Limit search to available items
Book Cover
E-book

Title Artificial intelligence and cybersecurity : theory and applications / Tuomo Sipola, Tero Kokkonen, Mika Karjalainen, editors
Published Cham : Springer, [2023]
©2023

Copies

Description 1 online resource (x, 301 pages) : illustrations (some color)
Contents Intro -- Preface -- Contents -- Contributors -- Part I Cybersecurity Concerns -- Use of Artificial Intelligence in a Cybersecurity Environment -- 1 Introduction -- 2 Artificial Intelligence and Machine Learning -- 3 Cybersecurity -- 4 Artificial Intelligence and Cybersecurity Solutions -- 4.1 AI2 -- 4.2 CylanceProtect -- 4.3 Darktrace -- 4.3.1 Darktrace Enterprise Immune System (EIS) -- 4.3.2 Darktrace Cyber AI Analyst -- 4.3.3 Darktrace Antigena -- 4.4 Amazon Macie -- 4.5 Deep Instinct -- 4.6 SparkCognition DeepArmor -- 4.7 Vectra Cognito Threat Detection and Response Platform
4.8 IBM Maas360 -- 4.9 IBM QRadar Advisor with Watson -- 4.10 IBM QRadar UBA -- 5 Conclusion -- References -- A Review of Cyber Threat (Artificial) Intelligence in Security Management -- 1 Introduction -- 2 Security Management -- 3 Overview of Cyber Threat Intelligence -- 3.1 Cyber Threat Sources: Gathering the Haystacks -- 3.2 Artificial Intelligence and Cyber Threats: Finding the Needles -- 4 Security Management with AI-Driven CTI -- 4.1 Strategic -- 4.2 Operational -- 4.3 Tactical -- 5 Future Directions -- 6 Conclusion -- References
Model Based Resilience Engineering for Design and Assessment of Mission Critical Systems Containing Artificial Intelligence Components -- 1 Introduction -- 2 Defining the Threat -- 2.1 Security Modeling Considerations -- 2.1.1 Adversarial Capabilities -- 2.1.2 Adversarial Goals -- 2.1.3 Security Goals -- 2.2 Adversarial Destabilization of Military AI Systems -- 2.3 Model Driven Engineering for Safety and Security -- 3 A Model Driven Methodology for Resilience -- 3.1 A Metamodel for Basic Resilience Modelling -- 3.2 Simple Example -- 4 Case Study -- 4.1 Case Study Definition
4.2 Resilience Models for the Case Study -- 5 Conclusion and Discussion -- References -- Automation of Cybersecurity Work -- 1 Introduction -- 2 Cybersecurity Automation Research -- 2.1 Variables That Influence Automation in General -- 2.2 Variables That Influence Automation of Cybersecurity Work -- 3 Method -- 3.1 The Content of Cybersecurity Tasks -- 3.2 Assessment Criteria -- 3.3 Assessment Process -- 3.4 Aggregation and Analysis -- 4 Results -- 4.1 Scenarios -- 5 Discussion -- 5.1 Limitations -- 5.1.1 Descriptions of Cybersecurity Work -- 5.1.2 The Assessments -- 5.1.3 The Aggregation
5.2 Other Important Variables -- 5.2.1 Market Potential -- 5.2.2 Intent and Ability -- 5.2.3 Ethical and Legal Issues -- 5.3 Will Automation Improve Cybersecurity? -- 5.4 Effects on the Labor Market -- 6 Conclusions -- 6.1 What Variables Affect How Hard a Cybersecurity Role Is to Automate? -- 6.2 How Likely Is It That Current Cybersecurity Roles Will Be Automated? -- 6.3 What Variables Constrain the Potential for Automation of Today's Cybersecurity Roles? -- References -- Artificial Intelligence for Cybersecurity Education and Training -- 1 Introduction -- 2 Cybersecurity Education and Training
Summary This book discusses artificial intelligence (AI) and cybersecurity from multiple points of view. The diverse chapters reveal modern trends and challenges related to the use of artificial intelligence when considering privacy, cyber-attacks and defense as well as applications from malware detection to radio signal intelligence. The chapters are contributed by an international team of renown researchers and professionals in the field of AI and cybersecurity. During the last few decades the rise of modern AI solutions that surpass humans in specific tasks has occurred. Moreover, these new technologies provide new methods of automating cybersecurity tasks. In addition to the privacy, ethics and cybersecurity concerns, the readers learn several new cutting edge applications of AI technologies. Researchers working in AI and cybersecurity as well as advanced level students studying computer science and electrical engineering with a focus on AI and Cybersecurity will find this book useful as a reference. Professionals working within these related fields will also want to purchase this book as a reference
Notes Online resource; title from PDF title page (SpringerLink, viewed December 30, 2022)
Subject Artificial intelligence -- Industrial applications
Computer security.
Artificial intelligence -- Industrial applications
Computer security
Form Electronic book
Author Sipola, Tuomo, editor
Kokkonen, Tero, editor
Karjalainen, Mika, editor.
ISBN 9783031150302
3031150309