This book provides theoretical background and state-of-the-art findings in artificial intelligence and cybersecurity for industry 4.0 and helps in implementing AI-based cybersecurity applications. Machine learning-based security approaches are vulnerable to poison datasets which can be caused by a legitimate defender's misclassification or attackers aiming to evade detection by contaminating the training data set. There also exist gaps between the test environment and the real world. Therefore, it is critical to check the potentials and limitations of AI-based security technologies in terms of metrics such as security, performance, cost, time, and consider how to incorporate them into the real world by addressing the gaps appropriately. This book focuses on state-of-the-art findings from both academia and industry in big data security relevant sciences, technologies, and applications.
Die Inhaltsangabe kann sich auf eine andere Ausgabe dieses Titels beziehen.
Dr. Velliangiri Sarveshwaran obtained his bachelor's degree in computer science and engineering from Anna University, Chennai. Master in Computer Science and Engineering from Karpagam University, Coimbatore, and Doctor of Philosophy in Information and Communication Engineering from Anna University, Chennai. Currently, he is working as an assistant professor at the SRM Institute of Science and Technology, Kattankulathur Campus, Chennai. He was a member of the Institute of Electrical and Electronics Engineers (IEEE) and the International Association of Engineers (IAENG). He was the reviewer of IEEE Transactions, Elsevier, Springer, Inderscience, and other reputed Scopus-indexed journals. He is specialized in network security and optimization techniques. He published in more than 30 international journals and presented at more than 10 international conferences. He also serves as a technical program committee chair and conference chair at many international conferences. He also serves as an area editor for the EAI Endorsed Journal of Energy Web and an academic editor in the Journal of Wireless Communication and Mobile Computing.
Joy Iong-Zong Chen was born in Taichung Taiwan. He received his B.Sc., degrees in Electronics Engineering from the National Taiwan Technical University, Taipei, Taiwan, and M.Sc., degrees in Electrical Engineering from the Dayeh University, Chunghua, Taiwan, in 1985 and 1995, respectively, and Ph.D. degrees in Electrical Engineering from the National Defense University, Tao-Yuan, Taiwan, in 2001. He is currently a full professor at the Department of Communication Engineering at Dayeh University in Changhua Taiwan. Before joining Dayeh University, he worked as a Technical Manager at the Control Data Company (Taiwan branch) from Sep. 1985 to Sep. 1996. His research interests include wireless communications, spread spectrum technical, MIMO systems, OFDM systems, and wireless sensor networks.Dr. Joy I.-Z. Chen has published a large number of SCI/EI Journal papers on the issues addressed by the physical layer for wireless communication systems. Moreover, he also majors in developing some applications of the IOT (Internet of Things) techniques and Dr. Joy I.-Z.Chen owned some patents authorized by the Taiwan Intellectual Property Office (TIPO). Dr Joy I.-Z. Chen has ever been serving as many important positions in International Conferences.
Danilo Pelusi received a PhD in Computational Astrophysics from the University of Teramo, Italy. He is an Associate Professor at the Department of Communication Sciences, University of Teramo. Editor of books in Springer and Elsevier, he is/was an Associate Editor of IEEE Transactions on Emerging Topics in Computational Intelligence, IEEE Access and International Journal of Machine Learning and Cybernetics. Guest editor for Elsevier, Springer and Inderscience journals and keynote speaker in several IEEEconferences, he belongs to the editorial board member of many journals. His research interests include Fuzzy Logic, Neural Networks, Information Theory, Machine Learning and Evolutionary Algorithms. Dr Danilo Pelusi is an editor of Neuroscience Informatics.
This book provides theoretical background and state-of-the-art findings in artificial intelligence and cybersecurity for industry 4.0 and helps in implementing AI-based cybersecurity applications. Machine learning-based security approaches are vulnerable to poison datasets which can be caused by a legitimate defender's misclassification or attackers aiming to evade detection by contaminating the training data set. There also exist gaps between the test environment and the real world. Therefore, it is critical to check the potentials and limitations of AI-based security technologies in terms of metrics such as security, performance, cost, time, and consider how to incorporate them into the real world by addressing the gaps appropriately. This book focuses on state-of-the-art findings from both academia and industry in big data security relevant sciences, technologies, and applications.
?
„Über diesen Titel“ kann sich auf eine andere Ausgabe dieses Titels beziehen.
EUR 5,77 für den Versand von Vereinigtes Königreich nach Deutschland
Versandziele, Kosten & DauerAnbieter: Speedyhen, London, Vereinigtes Königreich
Zustand: NEW. Artikel-Nr. NW9789819921140
Anzahl: 1 verfügbar
Anbieter: PBShop.store UK, Fairford, GLOS, Vereinigtes Königreich
HRD. Zustand: New. New Book. Shipped from UK. Established seller since 2000. Artikel-Nr. GB-9789819921140
Anzahl: 1 verfügbar
Anbieter: PBShop.store US, Wood Dale, IL, USA
HRD. Zustand: New. New Book. Shipped from UK. Established seller since 2000. Artikel-Nr. GB-9789819921140
Anzahl: 1 verfügbar
Anbieter: buchversandmimpf2000, Emtmannsberg, BAYE, Deutschland
Buch. Zustand: Neu. Neuware -This book provides theoretical background and state-of-the-art findings in artificial intelligence and cybersecurity for industry 4.0 and helps in implementing AI-based cybersecurity applications. Machine learning-based security approaches are vulnerable to poison datasets which can be caused by a legitimate defender's misclassification or attackers aiming to evade detection by contaminating the training data set. There also exist gaps between the test environment and the real world. Therefore, it is critical to check the potentials and limitations of AI-based security technologies in terms of metrics such as security, performance, cost, time, and consider how to incorporate them into the real world by addressing the gaps appropriately. This book focuses on state-of-the-art findings from both academia and industry in big data security relevant sciences, technologies, and applications.¿Springer Verlag GmbH, Tiergartenstr. 17, 69121 Heidelberg 384 pp. Englisch. Artikel-Nr. 9789819921140
Anzahl: 2 verfügbar
Anbieter: Ria Christie Collections, Uxbridge, Vereinigtes Königreich
Zustand: New. In. Artikel-Nr. ria9789819921140_new
Anzahl: Mehr als 20 verfügbar
Anbieter: moluna, Greven, Deutschland
Zustand: New. Provides an introduction by illustrating state-of-the-art AI and cybersecurity in industry 4.0Highlights latest cybersecurity developments in healthcare and manufacturingIncludes case studies from the leading AI integrated vendors: Amazon, . Artikel-Nr. 838236806
Anzahl: 1 verfügbar
Anbieter: AHA-BUCH GmbH, Einbeck, Deutschland
Buch. Zustand: Neu. Druck auf Anfrage Neuware - Printed after ordering - This book provides theoretical background and state-of-the-art findings in artificial intelligence and cybersecurity for industry 4.0 and helps in implementing AI-based cybersecurity applications. Machine learning-based security approaches are vulnerable to poison datasets which can be caused by a legitimate defender's misclassification or attackers aiming to evade detection by contaminating the training data set. There also exist gaps between the test environment and the real world. Therefore, it is critical to check the potentials and limitations of AI-based security technologies in terms of metrics such as security, performance, cost, time, and consider how to incorporate them into the real world by addressing the gaps appropriately. This book focuses on state-of-the-art findings from both academia and industry in big data security relevant sciences, technologies, and applications. Artikel-Nr. 9789819921140
Anzahl: 3 verfügbar
Anbieter: Majestic Books, Hounslow, Vereinigtes Königreich
Zustand: New. Artikel-Nr. 401109700
Anzahl: 1 verfügbar
Anbieter: Revaluation Books, Exeter, Vereinigtes Königreich
Hardcover. Zustand: Brand New. 381 pages. 9.25x6.10x0.98 inches. In Stock. Artikel-Nr. x-9819921147
Anzahl: 2 verfügbar