Cybersecurity in Intelligent Networking Systems IEEE Press 1st Edition by Shengjie Xu, Yi Qian, Rose Qingyang Hu – Ebook PDF Instant Download/Delivery: 1119784123, 9781119784128
Full download Cybersecurity in Intelligent Networking Systems IEEE Press 1st Edition after payment
Product details:
ISBN 10: 1119784123
ISBN 13: 9781119784128
Author: Shengjie Xu; Yi Qian; Rose Qingyang Hu
Primary: Reference for professional engineers and researchers in cyber security and artificial intelligence areas
Cybersecurity in Intelligent Networking Systems IEEE Press 1st Table of contents:
1 Cybersecurity in the Era of Artificial Intelligence
1.1 Artificial Intelligence for Cybersecurity
1.2 Key Areas and Challenges
1.3 Toolbox to Build Secure and Intelligent Systems
1.4 Data Repositories for Cybersecurity Research
1.5 Summary
Notes
References
2 Cyber Threats and Gateway Defense
2.1 Cyber Threats
2.2 Gateway Defense Approaches
2.3 Emerging Data‐driven Methods for Gateway Defense
2.4 Case Study: Reinforcement Learning for Automated Post‐breach Penetration Test
2.5 Summary
References
3 Edge Computing and Secure Edge Intelligence
3.1 Edge Computing
3.2 Key Advances in Edge Computing
3.3 Secure Edge Intelligence
3.4 Summary
References
4 Edge Intelligence for Intrusion Detection
4.1 Edge Cyberinfrastructure
4.2 Edge AI Engine
4.3 Threat Intelligence
4.4 Preliminary Study
4.5 Summary
References
5 Robust Intrusion Detection
5.1 Preliminaries
5.2 Robust Intrusion Detection
5.3 Experimental and Evaluation
5.4 Summary
References
6 Efficient Pre‐processing Scheme for Anomaly Detection
6.1 Efficient Anomaly Detection
6.2 Proposed Pre‐processing Scheme for Anomaly Detection
6.3 Case Study
6.4 Summary
References
7 Privacy Preservation in the Era of Big Data
7.1 Privacy Preservation Approaches
7.2 Privacy‐Preserving Anomaly Detection
7.3 Objectives and Workflow
7.4 Predicate Encryption‐Based Anomaly Detection
7.5 Case Study and Evaluation
7.6 Summary
References
8 Adversarial Examples: Challenges and Solutions
8.1 Adversarial Examples
8.2 Adversarial Attacks in Security Applications
8.3 Case Study: Improving Adversarial Attacks Against Malware Detectors
8.4 Case Study: A Metric for Machine Learning Vulnerability to Adversarial Examples
8.5 Case Study: Protecting Smart Speakers from Adversarial Voice Commands
8.6 Summary
References
Index
End User License Agreement
People also search for Cybersecurity in Intelligent Networking Systems IEEE Press 1st :
technologies used for cyber security
information systems or cyber security
computer specs for cyber security
is networking important for cyber security
Tags:
Shengjie Xu,Yi Qian,Rose Qingyang Hu,Cybersecurity