Machine Learning for Cybersecurity
Threat Detection and Mitigation

Download Url(s)
https://mdpi.com/books/pdfview/book/10270Contributor(s)
Elhanashi, Abdussalam (editor)
Dini, Pierpaolo (editor)
Language
EnglishAbstract
"Machine Learning for Cybersecurity: Threat Detection and Mitigation" delves into the transformative role of machine learning in addressing contemporary cybersecurity challenges. This reprint provides an in-depth exploration of how advanced techniques such as deep learning, natural language processing, and explainable AI are revolutionizing intrusion detection, anomaly detection, and threat intelligence. With a focus on practical applications, it covers critical topics such as malware analysis, IoT and cloud security, blockchain security, adversarial attacks, and secure data sharing. Through this reprint, readers will gain insights into cutting-edge approaches for vulnerability assessments, authentication, and privacy preservation while exploring frameworks for implementing security-aware AI systems. This comprehensive resource is essential for researchers, practitioners, and policymakers striving to strengthen digital ecosystems. It offers both theoretical insights and actionable solutions, paving the way for innovative cybersecurity strategies to combat an ever-evolving threat landscape.
Keywords
generative adversarial networks; data anonymization; privacy preservation; loss feedback; feature coding; power data protection; Internet of Things; denial-of-service attack; Information-Centric Network; machine learning; network intrusion detection; datasets engineering; deep learning; feature fusion; cybersecurity; oversampling technique; undersampling technique; multi-class classification; vulnerability mining; hotspot code; fuzzing; AFL; device fingerprinting; neuromorphic; spiking neural network; eventization; encoding; SNN; operational technology; OT; random forest; WirelessHART; artificial intelligence; cyber threat intelligence; cyber resilience; ethical considerations; CTI and AI biases; anomaly detection; DCNN; Internet of Things (IoT); machine learning (ML); SVM; XGBoost; security; blockchain; ELF static analysis; binary lifting; opcode sequence analysis; malware detection; malware classification; fake account detection; Twitter (X); image classification; syntax aware; protocol implementations; large language models; Linux system calls; quantum computing; IoMT; post-quantum; lateral movement; threat mitigation; unsupervised learning; attack graphs; active directory; hardening placement; robotics security; industrial control systems; network-based intrusion detection systemsISBN
9783725827947, 9783725827930Publisher website
www.mdpi.com/booksPublication date and place
Basel, 2024Classification
Films, cinema
Television

