LEADER 00816cam2 22002651 450 001 SOBE00046312 005 20150605083137.0 010 $a0194327191 100 $a20150313d1981 |||||ita|0103 ba 101 $aeng 102 $aGB 200 0 $a1$fJennifer Seidl 210 $aOxford$cOxford University Press$d1981 215 $a156 p.$d21 cm 461 1$1001E600200008734$12001 $aGrammar in practice / Jennifer Seidl 700 1$aSeidl$b, Jennifer$3A600200029855$4070$0245329 801 0$aIT$bUNISOB$c20150605$gRICA 850 $aUNISOB 852 $aUNISOB$j820$m124696 912 $aSOBE00046312 940 $aM 102 Monografia moderna SBN 941 $aM 957 $a820$b002584$i-1$gSI$d124696$tN$1cutolo$2UNISOB$3UNISOB$420150313091711.0$520150605083137.0$6Alfano 996 $a1$91710591 997 $aUNISOB LEADER 00796nam a2200205 i 4500 001 991004300734607536 005 20240418110515.0 008 231219s2014 it r 00| 0 ita d 020 $a9788849005028 040 $aBibl. Dip.le Aggr. Scienze Giuridiche - Sez. Centro Studi sul Rischio$bita 082 04$a362.10285$223 100 1 $aMoruzzi, Mauro$0474337 245 13$aLa sanità dematerializzata e il fascicolo sanitario elettronico :$bil nuovo welfare a bassa burocrazia /$cMauro Moruzzi 264 1$aRoma :$bIl pensiero scientifico,$c2014 300 $aXII, 259 p. ;$c21 cm 490 0 $aSpazi 650 4$aServizi sanitari$xSistemi informativi$xAutomazione 912 $a991004300734607536 996 $aSanità dematerializzata e il fascicolo sanitario elettronico$93655196 997 $aUNISALENTO LEADER 04339nam 22007455 450 001 9910770274903321 005 20250827153134.0 010 $a9783031464799 010 $a3031464796 024 7 $a10.1007/978-3-031-46479-9 035 $a(CKB)29353506100041 035 $a(MiAaPQ)EBC31015656 035 $a(Au-PeEL)EBL31015656 035 $a(OCoLC)1414110108 035 $a(DE-He213)978-3-031-46479-9 035 $a(EXLCZ)9929353506100041 100 $a20231212d2023 u| 0 101 0 $aeng 135 $aur||||||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aExplainable AI for Cybersecurity /$fby Zhixin Pan, Prabhat Mishra 205 $a1st ed. 2023. 210 1$aCham :$cSpringer Nature Switzerland :$cImprint: Springer,$d2023. 215 $a1 online resource (249 pages) 225 0 $aIntelligent Technologies and Robotics Series 311 08$a9783031464782 311 08$a3031464788 327 $aPart 1: Introduction -- Chapter 1. Cybersecurity Landscape for Computer Systems -- Chapter 2. Explainable Artificial Intelligence -- Part 2: Detection of Software Vulnerabilities -- Chapter 3. Malware Detection using Explainable AI -- Chapter 4. Spectre and Meltdown Detection using Explainable AI -- Part 3: Detection of Hardware Vulnerabilities -- Chapter 5. Hardware Trojan Detection using Reinforcement Learning -- Chapter 6. Hardware Trojan Detection using Side-Channel Analysis -- Chapter 7. Hardware Trojan Detection using Shapley Ensemble Boosting -- Part 4: Mitigation of AI Vulnerabilities -- Chapter 8. Mitigation of Adversarial Machine Learning -- Chapter 9. AI Trojan Attacks and Countermeasures -- Part 5: Acceleration of Explainable AI -- Chapter 10. Hardware Acceleration of Explainable AI -- Chapter 11. Explainable AI Acceleration using Tensor Processing Units -- Part 6: Conclusion -- Chapter 12. The Future of AI-Enabled Cybersecurity. 330 $aThis book provides a comprehensive overview of security vulnerabilities and state-of-the-art countermeasures using explainable artificial intelligence (AI). Specifically, it describes how explainable AI can be effectively used for detection and mitigation of hardware vulnerabilities (e.g., hardware Trojans) as well as software attacks (e.g., malware and ransomware). It provides insights into the security threats towards machine learning models and presents effective countermeasures. It also explores hardware acceleration of explainable AI algorithms. The reader will be able to comprehend a complete picture of cybersecurity challenges and how to detect them using explainable AI. This book serves as a single source of reference for students, researchers, engineers, and practitioners for designing secure and trustworthy systems. Introduces a wide variety of software and hardware vulnerabilities; Describes solutions for detecting security attacks using explainable AI; Presents a fast and robust framework using hardware acceleration and mitigation of adversarial attacks. 606 $aComputational intelligence 606 $aElectronic circuits 606 $aData protection 606 $aElectronic circuit design 606 $aEmbedded computer systems 606 $aArtificial intelligence 606 $aComputational Intelligence 606 $aElectronic Circuits and Systems 606 $aData and Information Security 606 $aElectronics Design and Verification 606 $aEmbedded Systems 606 $aArtificial Intelligence 615 0$aComputational intelligence. 615 0$aElectronic circuits. 615 0$aData protection. 615 0$aElectronic circuit design. 615 0$aEmbedded computer systems. 615 0$aArtificial intelligence. 615 14$aComputational Intelligence. 615 24$aElectronic Circuits and Systems. 615 24$aData and Information Security. 615 24$aElectronics Design and Verification. 615 24$aEmbedded Systems. 615 24$aArtificial Intelligence. 676 $a005.8 700 $aPan$b Zhixin$0866851 701 $aMishra$b Prabhat$01460790 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910770274903321 996 $aExplainable AI for Cybersecurity$93660738 997 $aUNINA