Malware Analysis Using Artificial Intelligence and Deep Learning

Malware Analysis Using Artificial Intelligence and Deep Learning

‚ÄčThis book is focused on the use of deep learning (DL) and artificial intelligence (AI) as tools to advance the fields of malware detection and analysis. The individual chapters of the book deal with a wide variety of state-of-the-art AI and DL techniques, which are applied to a number of challenging malware-related problems. DL and AI based approaches to malware detection and analysis are largely data driven and hence minimal expert domain knowledge of malware is needed. This book fills a gap between the emerging fields of DL/AI and malware analysis. It covers a broad range of modern and practical DL and AI techniques, including frameworks and development tools enabling the audience to innovate with cutting-edge research advancements in a multitude of malware (and closely related) use cases.


Author
Publisher Springer Nature
Release Date
ISBN 3030625826
Pages 651 pages
Rating 4/5 (25 users)
Read More

More Books:

Malware Analysis Using Artificial Intelligence and Deep Learning
Language: en
Pages: 651
Authors: Mark Stamp
Categories: Computers
Type: BOOK - Published: 2020-12-20 - Publisher: Springer Nature

‚ÄčThis book is focused on the use of deep learning (DL) and artificial intelligence (AI) as tools to advance the fields of malware detection and analysis. The
Security and Artificial Intelligence
Language: en
Pages:
Authors: Lejla Batina
Categories:
Type: BOOK - Published: - Publisher: Springer Nature

Cybersecurity for Artificial Intelligence
Language: en
Pages: 380
Authors: Mark Stamp
Categories: Computers
Type: BOOK - Published: 2022-08-16 - Publisher: Springer Nature

This book explores new and novel applications of machine learning, deep learning, and artificial intelligence that are related to major challenges in the field
Micro-Electronics and Telecommunication Engineering
Language: en
Pages: 812
Authors: Devendra Kumar Sharma
Categories: Technology & Engineering
Type: BOOK - Published: 2022-02-28 - Publisher: Springer Nature

The book presents high-quality papers from the Fourth International Conference on Microelectronics and Telecommunication Engineering (ICMETE 2021). It discusses
Handbook of Big Data Analytics and Forensics
Language: en
Pages:
Authors: Kim-Kwang Raymond Choo
Categories:
Type: BOOK - Published: - Publisher: Springer Nature

Trust, Security and Privacy for Big Data
Language: en
Pages: 212
Authors: Mamoun Alazab
Categories: Computers
Type: BOOK - Published: 2022-06-30 - Publisher: CRC Press

Data has revolutionized the digital ecosystem. Readily available large datasets foster AI and machine learning automated solutions. The data generated from dive
Artificial Intelligence and Blockchain for Future Cybersecurity Applications
Language: en
Pages: 376
Authors: Yassine Maleh
Categories: Computers
Type: BOOK - Published: 2021-04-30 - Publisher: Springer Nature

This book presents state-of-the-art research on artificial intelligence and blockchain for future cybersecurity applications. The accepted book chapters covered
Network Intrusion Detection using Deep Learning
Language: en
Pages: 79
Authors: Kwangjo Kim
Categories: Computers
Type: BOOK - Published: 2018-09-25 - Publisher: Springer

This book presents recent advances in intrusion detection systems (IDSs) using state-of-the-art deep learning methods. It also provides a systematic overview of
Neural Information Processing
Language: en
Pages: 695
Authors: Teddy Mantoro
Categories: Computers
Type: BOOK - Published: 2021-12-04 - Publisher: Springer Nature

The four-volume proceedings LNCS 13108, 13109, 13110, and 13111 constitutes the proceedings of the 28th International Conference on Neural Information Processin
Research Anthology on Artificial Intelligence Applications in Security
Language: en
Pages: 2253
Authors: Management Association, Information Resources
Categories: Computers
Type: BOOK - Published: 2020-11-27 - Publisher: IGI Global

As industries are rapidly being digitalized and information is being more heavily stored and transmitted online, the security of information has become a top pr