- ホーム
- > 洋書
- > ドイツ書
- > Mathematics, Sciences & Technology
- > Technology
- > electronics, electrical engineering, telecommunications
Full Description
This comprehensive collection presents cutting-edge research at the intersection of cybersecurity, artificial intelligence, and emerging technologies for critical infrastructure protection. The book addresses pressing challenges in today's digital landscape, from machine learning-based threat detection and blockchain security to IoT vulnerabilities and advanced persistent threat mitigation. Contributors explore innovative AI-driven solutions for defending against sophisticated cyberattacks, including phishing detection, SQL injection prevention, DDoS mitigation, and protocol-based attack identification.
The research spans multiple domains including SCADA systems security, industrial control systems protection, and the application of deep learning models for real-time threat detection. With a particular focus on practical implementation and performance evaluation, the book bridges theoretical concepts with real-world applications, making it invaluable for cybersecurity professionals, researchers, and organizations seeking to enhance their defensive capabilities against evolving cyber threats in an increasingly connected world. Based on a workshop at the International Conference on Leadership, Business, and Management with a STEM focus (ICLBM STEM 2024) held in San Francisco, California, USA, this work explores the powerful convergence of leadership, business, management, and the transformative capabilities of science, technology, engineering, and mathematics (STEM).
Contents
.- You're Doing Maslow's Hierarchy All Wrong: What Should Leadership Really Look Like in the Workplace?.
.- Logistic Regression-Driven Framework for Securing IoT Networks Against Protocol-Based Threats.
.- A Hybrid IDS for APT Detection using BI- LSTM Ensemble Learning.
.- Real-Time Detection of Time-based Blind SQL Injection Using Machine Learning for Critical Infrastructure.
.- Analytical Study for DDoS Detection Algorithms in Cloud Computing.
.- Evaluating AI-Driven Algorithms for Detection and Pre vention of Code Injection Attacks.
.- Blockchain-Based Security Algorithms Evaluation for SCADA/ICS Systems.
.- Comparing Machine Learning Algorithms for Detection and Prevention of Cyber-Attacks on IoT Devices: A Literature Review.
.- Comparative Study of Defense Algorithms Against Denial of Service and Distributed Denial of Service Attacks.
.- Artificial Intelligence-Driven Solutions for Phishing Detection: A Comparative Analysis of Machine Learning Models.
.- Catalytic Role of Technological Turbulence between Entrepreneurial Orientation and Performance of SMEs with Mediating Nexus of Big Data Analytics and Artificial Intelligence.