Description |
1 online resource (viii, 373 pages) : illustrations (chiefly color) |
Series |
Advanced technologies and societal change |
|
Advanced technologies and societal change.
|
Contents |
Intro -- Preface -- Contents -- 1 Introduction to Artificial Intelligence and Cybersecurity for Industry -- Introduction -- Classification of Cyberattacks (See Fig. 1.1) -- Types of Cybersecurity -- Tools Used in Cybersecurity -- Firewall -- Honeypots -- How Does Artificial Intelligence Work? (See Fig. 1.3) -- AI Implementation Methods -- Machine Learning -- Deep Learning -- Background Information on AI Methods and Cybersecurity Applications -- The Significance of Cybersecurity -- How AI Can Be Applied on Cybersecurity Issues -- AI Techniques Used for Cybersecurity -- Security Expert Systems |
|
Deep Learning Detection for Misinformation -- Benefits of AI in Cybersecurity -- Detecting False Information Using Neural Networks -- Using Neural Networks to Find Objectionable YouTube Content -- Challenges Faced with Integration of AI in Cybersecurity -- Classification Error -- Intensive Requirement for Resources -- Public Perception -- Discussion -- Conclusion -- References -- 2 Role of AI and Its Impact on the Development of Cyber Security Applications -- Introduction -- Overview of Artificial Intelligence -- Literature Survey -- Artificial Intelligence Techniques for Cyber Security |
|
Various Artificial Intelligence Tools and Techniques Are Mentioned Below -- Machine Learning Algorithm Used to Train a Machine -- Why AI is Preferred Over Current Anomaly Detection and Prevention Systems? -- Use Cases of Artificial Intelligence in Cyber Security -- Applications of AI in Cyber Security -- AI Solutions for Cyber Security [26] -- Limitations of AI in Security -- Ethical Issues Related to AI [27] -- AI-Based Threat to Cyber Security [27] -- Conclusion -- References -- 3 AI and IoT in Manufacturing and Related Security Perspectives for Industry 4.0 -- Introduction |
|
Role of AI in Manufacturing -- Related Works -- Technologies -- Impact of AI in Manufacturing -- Uses Cases of AI in Manufacturing -- IoT in Manufacturing -- Related Works -- Technologies -- Need of IIoT Security -- Applications -- Vulnerabilities and Challenges -- Quality Control -- Threat Recognition -- Configuration of the Hardware -- Encryption of Data -- Confidentiality of Data -- Integration of Cyber-Physical Systems -- Devices Pairing Key Establishment -- Device Management -- Conclusion and Future Work -- References -- 4 IoT Security Vulnerabilities and Defensive Measures in Industry 4.0 |
|
Introduction -- IoT/IIoT Security Challenges and Requirements -- IoT/IIoT Security Challenges -- Requirements for IoT/IIoT Security -- IoT Architecture and Security Attacks -- Architecture of IoT -- IoT Security Attacks in Architectural Perspective -- Preventive Techniques and Mechanisms of IoT/IIoT Security -- Preventive Techniques of IoT Security Attacks -- Mechanisms for Combating IoT/IIoT Security Attacks -- Conclusion -- References -- 5 Adopting Artificial Intelligence in ITIL for Information Security Management-Way Forward in Industry 4.0 -- Introduction -- Definition of AI |
Summary |
This book provides theoretical background and state-of-the-art findings in artificial intelligence and cybersecurity for industry 4.0 and helps in implementing AI-based cybersecurity applications. Machine learning-based security approaches are vulnerable to poison datasets which can be caused by a legitimate defender's misclassification or attackers aiming to evade detection by contaminating the training data set. There also exist gaps between the test environment and the real world. Therefore, it is critical to check the potentials and limitations of AI-based security technologies in terms of metrics such as security, performance, cost, time, and consider how to incorporate them into the real world by addressing the gaps appropriately. This book focuses on state-of-the-art findings from both academia and industry in big data security relevant sciences, technologies, and applications |
Notes |
Description based upon print version of record |
Subject |
Artificial intelligence -- Industrial applications
|
|
Computer security.
|
|
Industry 4.0.
|
|
Artificial intelligence -- Industrial applications
|
|
Computer security
|
|
Industry 4.0
|
Form |
Electronic book
|
Author |
Sarveshwaran, Velliangiri, editor
|
|
Chen, Joy Long-Zong, editor.
|
|
Pelusi, Danilo, editor.
|
ISBN |
9789819921157 |
|
9819921155 |
|