Limit search to available items
Book Cover
E-book

Title Artificial intelligence and cyber security in Industry 4.0 / Velliangiri Sarveshwaran, Joy Long-Zong Chen, Danilo Pelusi, editors
Published Singapore : Springer, [2023]
©2023

Copies

Description 1 online resource (viii, 373 pages) : illustrations (chiefly color)
Series Advanced technologies and societal change
Advanced technologies and societal change.
Contents Intro -- Preface -- Contents -- 1 Introduction to Artificial Intelligence and Cybersecurity for Industry -- Introduction -- Classification of Cyberattacks (See Fig. 1.1) -- Types of Cybersecurity -- Tools Used in Cybersecurity -- Firewall -- Honeypots -- How Does Artificial Intelligence Work? (See Fig. 1.3) -- AI Implementation Methods -- Machine Learning -- Deep Learning -- Background Information on AI Methods and Cybersecurity Applications -- The Significance of Cybersecurity -- How AI Can Be Applied on Cybersecurity Issues -- AI Techniques Used for Cybersecurity -- Security Expert Systems
Deep Learning Detection for Misinformation -- Benefits of AI in Cybersecurity -- Detecting False Information Using Neural Networks -- Using Neural Networks to Find Objectionable YouTube Content -- Challenges Faced with Integration of AI in Cybersecurity -- Classification Error -- Intensive Requirement for Resources -- Public Perception -- Discussion -- Conclusion -- References -- 2 Role of AI and Its Impact on the Development of Cyber Security Applications -- Introduction -- Overview of Artificial Intelligence -- Literature Survey -- Artificial Intelligence Techniques for Cyber Security
Various Artificial Intelligence Tools and Techniques Are Mentioned Below -- Machine Learning Algorithm Used to Train a Machine -- Why AI is Preferred Over Current Anomaly Detection and Prevention Systems? -- Use Cases of Artificial Intelligence in Cyber Security -- Applications of AI in Cyber Security -- AI Solutions for Cyber Security [26] -- Limitations of AI in Security -- Ethical Issues Related to AI [27] -- AI-Based Threat to Cyber Security [27] -- Conclusion -- References -- 3 AI and IoT in Manufacturing and Related Security Perspectives for Industry 4.0 -- Introduction
Role of AI in Manufacturing -- Related Works -- Technologies -- Impact of AI in Manufacturing -- Uses Cases of AI in Manufacturing -- IoT in Manufacturing -- Related Works -- Technologies -- Need of IIoT Security -- Applications -- Vulnerabilities and Challenges -- Quality Control -- Threat Recognition -- Configuration of the Hardware -- Encryption of Data -- Confidentiality of Data -- Integration of Cyber-Physical Systems -- Devices Pairing Key Establishment -- Device Management -- Conclusion and Future Work -- References -- 4 IoT Security Vulnerabilities and Defensive Measures in Industry 4.0
Introduction -- IoT/IIoT Security Challenges and Requirements -- IoT/IIoT Security Challenges -- Requirements for IoT/IIoT Security -- IoT Architecture and Security Attacks -- Architecture of IoT -- IoT Security Attacks in Architectural Perspective -- Preventive Techniques and Mechanisms of IoT/IIoT Security -- Preventive Techniques of IoT Security Attacks -- Mechanisms for Combating IoT/IIoT Security Attacks -- Conclusion -- References -- 5 Adopting Artificial Intelligence in ITIL for Information Security Management-Way Forward in Industry 4.0 -- Introduction -- Definition of AI
Summary This book provides theoretical background and state-of-the-art findings in artificial intelligence and cybersecurity for industry 4.0 and helps in implementing AI-based cybersecurity applications. Machine learning-based security approaches are vulnerable to poison datasets which can be caused by a legitimate defender's misclassification or attackers aiming to evade detection by contaminating the training data set. There also exist gaps between the test environment and the real world. Therefore, it is critical to check the potentials and limitations of AI-based security technologies in terms of metrics such as security, performance, cost, time, and consider how to incorporate them into the real world by addressing the gaps appropriately. This book focuses on state-of-the-art findings from both academia and industry in big data security relevant sciences, technologies, and applications
Notes Description based upon print version of record
Subject Artificial intelligence -- Industrial applications
Computer security.
Industry 4.0.
Artificial intelligence -- Industrial applications
Computer security
Industry 4.0
Form Electronic book
Author Sarveshwaran, Velliangiri, editor
Chen, Joy Long-Zong, editor.
Pelusi, Danilo, editor.
ISBN 9789819921157
9819921155