Cyber Security Meets Machine Learning (eBook)
IX, 163 Seiten
Springer Singapore (Verlag)
978-981-336-726-5 (ISBN)
Machine learning boosts the capabilities of security solutions in the modern cyber environment. However, there are also security concerns associated with machine learning models and approaches: the vulnerability of machine learning models to adversarial attacks is a fatal flaw in the artificial intelligence technologies, and the privacy of the data used in the training and testing periods is also causing increasing concern among users.
This book reviews the latest research in the area, including effective applications of machine learning methods in cybersecurity solutions and the urgent security risks related to the machine learning models. The book is divided into three parts: Cyber Security Based on Machine Learning; Security in Machine Learning Methods and Systems; and Security and Privacy in Outsourced Machine Learning.Addressing hot topics in cybersecurity and written by leading researchers in the field, the book features self-contained chapters to allow readers to select topics that are relevant to their needs. It is a valuable resource for all those interested in cybersecurity and robust machine learning, including graduate students and academic and industrial researchers, wanting to gain insights into cutting-edge research topics, as well as related tools and inspiring innovations.
Xiaofeng Chen is a professor of the School of Cyber Engineering, Xidian University, China. His research interests include cryptography, cloud computing security, artificial intelligence security. He has published over 180 research papers in refereed international conferences and journals. His work has been cited more than 10000 times according to Google Scholar. He has served as Program/General Chair for various international conferences such as ProvSec 2011, NSS 2014, AsiaCCS 2016, INSCRYPT 2017, ML4CS 2019. He has been the PC member for more than 50 international conferences in networking, and information security. He is in the Editorial Board of IEEE Transactions on Dependable and Secure Computing, Computer Standards & Interfaces (CSI), and Security & Privacy. He is a Senior Member of the IEEE.
Willy Susilo is the Head of the School of Computing and Information Technology at UOW. Before this role, he was the Head of the School of Computer Science and Software Engineering (SCSSE), Deputy Director of ICT Research Institute and the Academic Program Director for UoW (Singapore). He is also the Director of the Centre for Computer and Information Security Research. He has been awarded a prestigious Australian Research Council (ARC) Future Fellowship. His main research interests include cryptography and computer security, in particular the design of signature schemes. Willy has published more than 350 research papers. He has been awarded various competitive research grants, including ARC Discovery Projects, ARC Linkage Projects, Prime Minister and Cabinet, Microsoft Project, and Smart CRC.
Elisa Bertino is a professor of Computer Science at Purdue University. She serves as Director of the Purdue Cyberspace Security Lab (Cyber2Slab). Before joining Purdue, she was a professor and department head at the Department of Computer Science and Communication of the University of Milan. She has been a visiting researcher at the IBM Research Laboratory in San Jose (now Almaden), at the Microelectronics and Computer Technology Corporation, at Rutgers University, at Telcordia Technologies. She has also held visiting professor positions at the Singapore National University and the Singapore Management University. Her main research interests include security, privacy, database systems, distributed systems, and sensor networks. Her recent research focuses on cybersecurity and privacy of cellular networks and IoT systems, and edge analytics for cybersecurity. Elisa Bertino is a Fellow member of IEEE, ACM, and AAAS. She received the 2002 IEEE Computer Society Technical Achievement Award for 'For outstanding contributions to database systems and database security and advanced data management systems', the 2005 IEEE Computer Society Tsutomu Kanai Award for 'Pioneering and innovative research contributions to secure distributed systems', and the 2019-2020 ACM Athena Lecturer Award.
Machine learning boosts the capabilities of security solutions in the modern cyber environment. However, there are also security concerns associated with machine learning models and approaches: the vulnerability of machine learning models to adversarial attacks is a fatal flaw in the artificial intelligence technologies, and the privacy of the data used in the training and testing periods is also causing increasing concern among users.This book reviews the latest research in the area, including effective applications of machine learning methods in cybersecurity solutions and the urgent security risks related to the machine learning models. The book is divided into three parts: Cyber Security Based on Machine Learning; Security in Machine Learning Methods and Systems; and Security and Privacy in Outsourced Machine Learning.Addressing hot topics in cybersecurity and written by leading researchers in the field, the book features self-contained chapters to allow readers to select topics that are relevant to their needs. It is a valuable resource for all those interested in cybersecurity and robust machine learning, including graduate students and academic and industrial researchers, wanting to gain insights into cutting-edge research topics, as well as related tools and inspiring innovations.
Erscheint lt. Verlag | 2.7.2021 |
---|---|
Zusatzinfo | IX, 163 p. 41 illus., 24 illus. in color. |
Sprache | englisch |
Themenwelt | Informatik ► Netzwerke ► Sicherheit / Firewall |
Informatik ► Theorie / Studium ► Künstliche Intelligenz / Robotik | |
Mathematik / Informatik ► Informatik ► Web / Internet | |
Informatik ► Weitere Themen ► Hardware | |
Schlagworte | Adversarial Examples • Communication Security • cyber security • image forensics • IoT Attacks • machine learning |
ISBN-10 | 981-336-726-1 / 9813367261 |
ISBN-13 | 978-981-336-726-5 / 9789813367265 |
Haben Sie eine Frage zum Produkt? |
Größe: 4,3 MB
DRM: Digitales Wasserzeichen
Dieses eBook enthält ein digitales Wasserzeichen und ist damit für Sie personalisiert. Bei einer missbräuchlichen Weitergabe des eBooks an Dritte ist eine Rückverfolgung an die Quelle möglich.
Dateiformat: PDF (Portable Document Format)
Mit einem festen Seitenlayout eignet sich die PDF besonders für Fachbücher mit Spalten, Tabellen und Abbildungen. Eine PDF kann auf fast allen Geräten angezeigt werden, ist aber für kleine Displays (Smartphone, eReader) nur eingeschränkt geeignet.
Systemvoraussetzungen:
PC/Mac: Mit einem PC oder Mac können Sie dieses eBook lesen. Sie benötigen dafür einen PDF-Viewer - z.B. den Adobe Reader oder Adobe Digital Editions.
eReader: Dieses eBook kann mit (fast) allen eBook-Readern gelesen werden. Mit dem amazon-Kindle ist es aber nicht kompatibel.
Smartphone/Tablet: Egal ob Apple oder Android, dieses eBook können Sie lesen. Sie benötigen dafür einen PDF-Viewer - z.B. die kostenlose Adobe Digital Editions-App.
Buying eBooks from abroad
For tax law reasons we can sell eBooks just within Germany and Switzerland. Regrettably we cannot fulfill eBook-orders from other countries.
aus dem Bereich