MARC details
| 000 -LEADER |
| fixed length control field |
03131nam a22002777a 4500 |
| 003 - CONTROL NUMBER IDENTIFIER |
| control field |
OSt |
| 005 - DATE AND TIME OF LATEST TRANSACTION |
| control field |
20260126141505.0 |
| 008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION |
| fixed length control field |
260126b |||||||| |||| 00| 0 eng d |
| 020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
| International Standard Book Number |
9781119784135 |
| 024 ## - OTHER STANDARD IDENTIFIER |
| Source of number or code |
doi |
| Standard number or code |
10.1002/9781119784135 |
| 040 ## - CATALOGING SOURCE |
| Original cataloging agency |
TUPM |
| Language of cataloging |
eng |
| Transcribing agency |
TUPM |
| Modifying agency |
TUPM |
| Description conventions |
rda |
| 100 ## - MAIN ENTRY--PERSONAL NAME |
| Personal name |
Qian, Yi. |
| Relator term |
author |
| 245 ## - TITLE STATEMENT |
| Title |
Cybersecurity in intelligent networking systems / |
| Statement of responsibility, etc. |
Yi Qian and 2 others. |
| Medium |
ebook |
| 260 ## - PUBLICATION, DISTRIBUTION, ETC. |
| Name of publisher, distributor, etc. |
John Wiley & Sons, Ltd, |
| Date of publication, distribution, etc. |
2023. |
| 336 ## - CONTENT TYPE |
| Source |
rdacontent |
| 337 ## - MEDIA TYPE |
| Source |
rdamedia |
| 338 ## - CARRIER TYPE |
| Source |
rdacarrier |
| 504 ## - BIBLIOGRAPHY, ETC. NOTE |
| Bibliography, etc. note |
Includes bibliographic references and index. |
| 520 ## - SUMMARY, ETC. |
| Summary, etc. |
Cybersecurity and privacy are critical to modern network systems. As various malicious threats have been launched that target critical online services—such as e-commerce, e-health, social networks, and other major cyber applications—it has become more critical to protect important information from being accessed. Data-driven network intelligence is a crucial development in protecting the security of modern network systems and ensuring information privacy.<br/><br/>Cybersecurity in Intelligent Networking Systems provides a background introduction to data-driven cybersecurity, privacy preservation, and adversarial machine learning. It offers a comprehensive introduction to exploring technologies, applications, and issues in data-driven cyber infrastructure. It describes a proposed novel, data-driven network intelligence system that helps provide robust and trustworthy safeguards with edge-enabled cyber infrastructure, edge-enabled artificial intelligence (AI) engines, and threat intelligence. Focusing on encryption-based security protocol, this book also highlights the capability of a network intelligence system in helping target and identify unauthorized access, malicious interactions, and the destruction of critical information and communication technology.<br/><br/>Cybersecurity in Intelligent Networking Systems readers will also find:<br/>- Fundamentals in AI for cybersecurity, including artificial intelligence, machine learning, and security threats<br/>- Latest technologies in data-driven privacy preservation, including differential privacy, federated learning, and homomorphic encryption<br/>- Key areas in adversarial machine learning, from both offense and defense perspectives<br/>- Descriptions of network anomalies and cyber threats<br/>- Background information on data-driven network intelligence for cybersecurity<br/>- Robust and secure edge intelligence for network anomaly detection against cyber intrusions<br/>- Detailed descriptions of the design of privacy-preserving security protocols<br/><br/>Cybersecurity in Intelligent Networking Systems is an essential reference for all professional computer engineers and researchers in cybersecurity and artificial intelligence, as well as graduate students in these fields. |
| 650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM |
| Topical term or geographic name entry element |
Cybersecurity |
| Form subdivision |
eBook |
| 650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM |
| Topical term or geographic name entry element |
Artificial intelligence |
| General subdivision |
Cybersecurity |
| 700 ## - ADDED ENTRY--PERSONAL NAME |
| Personal name |
Hu, Rose Qingyang. |
| Relator term |
author |
| 700 ## - ADDED ENTRY--PERSONAL NAME |
| Personal name |
Xu, Shengjie. |
| Relator term |
author |
| 856 ## - ELECTRONIC LOCATION AND ACCESS |
| Uniform Resource Identifier |
<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119784135">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119784135</a> |
| Link text |
Wiley Online Library |
| 942 ## - ADDED ENTRY ELEMENTS (KOHA) |
| Source of classification or shelving scheme |
Library of Congress Classification |
| Koha item type |
eBook |
| Suppress in OPAC |
No |