MARC details
000 -LEADER |
fixed length control field |
02514cam a2200253 4500 |
001 - CONTROL NUMBER |
control field |
42706 |
003 - CONTROL NUMBER IDENTIFIER |
control field |
OSt |
005 - DATE AND TIME OF LATEST TRANSACTION |
control field |
20250708101317.0 |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION |
fixed length control field |
240401b |||||||| |||| 00| 0 eng d |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
International Standard Book Number |
9783030880392 (hbk.) |
Terms of availability |
139.99 GBP |
100 1# - MAIN ENTRY--PERSONAL NAME |
Personal name |
MONTASARI Reza |
Relator term |
editor |
245 ## - TITLE STATEMENT |
Title |
Artificial intelligence in cyber security: |
Remainder of title |
impact and implications: |
-- |
security challenges, technical and ethical issues, forensic investigative challenges / |
Statement of responsibility, etc. |
edited by Reza Montasari and Hamid Jahankhani |
260 ## - PUBLICATION, DISTRIBUTION, ETC. |
Place of publication, distribution, etc. |
Cham: |
Name of publisher, distributor, etc. |
Springer, |
Date of publication, distribution, etc. |
2021 |
300 ## - PHYSICAL DESCRIPTION |
Extent |
vi, 306 pages: |
Other physical details |
illustrations (chiefly color); |
Dimensions |
22 cm |
440 ## - SERIES STATEMENT/ADDED ENTRY--TITLE |
Title |
Advanced Sciences and Technologies for Security Applications |
504 ## - BIBLIOGRAPHY, ETC. NOTE |
Bibliography, etc. note |
Includes bibliographical references |
520 ## - SUMMARY, ETC. |
Summary, etc. |
The book provides a valuable reference for cyber security experts, digital forensic practitioners and network security professionals. In recent years, AI has gained substantial attention from researchers in both academia and industry, and as a result AI's capabilities are constantly increasing at an extraordinary pace. AI is considered to be the Fourth Industrial Revolution or at least the next significant technological change after the evolution in mobile and cloud computing technologies. AI is a vehicle for improving the quality of our lives across every spectrum with a broad range of beneficial applications in various sectors. Notwithstanding its numerous beneficial use, AI simultaneously poses numerous legal, ethical, security and privacy challenges that are compounded by its malicious use by criminals. These challenges pose many risks to both our privacy and security at national, organisational and individual levels. In view of this, this book aims to help address some of these challenges focusing on the implication, impact and mitigations of the stated issues. The book provides a comprehensive coverage of not only the technical and ethical issues presented by the use of AI but also the adversarial application of AI and its associated implications. The authors recommend a number of novel approaches to assist in better detecting, thwarting and addressing AI challenges. The book also looks ahead and forecasts what attacks can be carried out in the future through the malicious use of the AI if sufficient defences are not implemented. |
598 ## - BULLETIN HEADING |
Bulletin Heading |
ARTIFICIAL INTELLIGENCE |
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name entry element |
COMPUTER SECURITY |
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name entry element |
ARTIFICIAL INTELLIGENCE |
700 ## - ADDED ENTRY--PERSONAL NAME |
Personal name |
HAMID JAHANKHANI |
Relator term |
editor |
942 ## - ADDED ENTRY ELEMENTS (KOHA) |
Source of classification or shelving scheme |
Dewey Decimal Classification |
Koha item type |
Book |
945 ## - LOCAL PROCESSING INFORMATION (OCLC) |
i |
69648-1001 |
r |
N |
s |
Y |