Image from Google Jackets

Artificial intelligence and cyber security in Industry 4.0 / edited by Velliangiri Sarveshwaran, Joy Long-Zong Chen and Danilo Pelusi

By: Contributor(s): Material type: TextTextSeries: Advanced Technologies and Societal ChangeSingapore: Springer Verlag, 2023Description: viii, 373 pages: color. illustrations; 24 cmISBN:
  • 9789819921171 (pbk.)
Subject(s): DDC classification:
  • 658.403 VEL
Summary: This book provides theoretical background and state-of-the-art findings in artificial intelligence and cybersecurity for industry 4.0 and helps in implementing AI-based cybersecurity applications. Machine learning-based security approaches are vulnerable to poison datasets which can be caused by a legitimate defender's misclassification or attackers aiming to evade detection by contaminating the training data set. There also exist gaps between the test environment and the real world. Therefore, it is critical to check the potentials and limitations of AI-based security technologies in terms of metrics such as security, performance, cost, time, and consider how to incorporate them into the real world by addressing the gaps appropriately. This book focuses on state-of-the-art findings from both academia and industry in big data security relevant sciences, technologies, and applications.
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
Holdings
Item type Current library Call number Status Date due Barcode
Book Mindef Library & Info Centre Exhibition Zone @ Main 658.403 VEL (Browse shelf(Opens below)) Available 80222-1001

Includes bibliograpical references.

This book provides theoretical background and state-of-the-art findings in artificial intelligence and cybersecurity for industry 4.0 and helps in implementing AI-based cybersecurity applications. Machine learning-based security approaches are vulnerable to poison datasets which can be caused by a legitimate defender's misclassification or attackers aiming to evade detection by contaminating the training data set. There also exist gaps between the test environment and the real world. Therefore, it is critical to check the potentials and limitations of AI-based security technologies in terms of metrics such as security, performance, cost, time, and consider how to incorporate them into the real world by addressing the gaps appropriately. This book focuses on state-of-the-art findings from both academia and industry in big data security relevant sciences, technologies, and applications.

There are no comments on this title.

to post a comment.