04723nam 22007695 450 99654684070331620230613191724.0981-9921-15-510.1007/978-981-99-2115-7(CKB)26946777000041(MiAaPQ)EBC30593528(Au-PeEL)EBL30593528(DE-He213)978-981-99-2115-7(PPN)272263745(EXLCZ)992694677700004120230613d2023 u| 0engurcnu||||||||txtrdacontentcrdamediacrrdacarrierArtificial Intelligence and Cyber Security in Industry 4.0[electronic resource] /edited by Velliangiri Sarveshwaran, Joy Iong-Zong Chen, Danilo Pelusi1st ed. 2023.Singapore :Springer Nature Singapore :Imprint: Springer,2023.1 online resource (374 pages)Advanced Technologies and Societal Change,2191-68619789819921140 Introduction to Artificial Intelligence and Cyber Security for Industry -- Role of AI and its impact on the development of cyber security applications -- AI and IoT in Manufacturing and related Security Perspectives for Industry 4.0 -- IoT Security Vulnerabilities and Defensive Measures in Industry 4.0 -- Adopting Artificial Intelligence in ITIL for Information Security Management - Way forward in Industry 4.0 -- Intelligent Autonomous Drones in Industry 4.0 -- A review on automatic generation of attack trees and its application to automotive cybersecurity -- Malware Analysis using Machine Learning Tools and Techniques in IT Industry -- USE OF MACHINE LEARNING IN FORENSICS AND COMPUTER SECURITY -- Control of feed drives in CNC machine tools using artificial immune adaptive strategy -- Efficient Anomaly Detection for Empowering Cyber Security by Using Adaptive Deep Learning Model -- Intrusion Detection in IoT based Healthcare Using ML and DL approaches: A Case Study -- War Strategy Algorithm based GAN model for Detecting the Malware Attacks in Modern Digital Age -- ML algorithms for providing financial security in banking sectors with the prediction of loan risks -- Machine Learning based DDoS Attack Detection using Support Vector Machine -- Artificial Intelligence based Cyber Security Applications.This book provides theoretical background and state-of-the-art findings in artificial intelligence and cybersecurity for industry 4.0 and helps in implementing AI-based cybersecurity applications. Machine learning-based security approaches are vulnerable to poison datasets which can be caused by a legitimate defender's misclassification or attackers aiming to evade detection by contaminating the training data set. There also exist gaps between the test environment and the real world. Therefore, it is critical to check the potentials and limitations of AI-based security technologies in terms of metrics such as security, performance, cost, time, and consider how to incorporate them into the real world by addressing the gaps appropriately. This book focuses on state-of-the-art findings from both academia and industry in big data security relevant sciences, technologies, and applications.Advanced Technologies and Societal Change,2191-6861Artificial intelligenceInternet of thingsBig dataMachine learningComputational intelligenceWireless communication systemsMobile communication systemsArtificial IntelligenceInternet of ThingsBig DataMachine LearningComputational IntelligenceWireless and Mobile CommunicationArtificial intelligence.Internet of things.Big data.Machine learning.Computational intelligence.Wireless communication systems.Mobile communication systems.Artificial Intelligence.Internet of Things.Big Data.Machine Learning.Computational Intelligence.Wireless and Mobile Communication.658.4038028563Sarveshwaran Velliangiri1368935Chen Joy Iong-zong1362048Pelusi Danilo1368936MiAaPQMiAaPQMiAaPQBOOK996546840703316Artificial Intelligence and Cyber Security in Industry 4.03561459UNISA02000nam a2200289 i 450099100434863830753620241107105631.0241107s1786 it er 000 0 mul di-a- e.lai.i- Bida (7)1786 (R)Bibl. Interfacoltà T. PellegrinoitaSocioculturale ScsitalatToma, Giacinto1766431Ricerche istoriche sopra l'autenticità della storia di S. Trifone nel terzo secolo. Parte 1.Napoli :presso Michele Morelli,1786118, [2] p. ;Nome dell'autore A5rFregio xilografico sul frontespizio; Iniziali incorniciateContiene: Imprimatur e Errata corrige a carta H4Segnatura: A-G⁸ H⁴.Il fondo Briganti-Stajano è stato annesso al patrimonio della Biblioteca Interfacoltà nel 1981. Le famiglie da cui il Fondo prende il nome sono l'aristocratica famiglia gallipolina dei Briganti (fine XVIII sec.) e la famiglia Stajano di Sannicola, alla quale il Fondo è pervenuto in eredità dopo la morte di Domenico Briganti, ultimo discendente (fine XIX sec.). Il fondo si compone di una sezione a stampa antica e moderna e di una sezione manoscritta. La sezione a stampa è costituita in buona parte dalla biblioteca dei due esponenti più noti dell’Illuminismo riformatore salentino, Tommaso Briganti (1691-1762) e il figlio Filippo (1726-1804), e riflette in pieno i loro interessi per le discipline storiche, giuridiche, economiche, religiose e filosofiche; sono presenti nella sezione, inoltre, libri, opuscoli, documenti e opere degli stessi Stajano.LE0021 esemplareLE002Briganti-Stajano <fam.><sec. 18-19.>possessore precedenteLE002Morelli, MicheleItaliaNapoli991004348638307536Ricerche istoriche sopra l'autenticità della storia di S. Trifone nel terzo secolo. Parte 14210678UNISALENTO