LEADER 04530nam 22006975 450 001 9910838286303321 005 20240322002209.0 010 $a9783031538544 010 $a3031538544 024 7 $a10.1007/978-3-031-53854-4 035 $a(MiAaPQ)EBC31169217 035 $a(Au-PeEL)EBL31169217 035 $a(DE-He213)978-3-031-53854-4 035 $a(CKB)30464668900041 035 $a(OCoLC)1423131420 035 $a(EXLCZ)9930464668900041 100 $a20240219d2024 u| 0 101 0 $aeng 135 $aurcnu|||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aAdvanced Techniques of Artificial Intelligence in IT Security Systems /$fby Marcin Korytkowski 205 $a1st ed. 2024. 210 1$aCham :$cSpringer Nature Switzerland :$cImprint: Springer,$d2024. 215 $a1 online resource (94 pages) 225 1 $aStudies in Big Data,$x2197-6511 ;$v146 311 08$a9783031538537 311 08$a3031538536 327 $aArtificial neural networks -- Initialization of weights values in neural networks -- Convolution neural networks -- Application of artificial intelligence methods in profiling of computer network users -- Profiling users using the random forest algorithm -- Convolutional networks in user profiling -- User profiling using recurrent-convolutional networks -- Detection of network traffic anomalies using OC-NN. 330 $aThe book explores how modern technologies, including artificial intelligence and neural networks, are being used to enhance cybersecurity. In today's world, the development of the Internet is nothing short of transformative, affecting every aspect of our lives. Ensuring the safety of its users is a paramount concern, and it requires a diverse set of disciplines to address. Researchers from various fields, including IT, mathematics, psychology, and medicine, are collectively working to tackle this interdisciplinary challenge. The significance of this issue has been magnified by the COVID-19 pandemic, which forced many aspects of our lives into the digital realm, from online payments to remote work and education. This shift brought new security challenges, with data privacy and system integrity taking center stage. It delves into the intricacies of Big Data by having to analyze an immense volume of network traffic data that can only be effectively analyzed with specialized tools. Real-time threat detection is critical, and the book sheds light on cutting-edge approaches to achieving this goal. The content of the book covers a broad spectrum of topics related to IT system security, from user and system profiling to preventing data leaks and defending against phishing attacks. Additionally, innovative concepts such as ?glial networks? are introduced, offering new ways to interpret knowledge stored in convolutional networks. These solutions are not limited to security alone; they have applications across various domains. The book highlights the advantages of these cutting-edge approaches over existing methods, demonstrating their relevance to large corporations, public institutions, schools, small businesses, and households. In a world where security threats are constantly evolving, this book is a valuable resource for understanding the dynamic landscape of network security and the role of artificial intelligence in safeguarding our digital ecosystems. 410 0$aStudies in Big Data,$x2197-6511 ;$v146 606 $aEngineering$xData processing 606 $aComputational intelligence 606 $aData protection 606 $aArtificial intelligence 606 $aBig data 606 $aData Engineering 606 $aComputational Intelligence 606 $aData and Information Security 606 $aArtificial Intelligence 606 $aBig Data 615 0$aEngineering$xData processing. 615 0$aComputational intelligence. 615 0$aData protection. 615 0$aArtificial intelligence. 615 0$aBig data. 615 14$aData Engineering. 615 24$aComputational Intelligence. 615 24$aData and Information Security. 615 24$aArtificial Intelligence. 615 24$aBig Data. 676 $a620.00285 700 $aKorytkowski$b Marcin$01427990 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910838286303321 996 $aAdvanced Techniques of Artificial Intelligence in IT Security Systems$94132115 997 $aUNINA