LEADER 03528nam 22006855 450 001 9910747593203321 005 20251008153659.0 010 $a9783031285813 010 $a3031285816 024 7 $a10.1007/978-3-031-28581-3 035 $a(MiAaPQ)EBC30774839 035 $a(Au-PeEL)EBL30774839 035 $a(PPN)272915386 035 $a(CKB)28478159300041 035 $a(DE-He213)978-3-031-28581-3 035 $a(OCoLC)1402815161 035 $a(EXLCZ)9928478159300041 100 $a20231006d2023 u| 0 101 0 $aeng 135 $aurcnu|||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aArtificial Intelligence in Cyber Security: Theories and Applications /$fedited by Tushar Bhardwaj, Himanshu Upadhyay, Tarun Kumar Sharma, Steven Lawrence Fernandes 205 $a1st ed. 2023. 210 1$aCham :$cSpringer International Publishing :$cImprint: Springer,$d2023. 215 $a1 online resource (144 pages) 225 1 $aIntelligent Systems Reference Library,$x1868-4408 ;$v240 311 08$aPrint version: Bhardwaj, Tushar Artificial Intelligence in Cyber Security: Theories and Applications Cham : Springer International Publishing AG,c2023 9783031285806 327 $aA Comprehensive Review On Cloud Security Using Machine Learning Techniques -- Energy Enhanced Routing Protocol for Heterogeneous Networks using Artificial Intelligence -- Integration of Machine Learning with Cybersecurity: Applications and Challenges -- Deep Learning Approach for Detection of Fraudulent Credit Card Transactions. 330 $aThis book highlights the applications and theory of artificial intelligence in the domain of cybersecurity. The book proposes new approaches and ideas to present applications of innovative approaches in real-time environments. In the past few decades, there has been an exponential rise in the application of artificial intelligence technologies (such as deep learning, machine learning, blockchain) for solving complex and intricate problems arising in the domain of cybersecurity. The versatility of these techniques has made them a favorite among scientists and researchers working in diverse areas. This book serves as a reference for young scholars, researchers, and industry professionals working in the field of Artificial Intelligence and Cybersecurity. . 410 0$aIntelligent Systems Reference Library,$x1868-4408 ;$v240 606 $aComputational intelligence 606 $aEngineering$xData processing 606 $aArtificial intelligence 606 $aData protection 606 $aComputational Intelligence 606 $aData Engineering 606 $aArtificial Intelligence 606 $aData and Information Security 615 0$aComputational intelligence. 615 0$aEngineering$xData processing. 615 0$aArtificial intelligence. 615 0$aData protection. 615 14$aComputational Intelligence. 615 24$aData Engineering. 615 24$aArtificial Intelligence. 615 24$aData and Information Security. 676 $a005.8 700 $aBhardwaj$b Tushar$01431746 701 $aUpadhyay$b Himanshu$01431747 701 $aSharma$b Tarun Kumar$01231810 701 $aFernandes$b Steven Lawrence$01079258 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910747593203321 996 $aArtificial Intelligence in Cyber Security: Theories and Applications$94450843 997 $aUNINA