Description |
1 online resource (177 p.) |
Series |
Cyber Shorts Series |
|
Cyber Shorts Series
|
Contents |
Cover -- Half Title -- Series Information -- Title Page -- Copyright Page -- Dedication -- Table of Contents -- Acknowledgments -- 1 Introduction to Phishing -- Ransomware -- The Dark Web -- The Challenges for Law Enforcement On the Dark Web -- The Available Resources Worth Taking a Look at -- The Communication Services -- The Benefits of Dark Web Scanning -- Extortion Style Attacks -- The Multi-Extortion Attack -- The Double Extortion Attack -- The Triple Extortion Attack -- The Quadruple Extortion Attack -- Summarizing the Extortion Attacks -- The Rise of Artificial Intelligence in Phishing |
|
The Importance of Data -- The Dangers of Artificial Intelligence in Phishing -- The Evolution of Generative AI -- Notes -- 2 Overview of Artificial Intelligence, Neural Networks, and Machine Learning -- An Introduction to Artificial Intelligence -- The History of Artificial Intelligence -- The Turing Test -- "Minds, Brains, and Programs" -- "A Logical Calculus of the Ideas Immanent in Nervous Activity" -- The Origin Story -- Two Newer Theories On AI -- The Era of Expert Systems -- The Evolution of Deep Learning -- An Overview of Machine Learning -- The Learning Process of Machine Learning |
|
The Machine Learning Algorithms -- The Perceptron -- An Overview of Neural Networks -- The Neuron -- The Neural Network -- The Artificial Neural Network -- The Theoretical Constructs of Artificial Neural Networks -- The Hebbian Law -- The Associative Memory Principle -- The Winner-Take-All Principle -- The Adaline -- The Madaline -- The Backpropagation Algorithm -- Modified Backpropagation (BP) Algorithms -- The Hopfield Network -- The Counterpropagation Network -- The LAMSTAR -- The Adaptive Resonance Theory -- The Cognitron -- The Neocognitron -- Recurrent Backpropagation Networks |
|
Fully Recurrent Networks -- Continuously Recurrent Backpropagation Networks -- Deep Neural Networks -- Notes -- 3 Introduction to Generative AI, Natural Language Processing, and the Digital Person -- Introduction -- An Introduction to Generative AI -- The Latest Example of Generative AI -- The Origins of ChatGPT -- The Technicalities and Specifications Behind ChatGPT -- The Disadvantages of ChatGPT -- The Different Kinds of Generative AI Models -- The Evaluation of a Generative AI Model -- Generative AI and Large Language Models -- Generative AI and Predictive AI |
|
A Review of Generative AI Learning Theories -- A Formal Generative AI Project Plan -- COTS Based Generative AI Platforms -- The Use Cases and Applications of Generative AI -- The Advantages and Disadvantages of Generative AI -- The Advantages of Generative AI -- The Disadvantages of Generative AI -- An Introduction to Natural Language Processing -- The Tasks of Natural Language Processing -- The Process of Natural Language Processing -- The History of Natural Language Processing -- The Tools in Natural Language Processing -- The Advantages of Natural Language Processing |
Summary |
The Cybersecurity Landscape is for sure changing. The advent of Generative AI is making this much worse. But, Generative AI can also be used for the good also, to combat Phishing Attacks. This is the topic of this book |
Notes |
Description based upon print version of record |
|
The Disadvantages of Natural Language Processing |
Subject |
Computer security.
|
|
Phishing -- Prevention
|
Form |
Electronic book
|
ISBN |
9781040128145 |
|
1040128149 |
|