 Data Injection Attacks 3.5 Intrusion Detection System and Intrusion Prevention System 3.6 Security Audit Trail Analysis Problem 3.7 Other Techniques of Attacks and Defense 4 Conclusion and Future Work 4.1 Future Work References