Artificial Intelligence and Security Challenges in Emerging Networks


Book Description

The recent rise of emerging networking technologies such as social networks, content centric networks, Internet of Things networks, etc, have attracted significant attention from academia as well as industry professionals looking to utilize these technologies for efficiency purposes. However, the allure of such networks and resultant storage of high volumes of data leads to increased security risks, including threats to information privacy. Artificial Intelligence and Security Challenges in Emerging Networks is an essential reference source that discusses applications of artificial intelligence, machine learning, and data mining, as well as other tools and strategies to protect networks against security threats and solve security and privacy problems. Featuring research on topics such as encryption, neural networks, and system verification, this book is ideally designed for ITC procurement managers, IT consultants, systems and network integrators, infrastructure service providers, computer and software engineers, startup companies, academicians, researchers, managers, and students.




Implications of Artificial Intelligence for Cybersecurity


Book Description

In recent years, interest and progress in the area of artificial intelligence (AI) and machine learning (ML) have boomed, with new applications vigorously pursued across many sectors. At the same time, the computing and communications technologies on which we have come to rely present serious security concerns: cyberattacks have escalated in number, frequency, and impact, drawing increased attention to the vulnerabilities of cyber systems and the need to increase their security. In the face of this changing landscape, there is significant concern and interest among policymakers, security practitioners, technologists, researchers, and the public about the potential implications of AI and ML for cybersecurity. The National Academies of Sciences, Engineering, and Medicine convened a workshop on March 12-13, 2019 to discuss and explore these concerns. This publication summarizes the presentations and discussions from the workshop.




Artificial Intelligence and Security Challenges in Emerging Networks


Book Description

"This book explores the recent rise of emerging networking technologies such as social networks, content centric networks, IoT networks, etc. It also examines the applications of artificial intelligence (AI), machine learning, and data mining to security and privacy problems"--




Artificial Intelligence and Global Security


Book Description

Artificial Intelligence and Global Security: Future Trends, Threats and Considerations brings a much-needed perspective on the impact of the integration of Artificial Intelligence (AI) technologies in military affairs. Experts forecast that AI will shape future military operations in ways that will revolutionize warfare.




A Fusion of Artificial Intelligence and Internet of Things for Emerging Cyber Systems


Book Description

This book aims at offering a unique collection of ideas and experiences mainly focusing on the main streams and merger of Artificial Intelligence (AI) and the Internet of Things (IoT) for a wide slice of the communication and networking community. In the era when the world is grappling with many unforeseen challenges, scientists and researchers are envisioning smart cyber systems that guarantee sustainable development for a better human life. The main contributors that destined to play a huge role in developing such systems, among others, are AI and IoT. While AI provides intelligence to machines and data by identifying patterns, developing predictions, and detecting anomalies, IoT performs as a nerve system by connecting a huge number of machines and capturing an enormous amount of data. AI-enabled IoT, therefore, redefines the way industries, businesses, and economies function with increased automation and efficiency and reduced human interaction and costs. This book is an attempt to publish innovative ideas, emerging trends, implementation experience, and use-cases pertaining to the merger of AI and IoT. The primary market of this book is centered around students, researchers, academicians, industrialists, entrepreneurs, and professionals working in electrical/computer engineering, IT, telecom/electronic engineering, and related fields. The secondary market of this book is related to individuals working in the fields such as finance, management, mathematics, physics, environment, mechatronics, and the automation industry.




Research Anthology on Artificial Intelligence Applications in Security


Book Description

As industries are rapidly being digitalized and information is being more heavily stored and transmitted online, the security of information has become a top priority in securing the use of online networks as a safe and effective platform. With the vast and diverse potential of artificial intelligence (AI) applications, it has become easier than ever to identify cyber vulnerabilities, potential threats, and the identification of solutions to these unique problems. The latest tools and technologies for AI applications have untapped potential that conventional systems and human security systems cannot meet, leading AI to be a frontrunner in the fight against malware, cyber-attacks, and various security issues. However, even with the tremendous progress AI has made within the sphere of security, it’s important to understand the impacts, implications, and critical issues and challenges of AI applications along with the many benefits and emerging trends in this essential field of security-based research. Research Anthology on Artificial Intelligence Applications in Security seeks to address the fundamental advancements and technologies being used in AI applications for the security of digital data and information. The included chapters cover a wide range of topics related to AI in security stemming from the development and design of these applications, the latest tools and technologies, as well as the utilization of AI and what challenges and impacts have been discovered along the way. This resource work is a critical exploration of the latest research on security and an overview of how AI has impacted the field and will continue to advance as an essential tool for security, safety, and privacy online. This book is ideally intended for cyber security analysts, computer engineers, IT specialists, practitioners, stakeholders, researchers, academicians, and students interested in AI applications in the realm of security research.




Machine Learning and Cognitive Science Applications in Cyber Security


Book Description

In the past few years, with the evolution of advanced persistent threats and mutation techniques, sensitive and damaging information from a variety of sources have been exposed to possible corruption and hacking. Machine learning, artificial intelligence, predictive analytics, and similar disciplines of cognitive science applications have been found to have significant applications in the domain of cyber security. Machine Learning and Cognitive Science Applications in Cyber Security examines different applications of cognition that can be used to detect threats and analyze data to capture malware. Highlighting such topics as anomaly detection, intelligent platforms, and triangle scheme, this publication is designed for IT specialists, computer engineers, researchers, academicians, and industry professionals interested in the impact of machine learning in cyber security and the methodologies that can help improve the performance and reliability of machine learning applications.




Challenges and Opportunities for the Convergence of IoT, Big Data, and Cloud Computing


Book Description

In today’s market, emerging technologies are continually assisting in common workplace practices as companies and organizations search for innovative ways to solve modern issues that arise. Prevalent applications including internet of things, big data, and cloud computing all have noteworthy benefits, but issues remain when separately integrating them into the professional practices. Significant research is needed on converging these systems and leveraging each of their advantages in order to find solutions to real-time problems that still exist. Challenges and Opportunities for the Convergence of IoT, Big Data, and Cloud Computing is a pivotal reference source that provides vital research on the relation between these technologies and the impact they collectively have in solving real-world challenges. While highlighting topics such as cloud-based analytics, intelligent algorithms, and information security, this publication explores current issues that remain when attempting to implement these systems as well as the specific applications IoT, big data, and cloud computing have in various professional sectors. This book is ideally designed for academicians, researchers, developers, computer scientists, IT professionals, practitioners, scholars, students, and engineers seeking research on the integration of emerging technologies to solve modern societal issues.




Cyber Warfare and Terrorism: Concepts, Methodologies, Tools, and Applications


Book Description

Through the rise of big data and the internet of things, terrorist organizations have been freed from geographic and logistical confines and now have more power than ever before to strike the average citizen directly at home. This, coupled with the inherently asymmetrical nature of cyberwarfare, which grants great advantage to the attacker, has created an unprecedented national security risk that both governments and their citizens are woefully ill-prepared to face. Examining cyber warfare and terrorism through a critical and academic perspective can lead to a better understanding of its foundations and implications. Cyber Warfare and Terrorism: Concepts, Methodologies, Tools, and Applications is an essential reference for the latest research on the utilization of online tools by terrorist organizations to communicate with and recruit potential extremists and examines effective countermeasures employed by law enforcement agencies to defend against such threats. Highlighting a range of topics such as cyber threats, digital intelligence, and counterterrorism, this multi-volume book is ideally designed for law enforcement, government officials, lawmakers, security analysts, IT specialists, software developers, intelligence and security practitioners, students, educators, and researchers.




Artificial Intelligence and Evolutionary Computations in Engineering Systems


Book Description

This book gathers selected papers presented at the 4th International Conference on Artificial Intelligence and Evolutionary Computations in Engineering Systems, held at the SRM Institute of Science and Technology, Kattankulathur, Chennai, India, from 11 to 13 April 2019. It covers advances and recent developments in various computational intelligence techniques, with an emphasis on the design of communication systems. In addition, it shares valuable insights into advanced computational methodologies such as neural networks, fuzzy systems, evolutionary algorithms, hybrid intelligent systems, uncertain reasoning techniques, and other machine learning methods and their application to decision-making and problem-solving in mobile and wireless communication networks.