Artificial Intelligence and Cybersecurity (eBook)

Theory and Applications
eBook Download: PDF
2022 | 1st ed. 2023
X, 301 Seiten
Springer International Publishing (Verlag)
978-3-031-15030-2 (ISBN)

Lese- und Medienproben

Artificial Intelligence and Cybersecurity -
Systemvoraussetzungen
160,49 inkl. MwSt
  • Download sofort lieferbar
  • Zahlungsarten anzeigen
This book discusses artificial intelligence (AI) and cybersecurity from multiple points of view. The diverse chapters reveal modern trends and challenges related to the use of artificial intelligence when considering privacy, cyber-attacks and defense as well as applications from malware detection to radio signal intelligence.

The chapters are contributed by an international team of renown researchers and professionals in the field of AI and cybersecurity.

During the last few decades the rise of modern AI solutions that surpass humans in specific tasks has occurred. Moreover, these new technologies provide new methods of automating cybersecurity tasks. In addition to the privacy, ethics and cybersecurity concerns, the readers learn several new cutting edge applications of AI technologies.

Researchers working in AI and cybersecurity as well as advanced level students studying computer science and electrical engineering with a focus on AI and Cybersecurity will find this book useful as a reference. Professionals working within these related fields will also want to purchase this book as a reference.

 


Tuomo Sipola works as a senior researcher at the Institute of Information Technology at JAMK University of Applied Sciences, Jyväskylä, Finland. His research interests include machine learning and data analytics, and he has worked in both research and commercial projects in many application areas, including predictive maintenance, network security and medical imaging. This earlier work experience includes research positions at the University of Jyväskylä and CEO duties in his startup company, CAP Data Technologies. He completed his PhD in mathematical information technology (University of Jyväskylä) in 2013, and recently, MA in Latin in 2020.

Tero Kokkonen works as a principal lecturer in cybersecurity and as the head of R&D in cybersecurity and artificial intelligence related R&D programs at JAMK University of Applied Sciences, Jyväskylä, Finland. Tero holds a PhD in information technology and has been promoted to adjunct professor (title of docent) in cybersecurity. Tero has significantly conducted research and development in cybersecurity and artificial intelligence including several international publications. Before his academic career, Tero has served as a program manager and technical specialist with C4ISR Systems in Finnish Air Force. 

Mika Karjalainen is working at JAMK University of Applied Sciences as the director of School of Technology. Dr. Karjalainen also leads Institute of Information Technology's cybersecurity research, development and training center JYVSECTEC, which maintains and develops the Finnish national cybersecurity range, and has organized the Finnish National Cyber Security Exercise annually since 2013. Dr. Karjalainen holds a PhD in information technology and in conducting research in the field of cybersecurity education, especially focusing on students' learning during the cybersecurity exercises. 

Erscheint lt. Verlag 7.12.2022
Zusatzinfo X, 301 p. 68 illus., 5 illus. in color.
Sprache englisch
Themenwelt Informatik Netzwerke Sicherheit / Firewall
Mathematik / Informatik Informatik Web / Internet
Schlagworte Adversarial Attack • Android malware • Applied mathematics • Artificial Intelligence • cybersecurity • Cybersecurity Training • cyber threat • Deep learning • differential privacy • ethics • IT Law • machine learning • malware detection • Medical Imaging • mission critical systems • Quantile Regression • radio signal intelligence • Resilience Engineering • security management
ISBN-10 3-031-15030-9 / 3031150309
ISBN-13 978-3-031-15030-2 / 9783031150302
Haben Sie eine Frage zum Produkt?
PDFPDF (Wasserzeichen)
Größe: 6,2 MB

DRM: Digitales Wasserzeichen
Dieses eBook enthält ein digitales Wasser­zeichen und ist damit für Sie persona­lisiert. Bei einer missbräuch­lichen Weiter­gabe des eBooks an Dritte ist eine Rück­ver­folgung an die Quelle möglich.

Dateiformat: PDF (Portable Document Format)
Mit einem festen Seiten­layout eignet sich die PDF besonders für Fach­bücher mit Spalten, Tabellen und Abbild­ungen. Eine PDF kann auf fast allen Geräten ange­zeigt werden, ist aber für kleine Displays (Smart­phone, eReader) nur einge­schränkt geeignet.

Systemvoraussetzungen:
PC/Mac: Mit einem PC oder Mac können Sie dieses eBook lesen. Sie benötigen dafür einen PDF-Viewer - z.B. den Adobe Reader oder Adobe Digital Editions.
eReader: Dieses eBook kann mit (fast) allen eBook-Readern gelesen werden. Mit dem amazon-Kindle ist es aber nicht kompatibel.
Smartphone/Tablet: Egal ob Apple oder Android, dieses eBook können Sie lesen. Sie benötigen dafür einen PDF-Viewer - z.B. die kostenlose Adobe Digital Editions-App.

Buying eBooks from abroad
For tax law reasons we can sell eBooks just within Germany and Switzerland. Regrettably we cannot fulfill eBook-orders from other countries.

Mehr entdecken
aus dem Bereich
Das Praxishandbuch zu Krisenmanagement und Krisenkommunikation

von Holger Kaschner

eBook Download (2024)
Springer Fachmedien Wiesbaden (Verlag)
34,99
Methodische Kombination von IT-Strategie und IT-Reifegradmodell

von Markus Mangiapane; Roman P. Büchler

eBook Download (2024)
Springer Vieweg (Verlag)
42,99