Skip to search
Skip to main content
Catalog
Help
Feedback
Your Account
Library Account
Bookmarks
(
0
)
Search History
Search in
Keyword
Title (keyword)
Author (keyword)
Subject (keyword)
Title starts with
Subject (browse)
Author (browse)
Author (sorted by title)
Call number (browse)
search for
Search
Advanced Search
Bookmarks
(
0
)
Princeton University Library Catalog
Start over
Cite
Send
to
SMS
Email
EndNote
RefWorks
RIS
Printer
Bookmark
Machine learning for cyber agents : attack and defence / Stanislav Abaimov, Maurizio Martellini.
Author
Abaimov, Stanislav, 1989-
[Browse]
Format
Book
Language
English
Published/Created
Singapore : Springer, [2022]
©2022
Description
1 online resource (235 pages)
Details
Subject(s)
Machine learning
[Browse]
Author
Martellini, M.
[Browse]
Series
Advanced Sciences and Technologies for Security Applications Ser.
[More in this series]
Bibliographic references
Includes bibliographical references.
Source of description
Description based on print version record.
Contents
Intro
Contents
Abbreviations
Disclosure Statement
List of Figures
List of Tables
1 Introduction
1.1 Motivation
1.2 Aim
1.3 Structure
Reference
2 Understanding Machine Learning
2.1 Setting the Scene
2.2 Conceptual and Operational Landscape
2.2.1 Machine Learning as a Concept
2.2.2 Algorithms and Their Application
2.2.3 Models
2.2.4 Methods
2.3 Explainability of Machine Learning
2.3.1 Data Collection
2.3.2 Pre-processing
2.3.3 Training
2.3.4 Prediction
2.3.5 Evaluation and Metrics
2.3.6 Fine-Tuning
2.4 Quantum Machine Learning
2.4.1 Quantum Computers
2.4.2 Main Notions
2.4.3 Specificity of Quantum Machine Learning
2.5 Machine Learning Limitations
2.6 Conclusion
References
3 Defence
3.1 Machine Learning for Cyber Security
3.2 IDS Supporting Human Operators
3.3 Network Security
3.3.1 Packet Parsing-Based Detection
3.3.2 Payload Analysis-Based Detection
3.4 Computer Security
3.4.1 Hardware Behaviour
3.4.2 Operating System
3.4.3 Connected Devices
3.4.4 Software Analysis
3.5 AI-Specific Security Issues
3.5.1 Adversarial Attacks on Artificial Intelligence
3.5.2 Defence Methods Against Adversarial Attacks
3.5.3 Development of Safe Artificial Intelligence Systems
3.5.4 Hybrid Defence
3.6 Conclusion
4 Attack
4.1 Machine Learning for Malware
4.2 Machine Learning Enhancing Cyber Attacks
4.2.1 Phishing
4.2.2 Exploitation
4.2.3 Network Traffic Masquerading
4.2.4 Bots and Botnets
4.2.5 Password Guessing
4.2.6 Ransomware
4.2.7 Cryptomining Malware
4.2.8 Recovery
4.2.9 Cryptanalysis
4.2.10 Forensics Investigation
4.2.11 Attacks Against Hardware
4.3 Weaponizing AI
4.3.1 Machine Learning for Weapons Autonomy
4.3.2 AWS Vulnerabilities
4.4 Conclusion
Reference.
5 International Resonance
5.1 Debates Over AI Integration and Governance
5.1.1 Debates Over Technical Issues
5.1.2 Debates Over Legal and Ethical Issues
5.1.3 Debates Over Governance
5.1.4 Debates Over Military Use of AI Offensive Capabilities
5.2 Multilateral Collaboration for Peaceful AI
5.2.1 Europe Fit for Digital Age
5.2.2 African Digital Transformation
5.2.3 ASEAN Digital Masterplan
5.2.4 United Nations Global Agenda for AI
5.3 Conclusion
6 Prospects
6.1 Technological Development
6.2 Societal Transformation
7 Conclusion
Glossary
References.
Show 83 more Contents items
ISBN
9783030915858 ((electronic bk.))
Statement on language in description
Princeton University Library aims to describe library materials in a manner that is respectful to the individuals and communities who create, use, and are represented in the collections we manage.
Read more...
Other views
Staff view
Supplementary Information