Limit search to available items
Book Cover
E-book
Author Das, Ravindra

Title Generative AI : Phishing and Cybersecurity Metrics
Published Boca Raton : Taylor & Francis Group, 2024

Copies

Description 1 online resource (177 p.)
Series Cyber Shorts Series
Cyber Shorts Series
Contents Cover -- Half Title -- Series Information -- Title Page -- Copyright Page -- Dedication -- Table of Contents -- Acknowledgments -- 1 Introduction to Phishing -- Ransomware -- The Dark Web -- The Challenges for Law Enforcement On the Dark Web -- The Available Resources Worth Taking a Look at -- The Communication Services -- The Benefits of Dark Web Scanning -- Extortion Style Attacks -- The Multi-Extortion Attack -- The Double Extortion Attack -- The Triple Extortion Attack -- The Quadruple Extortion Attack -- Summarizing the Extortion Attacks -- The Rise of Artificial Intelligence in Phishing
The Importance of Data -- The Dangers of Artificial Intelligence in Phishing -- The Evolution of Generative AI -- Notes -- 2 Overview of Artificial Intelligence, Neural Networks, and Machine Learning -- An Introduction to Artificial Intelligence -- The History of Artificial Intelligence -- The Turing Test -- "Minds, Brains, and Programs" -- "A Logical Calculus of the Ideas Immanent in Nervous Activity" -- The Origin Story -- Two Newer Theories On AI -- The Era of Expert Systems -- The Evolution of Deep Learning -- An Overview of Machine Learning -- The Learning Process of Machine Learning
The Machine Learning Algorithms -- The Perceptron -- An Overview of Neural Networks -- The Neuron -- The Neural Network -- The Artificial Neural Network -- The Theoretical Constructs of Artificial Neural Networks -- The Hebbian Law -- The Associative Memory Principle -- The Winner-Take-All Principle -- The Adaline -- The Madaline -- The Backpropagation Algorithm -- Modified Backpropagation (BP) Algorithms -- The Hopfield Network -- The Counterpropagation Network -- The LAMSTAR -- The Adaptive Resonance Theory -- The Cognitron -- The Neocognitron -- Recurrent Backpropagation Networks
Fully Recurrent Networks -- Continuously Recurrent Backpropagation Networks -- Deep Neural Networks -- Notes -- 3 Introduction to Generative AI, Natural Language Processing, and the Digital Person -- Introduction -- An Introduction to Generative AI -- The Latest Example of Generative AI -- The Origins of ChatGPT -- The Technicalities and Specifications Behind ChatGPT -- The Disadvantages of ChatGPT -- The Different Kinds of Generative AI Models -- The Evaluation of a Generative AI Model -- Generative AI and Large Language Models -- Generative AI and Predictive AI
A Review of Generative AI Learning Theories -- A Formal Generative AI Project Plan -- COTS Based Generative AI Platforms -- The Use Cases and Applications of Generative AI -- The Advantages and Disadvantages of Generative AI -- The Advantages of Generative AI -- The Disadvantages of Generative AI -- An Introduction to Natural Language Processing -- The Tasks of Natural Language Processing -- The Process of Natural Language Processing -- The History of Natural Language Processing -- The Tools in Natural Language Processing -- The Advantages of Natural Language Processing
Summary The Cybersecurity Landscape is for sure changing. The advent of Generative AI is making this much worse. But, Generative AI can also be used for the good also, to combat Phishing Attacks. This is the topic of this book
Notes Description based upon print version of record
The Disadvantages of Natural Language Processing
Subject Computer security.
Phishing -- Prevention
Form Electronic book
ISBN 9781040128145
1040128149