1.

Record Nr.

UNISA996390918403316

Autore

Seneca Lucius Annaeus <ca. 4 B.C.-65 A.D.>

Titolo

Hippolitus [[electronic resource] /] / translated out of Seneca by Edmund Prestwich ; together with divers other poems of the same authors

Pubbl/distr/stampa

London, : Printed by G.D. for George Boddington ..., 1651

Descrizione fisica

[25], 139 p

Altri autori (Persone)

PrestwichEdmund <fl. 1650-1651.>

Lingua di pubblicazione

Inglese

Formato

Materiale a stampa

Livello bibliografico

Monografia

Note generali

Translation of Seneca's Phaedra, which was based on Hippolytus, by Euripides--Oxford Classical Dict.

Reproduction of original in the Huntington Library.

Sommario/riassunto

eebo-0113



2.

Record Nr.

UNINA9910634050303321

Autore

Sipola Tuomo

Titolo

Artificial Intelligence and Cybersecurity : Theory and Applications / / edited by Tuomo Sipola, Tero Kokkonen, Mika Karjalainen

Pubbl/distr/stampa

Cham : , : Springer International Publishing : , : Imprint : Springer, , 2023

ISBN

3-031-15030-9

Edizione

[1st ed. 2023.]

Descrizione fisica

1 online resource (300 pages)

Disciplina

006.3

Soggetti

Artificial intelligence

Data protection - Law and legislation

Cryptography

Data encryption (Computer science)

Computer networks - Security measures

Artificial Intelligence

Privacy

Cryptology

Mobile and Network Security

Lingua di pubblicazione

Inglese

Formato

Materiale a stampa

Livello bibliografico

Monografia

Nota di contenuto

Part I Cybersecurity Concerns -- Use of Artificial Intelligence in a Cybersecurity Environment -- Petri Vähäkainu and Martti Lehto -- A Review of Cyber Threat (Artificial) Intelligence in Security -- Management -- Martin Lundgren and Ali Padyab -- Model Based Resilience Engineering for Design and Assessment of -- Mission Critical Systems Containing AI Components -- Automation of CybersecurityWork -- Artificial Intelligence for Cybersecurity Education and Training -- Offensive Machine Learning Methods and the Cyber Kill Chain -- Defensive Machine Learning Methods and the Cyber Defence Chain -- Part II Privacy and Ethics -- Differential Privacy: An Umbrella Review -- AI in Cyber Operations: Ethical and Legal Considerations for End-Users -- Part III Applications -- Android Malware Detection Using Deep Learning -- Artificial Intelligence Enabled Radio Signal Intelligence -- Deep Learning Quantile Regression for Robustness,



Confidence and -- Planning -- Model Fooling Threats Against Medical Imaging.

Sommario/riassunto

This book discusses artificial intelligence (AI) and cybersecurity from multiple points of view. The diverse chapters reveal modern trends and challenges related to the use of artificial intelligence when considering privacy, cyber-attacks and defense as well as applications from malware detection to radio signal intelligence. The chapters are contributed by an international team of renown researchers and professionals in the field of AI and cybersecurity. During the last few decades the rise of modern AI solutions that surpass humans in specific tasks has occurred. Moreover, these new technologies provide new methods of automating cybersecurity tasks. In addition to the privacy, ethics and cybersecurity concerns, the readers learn several new cutting edge applications of AI technologies. Researchers working in AI and cybersecurity as well as advanced level students studying computer scienceand electrical engineering with a focus on AI and Cybersecurity will find this book useful as a reference. Professionals working within these related fields will also want to purchase this book as a reference.