This book provides a hands-on, research-driven guide to building, deploying, and understanding machine learning models tailored for securing IIoT and WSN environments.
This book provides a hands-on, research-driven guide to building, deploying, and understanding machine learning models tailored for securing IIoT and WSN environments.
Atdhe Buja, Commonwealth University of Pennsylvania, Bloomsburg. Atdhe Buja is an assistant Professor in the Department of Computer Science, Math, and Digital Forensics at the Commonwealth University of Pennsylvania, Bloomsburg. He is a world-renowned cybersecurity expert with decades of experience and a leader in information technology and Industrial IoT cybersecurity. His work has been presented at several conferences, including FIRST cybersecurity, Hackathons, Astana IT University, Balkan Cybersecurity DCAF, Japan, cybersecurity Workshops, Safer Internet Day, etc. Participated many times in DEFCON, is a well-known expert on CERT teams where he developed and built CERT in academia and private (ICT Academy CERT), and has held a variety of roles in the cybersecurity industry. He has developed several video courses for the industry and the ICT Academy on VAPT, Incident Handling, SOC, Pentest, Machine Learning Introduction, IoT Security, Attack Scenarios and Incident Response, and cyber systems and Network Forensics. Leading many research projects for ICT Academy with Astana International Scientific Complex and Global Cyber Alliance, developing innovative solutions leveraging Machine Learning, Artificial Intelligence, and Cybersecurity to meet the needs of Wireless Sensor Networks, the Internet of Things, and Industrial IoT.
Inhaltsangabe
List of Figures List of Tables Chapter 1 Cybersecurity for IIoT and WSN. Chapter 2 Data Sources for Predictive Cybersecurity. Chapter 3 Data Analytics. Chapter 4 Exploratory Data Analysis (EDA) for Cybersecurity Insights. Chapter 5 The Cybersecurity Model Design. Chapter 6 The AI, ML Model Development for IIoT and WSN Security. Chapter 7 The Cybersecurity Model Deployment. Chapter 8 Artificial Intelligence in IIoT and WSN Security. Chapter 9 Research Insights. Chapter 10 The Way Ahead.Bibliography
List of Figures List of Tables Chapter 1 Cybersecurity for IIoT and WSN. Chapter 2 Data Sources for Predictive Cybersecurity. Chapter 3 Data Analytics. Chapter 4 Exploratory Data Analysis (EDA) for Cybersecurity Insights. Chapter 5 The Cybersecurity Model Design. Chapter 6 The AI, ML Model Development for IIoT and WSN Security. Chapter 7 The Cybersecurity Model Deployment. Chapter 8 Artificial Intelligence in IIoT and WSN Security. Chapter 9 Research Insights. Chapter 10 The Way Ahead.Bibliography
Es gelten unsere Allgemeinen Geschäftsbedingungen: www.buecher.de/agb
Impressum
www.buecher.de ist ein Internetauftritt der buecher.de internetstores GmbH
Geschäftsführung: Monica Sawhney | Roland Kölbl | Günter Hilger
Sitz der Gesellschaft: Batheyer Straße 115 - 117, 58099 Hagen
Postanschrift: Bürgermeister-Wegele-Str. 12, 86167 Augsburg
Amtsgericht Hagen HRB 13257
Steuernummer: 321/5800/1497
USt-IdNr: DE450055826