AI and ML-Driven Cybersecurity
CRC Press (Verlag)
978-1-041-05039-1 (ISBN)
Whether you’re a student, researcher, or professional, this book takes you through the full data science lifecycle—from data collection and EDA to model development and deployment—with a special focus on real-world attack detection, anomaly analysis, and predictive defense strategies.
You’ll learn:
How to run a cybersecurity-focused exploratory data analysis (EDA)
Step-by-step model design, training, and evaluation for threat detection
Building and deploying web-based AI cybersecurity solutions
Practical use of Python
Visualizing attacks and insights to drive decision-making
Future trends including Edge AI, federated learning, and zero-trust security
This book is intended for cybersecurity professionals working in industrial or smart environments, including smart cities, aerospace, manufacturing, etc. It is also a valuable resource for data scientists and ML engineers applying AI to security, industrial engineers, and university students and educators in computer science, data science, and security. Build secure, data-driven defenses for the next generation of connected systems—start here.
Atdhe Buja, Commonwealth University of Pennsylvania, Bloomsburg. Atdhe Buja is an assistant Professor in the Department of Computer Science, Math, and Digital Forensics at the Commonwealth University of Pennsylvania, Bloomsburg. He is a world-renowned cybersecurity expert with decades of experience and a leader in information technology and Industrial IoT cybersecurity. His work has been presented at several conferences, including FIRST cybersecurity, Hackathons, Astana IT University, Balkan Cybersecurity DCAF, Japan, cybersecurity Workshops, Safer Internet Day, etc. Participated many times in DEFCON, is a well-known expert on CERT teams where he developed and built CERT in academia and private (ICT Academy CERT), and has held a variety of roles in the cybersecurity industry. He has developed several video courses for the industry and the ICT Academy on VAPT, Incident Handling, SOC, Pentest, Machine Learning Introduction, IoT Security, Attack Scenarios and Incident Response, and cyber systems and Network Forensics. Leading many research projects for ICT Academy with Astana International Scientific Complex and Global Cyber Alliance, developing innovative solutions leveraging Machine Learning, Artificial Intelligence, and Cybersecurity to meet the needs of Wireless Sensor Networks, the Internet of Things, and Industrial IoT.
List of Figures List of Tables Chapter 1 Cybersecurity for IIoT and WSN. Chapter 2 Data Sources for Predictive Cybersecurity. Chapter 3 Data Analytics. Chapter 4 Exploratory Data Analysis (EDA) for Cybersecurity Insights. Chapter 5 The Cybersecurity Model Design. Chapter 6 The AI, ML Model Development for IIoT and WSN Security. Chapter 7 The Cybersecurity Model Deployment. Chapter 8 Artificial Intelligence in IIoT and WSN Security. Chapter 9 Research Insights. Chapter 10 The Way Ahead.Bibliography
| Erscheinungsdatum | 17.10.2025 |
|---|---|
| Zusatzinfo | 7 Tables, black and white; 37 Line drawings, black and white; 1 Halftones, black and white; 38 Illustrations, black and white |
| Verlagsort | London |
| Sprache | englisch |
| Maße | 156 x 234 mm |
| Gewicht | 420 g |
| Themenwelt | Informatik ► Netzwerke ► Sicherheit / Firewall |
| Informatik ► Theorie / Studium ► Künstliche Intelligenz / Robotik | |
| Recht / Steuern ► Privatrecht / Bürgerliches Recht ► IT-Recht | |
| ISBN-10 | 1-041-05039-9 / 1041050399 |
| ISBN-13 | 978-1-041-05039-1 / 9781041050391 |
| Zustand | Neuware |
| Informationen gemäß Produktsicherheitsverordnung (GPSR) | |
| Haben Sie eine Frage zum Produkt? |
aus dem Bereich