-
Chapter
AI-Enabled Cybersecurity for IoT and Smart City Applications
AI-driven cybersecurity is crucial to enhancing the resilience of the Internet of Things (IoT) and smart city ecosystems. Due to the dynamic and heterogeneous nature of IoT devices, these interconnected networ...
-
Chapter
AI for Critical Infrastructure Protection and Resilience
This chapter explores how artificial intelligence (AI) can be used to enhance the protection and resilience of critical infrastructure. Society is becoming increasingly dependent on interconnected systems, whi...
-
Chapter
Cybersecurity Background Knowledge: Terminologies, Attack Frameworks, and Security Life Cycle
This chapter provides a foundational understanding of cybersecurity concepts, including terminologies and attack frameworks like the cyber kill chain and MITRE ATT&CK, as well as the cybersecurity life cycle. ...
-
Chapter
Detecting Anomalies and Multi-attacks Through Cyber Learning: An Experimental Analysis
Detecting cyber-anomalies and attacks are becoming a rising concern these days in the domain of cybersecurity. The knowledge of artificial intelligence (AI), particularly the machine learning techniques, can b...
-
Chapter
Cybersecurity Data Science: Toward Advanced Analytics, Knowledge, and Rule Discovery for Explainable AI Modeling
In a computing context, cybersecurity technology and operations are constantly changing, and data science is driving the change. Building a data-driven model that extracts patterns in cybersecurity incidents i...
-
Chapter
AI for Enhancing ICS/OT Cybersecurity
In today’s industrial environments, advanced technologies have become increasingly integrated, increasing vulnerabilities and risks related to cyber threats. This chapter explores the transformative role of ar...
-
Chapter
CyberAI: A Comprehensive Summary of AI Variants, Explainable and Responsible AI for Cybersecurity
The integration of cybersecurity and artificial intelligence (AI), referred to as “CyberAI,” represents a dynamic and transformative landscape. This chapter outlines the diverse landscape of AI variants, as we...
-
Chapter
Introduction to AI-Driven Cybersecurity and Threat Intelligence
With the convergence of artificial intelligence (AI) and cybersecurity, a new paradigm has emerged in how we defend against evolving digital threats. This book explores the dynamic landscape of AI-driven cyber...
-
Chapter
Learning Technologies: Toward Machine Learning and Deep Learning for Cybersecurity
This chapter explores the transformative landscape of learning technologies, focusing specifically on machine learning and deep learning techniques used in cybersecurity. As digital threats become increasingly...
-
Chapter
Generative AI and Large Language Modeling in Cybersecurity
Cybersecurity is encountering new challenges demanding innovative solutions due to the complexity and frequency of cyberattacks progressing. Artificial intelligence (AI), particularly generative AI, has emerge...
-
Chapter and Conference Paper
Classifying Sentiments from Movie Reviews Using Deep Neural Networks
Sentiment analysis has become crucial for the building of opinion mining systems due to the daily creation, sharing, and transfer of massive volumes of data and opinions via the Internet and other media. The s...
-
Chapter and Conference Paper
Detecting Smishing Attacks Using Feature Extraction and Classification Techniques
Phishing scams via SMS have become a common phenomenon due to the widespread use of smartphones and the availability of mobile Internet technologies. Identifying a phishing SMS via analyzing unstructured short...
-
Chapter and Conference Paper
Automatic Malware Categorization Based on K-Means Clustering Technique
The android operating system is a popular operating system for mobile phone applications. This is also known as an open-source operating system so that the developers can easily update and add new features to ...
-
Chapter and Conference Paper
Genetic Algorithm-Based Optimal Deep Neural Network for Detecting Network Intrusions
Computer network attacks are evolving in parallel with the evolution of hardware and neural network architecture. Despite major advancements in network intrusion detection system (NIDS) technology, most implem...
-
Chapter and Conference Paper
SATLabel: A Framework for Sentiment and Aspect Terms Based Automatic Topic Labelling
In this paper, we present a framework that automatically labels latent Dirichlet allocation (LDA) generated topics using sentiment and aspect terms from COVID-19 tweets to help the end-users by minimizing the ...
-
Chapter and Conference Paper
Spam Filtering of Mobile SMS Using CNN–LSTM Based Deep Learning Model
In our civilizations, SMS continues to be an arguable communication tool despite the rattling development of protocol–predicated messaging approaches. Some businesses consider SMS as superior to e-mails for it...
-
Chapter and Conference Paper
InterPlanetary File System-Based Decentralized and Secured Electronic Health Record System Using Lightweight Algorithm
The electronic health record (EHR) system is a cloud-based patient health record in digital format that often includes contact information about the patient, test reports, medical history, and current and prev...
-
Chapter and Conference Paper
iMedMS: An IoT Based Intelligent Medication Monitoring System for Elderly Healthcare
In recent years, the ageing population is growing swiftly and ensuring proper healthcare for the elderly and physically challenged people has gained much attention from academic, medical or industrial experts....
-
Chapter and Conference Paper
Ransomware Family Classification with Ensemble Model Based on Behavior Analysis
Ransomware is one of the most dangerous types of malware, which is frequently intended to spread through a network to damage the designated client by encrypting the client’s vulnerable data. Conventional signa...
-
Chapter
A Tale of Two Zones: Pandemic ERT Evaluation
During the COVID-19 pandemic, many educational institutes switched from in-person to all virtual classes. Few educational institutes were well prepared for emergency remote teaching (ERT), whereas many others ...