Network Security Empowered by Artificial Intelligence

Network Security Empowered by Artificial Intelligence

Chen, Yingying; Yu, Paul; Wu, Jie; Wang, Xiaogang

Springer International Publishing AG

06/2024

432

Dura

9783031535093

15 a 20 dias

Descrição não disponível.
Preface.- Part I. Architecture Innovations and Security in 5G Networks.- Chapter. 1. nCore: Clean Slate Next-G Mobile Core Network Architecture for Scalability and Low Latency.- Chapter. 2. Decision-Dominant Strategic Defense Against Lateral Movement for 5G Zero-Trust Multi-Domain Networks.- Part. II. Security in Artificial Intelligence-enabled Intrusion Detection Systems.- Chapter. 3. Artificial Intelligence and Machine Learning for Network Security - Quo Vadis?.- Chapter 4. Understanding the Ineffectiveness of the Transfer Attack in Intrusion Detection System.- Chapter. 5. Advanced ML/DL-based Intrusion Detection Systems for Software-Defined Networks.- Part III. Attack and Defense in Artificial Intelligence-enabled Wireless Systems.- Chapter. 6. Deep Learning for Robust and Secure Wireless Communications.- Chapter. 7. Universal Targeted Adversarial Attacks Against mmWave-based Human Activity Recognition.- Chapter. 8. AdversarialMachine Learning for Wireless Localization.- Chapter. 9. Localizing Spectrum Offenders Using Crowdsourcing.- Chapter. 10. Adversarial Online Reinforcement Learning Under Limited Defender Resources.- Part. IV. Security in Network-enabled Applications.- Chapter. 11. Security and Privacy of Augmented Reality Systems.- Chapter. 12. Securing Augmented Reality Applications.- Chapter. 13. On the Robustness of Image-based Malware Detection against Adversarial Attacks.- Chapter. 14. The Cost of Privacy: A Comprehensive Analysis of the Security Issues in Federated Learning.- Chapter. 15. Lessons Learned and Future Directions for Security, Resilience and Artificial Intelligence in Cyber Physical Systems.
Este título pertence ao(s) assunto(s) indicados(s). Para ver outros títulos clique no assunto desejado.
5G network;distributed Information-centric architecture;zero-trust architecture;meta-learning;intrusion detection;adversarial machine learning;transfer Attack;software-defined networking (SDN);deep learning;wireless security;millimeter wave;generative adversarial network;wireless localization;crowdsourcing;convolutional neural networks;reinforcement learning;securing augmented reality;malware detection;federated learning;cyber-physical systems