Reference Hub1
Indices1
Research Anthology on Artificial Intelligence Applications in Security

Research Anthology on Artificial Intelligence Applications in Security

Copyright: © 2021 |Pages: 2253
ISBN13: 9781799877059|ISBN10: 1799877051|EISBN13: 9781799877486
DOI: 10.4018/978-1-7998-7705-9
Cite Book Cite Book

MLA

Management Association, Information Resources, editor. Research Anthology on Artificial Intelligence Applications in Security. IGI Global, 2021. https://doi.org/10.4018/978-1-7998-7705-9

APA

Management Association, I. (Ed.). (2021). Research Anthology on Artificial Intelligence Applications in Security. IGI Global. https://doi.org/10.4018/978-1-7998-7705-9

Chicago

Management Association, Information Resources, ed. Research Anthology on Artificial Intelligence Applications in Security. Hershey, PA: IGI Global, 2021. https://doi.org/10.4018/978-1-7998-7705-9

Export Reference

Mendeley
Favorite

As industries are rapidly being digitalized and information is being more heavily stored and transmitted online, the security of information has become a top priority in securing the use of online networks as a safe and effective platform. With the vast and diverse potential of artificial intelligence (AI) applications, it has become easier than ever to identify cyber vulnerabilities, potential threats, and the identification of solutions to these unique problems. The latest tools and technologies for AI applications have untapped potential that conventional systems and human security systems cannot meet, leading AI to be a frontrunner in the fight against malware, cyber-attacks, and various security issues. However, even with the tremendous progress AI has made within the sphere of security, it’s important to understand the impacts, implications, and critical issues and challenges of AI applications along with the many benefits and emerging trends in this essential field of security-based research.

Research Anthology on Artificial Intelligence Applications in Security seeks to address the fundamental advancements and technologies being used in AI applications for the security of digital data and information. The included chapters cover a wide range of topics related to AI in security stemming from the development and design of these applications, the latest tools and technologies, as well as the utilization of AI and what challenges and impacts have been discovered along the way. This resource work is a critical exploration of the latest research on security and an overview of how AI has impacted the field and will continue to advance as an essential tool for security, safety, and privacy online. This book is ideally intended for cyber security analysts, computer engineers, IT specialists, practitioners, stakeholders, researchers, academicians, and students interested in AI applications in the realm of security research.

Table of Contents

Reset
Front Materials
Title Page
This content has been removed at the discretion of the publisher and the editors.
Copyright Page
This content has been removed at the discretion of the publisher and the editors.
Editorial Advisory Board
This content has been removed at the discretion of the publisher and the editors.
Preface
This content has been removed at the discretion of the publisher and the editors.
Chapters
Chapter 1
Fundamental Concepts and Theories
This content has been removed at the discretion of the publisher and the editors.
Chapter 2
Development and Design Methodologies
This content has been removed at the discretion of the publisher and the editors.
Chapter 3
Tools and Technologies  (pages 642-642)
Tools and Technologies
This content has been removed at the discretion of the publisher and the editors.
Chapter 4
Utilization and Applications  (pages 1183-1183)
Utilization and Applications
This content has been removed at the discretion of the publisher and the editors.
Chapter 5
Organizational and Social Implications
This content has been removed at the discretion of the publisher and the editors.
Chapter 6
Managerial Impacts  (pages 1882-1882)
Managerial Impacts
This content has been removed at the discretion of the publisher and the editors.
Chapter 7
Critical Issues and Challenges
This content has been removed at the discretion of the publisher and the editors.
Chapter 8
Emerging Trends  (pages 2137-2137)
Emerging Trends
This content has been removed at the discretion of the publisher and the editors.
Back Materials
Index
This content has been removed at the discretion of the publisher and the editors.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.