LEADER 05264nam 22006135 450 001 9910999687103321 005 20250418133513.0 010 $a3-031-81481-9 024 7 $a10.1007/978-3-031-81481-5 035 $a(CKB)38485087400041 035 $a(DE-He213)978-3-031-81481-5 035 $a(MiAaPQ)EBC32013212 035 $a(Au-PeEL)EBL32013212 035 $a(OCoLC)1524419959 035 $a(EXLCZ)9938485087400041 100 $a20250418d2025 u| 0 101 0 $aeng 135 $aur||||||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aEmerging Trends in Information System Security Using AI & Data Science for Next-Generation Cyber Analytics /$fedited by Faisal Rehman, Inam Ullah Khan, Oroos Arshi, Shashi Kant Gupta 205 $a1st ed. 2025. 210 1$aCham :$cSpringer Nature Switzerland :$cImprint: Springer,$d2025. 215 $a1 online resource (XIV, 203 p. 56 illus., 51 illus. in color.) 225 1 $aInformation Systems Engineering and Management,$x3004-9598 ;$v32 311 08$a3-031-81480-0 327 $a1.AI-Driven Modern Cybersecurity Approach: A Systematic Literature Review -- 2.Cyber Security in the Post-Quantum Computer Era: Threats and Perspectives -- 3.Deep Neural Network for DoS Detection in Wireless Sensors Networks.-4.Survey on IoT Security Threats Application and Architectures -- 5.Lightweight Cryptography Algorithms for IoT Devices -- 6.Guarding the Digital Gateway: An In-depth Analysis of Cybersecurity Challenges in India -- 7.Predictive Modeling for Food Security Assessment Using Synthetic Minority Over-Sampling Technique -- 8.Exploring the Secure Unleashing of Digital Potential: A Study on How Cloud Security Works Together with Digital Transformation in Financial Institutions of Pakistan -- 9.Reviewing Theoretical Perspectives on IT Governance and Compliance in Banking: Insights from US Regulatory Frameworks -- 10.Overcoming Challenges and Implementing Effective Information Security Policies for Remote Work Environments -- 11.Generative Adversarial Networks (GAN) Insights for Cyber Security Applications -- 12.Future Emerging Challenges and Innovations in Next Gen-Cybersecurity and Information Systems Security. 330 $aThis book is a comprehensive exploration into the intersection of cutting-edge technologies and the critical domain of cybersecurity; this book delves deep into the evolving landscape of cyber threats and the imperative for innovative solutions. From establishing the fundamental principles of cyber security to scrutinizing the latest advancements in AI and machine learning, each chapter offers invaluable insights into bolstering defenses against contemporary threats. Readers are guided through a journey that traverses the realms of cyber analytics, threat analysis, and the safeguarding of information systems in an increasingly interconnected world. With chapters dedicated to exploring the role of AI in securing IoT devices, employing supervised and unsupervised learning techniques for threat classification, and harnessing the power of recurrent neural networks for time series analysis, this book presents a holistic view of the evolving cybersecurity landscape. Moreover, it highlights the importance of next-generation defense mechanisms, such as generative adversarial networks (GANs) and federated learning techniques, in combating sophisticated cyber threats while preserving privacy. This book is a comprehensive guide to integrating AI and data science into modern cybersecurity strategies. It covers topics like anomaly detection, behaviour analysis, and threat intelligence, and advocates for proactive risk mitigation using AI and data science. The book provides practical applications, ethical considerations, and customizable frameworks for implementing next-gen cyber defense strategies. It bridges theory with practice, offering real-world case studies, innovative methodologies, and continuous learning resources to equip readers with the knowledge and tools to mitigate cyber threats. 410 0$aInformation Systems Engineering and Management,$x3004-9598 ;$v32 606 $aEngineering$xData processing 606 $aComputational intelligence 606 $aArtificial intelligence 606 $aData Engineering 606 $aComputational Intelligence 606 $aArtificial Intelligence 615 0$aEngineering$xData processing. 615 0$aComputational intelligence. 615 0$aArtificial intelligence. 615 14$aData Engineering. 615 24$aComputational Intelligence. 615 24$aArtificial Intelligence. 676 $a620.00285 702 $aRehman$b Faisal$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aKhan$b Inam Ullah$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aArshi$b Oroos$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aGupta$b Shashi Kant$4edt$4http://id.loc.gov/vocabulary/relators/edt 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910999687103321 996 $aEmerging Trends in Information System Security Using AI & Data Science for Next-Generation Cyber Analytics$94375912 997 $aUNINA