LEADER 04278nam 22007335 450 001 9910770274903321 005 20250827153134.0 010 $a9783031464799 010 $a3031464796 024 7 $a10.1007/978-3-031-46479-9 035 $a(CKB)29353506100041 035 $a(MiAaPQ)EBC31015656 035 $a(Au-PeEL)EBL31015656 035 $a(OCoLC)1414110108 035 $a(DE-He213)978-3-031-46479-9 035 $a(EXLCZ)9929353506100041 100 $a20231212d2023 u| 0 101 0 $aeng 135 $aur||||||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aExplainable AI for Cybersecurity /$fby Zhixin Pan, Prabhat Mishra 205 $a1st ed. 2023. 210 1$aCham :$cSpringer Nature Switzerland :$cImprint: Springer,$d2023. 215 $a1 online resource (249 pages) 311 08$a9783031464782 311 08$a3031464788 327 $aPart 1: Introduction -- Chapter 1. Cybersecurity Landscape for Computer Systems -- Chapter 2. Explainable Artificial Intelligence -- Part 2: Detection of Software Vulnerabilities -- Chapter 3. Malware Detection using Explainable AI -- Chapter 4. Spectre and Meltdown Detection using Explainable AI -- Part 3: Detection of Hardware Vulnerabilities -- Chapter 5. Hardware Trojan Detection using Reinforcement Learning -- Chapter 6. Hardware Trojan Detection using Side-Channel Analysis -- Chapter 7. Hardware Trojan Detection using Shapley Ensemble Boosting -- Part 4: Mitigation of AI Vulnerabilities -- Chapter 8. Mitigation of Adversarial Machine Learning -- Chapter 9. AI Trojan Attacks and Countermeasures -- Part 5: Acceleration of Explainable AI -- Chapter 10. Hardware Acceleration of Explainable AI -- Chapter 11. Explainable AI Acceleration using Tensor Processing Units -- Part 6: Conclusion -- Chapter 12. The Future of AI-Enabled Cybersecurity. 330 $aThis book provides a comprehensive overview of security vulnerabilities and state-of-the-art countermeasures using explainable artificial intelligence (AI). Specifically, it describes how explainable AI can be effectively used for detection and mitigation of hardware vulnerabilities (e.g., hardware Trojans) as well as software attacks (e.g., malware and ransomware). It provides insights into the security threats towards machine learning models and presents effective countermeasures. It also explores hardware acceleration of explainable AI algorithms. The reader will be able to comprehend a complete picture of cybersecurity challenges and how to detect them using explainable AI. This book serves as a single source of reference for students, researchers, engineers, and practitioners for designing secure and trustworthy systems. Introduces a wide variety of software and hardware vulnerabilities; Describes solutions for detecting security attacks using explainable AI; Presents a fast and robust framework using hardware acceleration and mitigation of adversarial attacks. 606 $aComputational intelligence 606 $aElectronic circuits 606 $aData protection 606 $aElectronic circuit design 606 $aEmbedded computer systems 606 $aArtificial intelligence 606 $aComputational Intelligence 606 $aElectronic Circuits and Systems 606 $aData and Information Security 606 $aElectronics Design and Verification 606 $aEmbedded Systems 606 $aArtificial Intelligence 615 0$aComputational intelligence. 615 0$aElectronic circuits. 615 0$aData protection. 615 0$aElectronic circuit design. 615 0$aEmbedded computer systems. 615 0$aArtificial intelligence. 615 14$aComputational Intelligence. 615 24$aElectronic Circuits and Systems. 615 24$aData and Information Security. 615 24$aElectronics Design and Verification. 615 24$aEmbedded Systems. 615 24$aArtificial Intelligence. 676 $a005.8 700 $aPan$b Zhixin$0866851 701 $aMishra$b Prabhat$01460790 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910770274903321 996 $aExplainable AI for Cybersecurity$93660738 997 $aUNINA