Cyber Trafficking, Threat Behavior, and Malicious Activity Monitoring for Healthcare Organizations
5% Pre Publication Discount available until one month after release.

Cyber Trafficking, Threat Behavior, and Malicious Activity Monitoring for Healthcare Organizations

Dinesh C. Dobhal (Graphic Era (Deemed to be University), India), Sachin Sharma (Graphic Era (Deemed to be University), India), Kamlesh C. Purohit (Graphic Era (Deemed to be University), India), Lata Nautiyal (University of Bristol, UK) and Karan Singh (Jawaharlal Nehru University, India)
Pages: 300
DOI: 10.4018/978-1-6684-6646-9
ISBN13: 9781668466469|ISBN10: 1668466465|EISBN13: 9781668466476
Hardcover:
Forthcoming
$308.75
List Price: $325.00
5% Discount:-$16.25
TOTAL SAVINGS: $16.25
Benefits
  • Printed-On-Demand (POD)
  • Usually ships one day from order
E-Book:
(Multi-User License)
Forthcoming
$277.88
List Price: $325.00
10% Discount:-$32.50
5% Discount:-$14.63
TOTAL SAVINGS: $47.13
Benefits
  • Multi-user license (no added fee)
  • Immediate access after purchase
  • No DRM
  • ePub with PDF download
Hardcover +
E-Book:
(Multi-User License)
Forthcoming
$375.25
List Price: $395.00
5% Discount:-$19.75
TOTAL SAVINGS: $19.75
Benefits
  • Printed-On-Demand (POD)
  • Usually ships one day from order
  • Multi-user license (no added fee)
  • Immediate access after purchase
  • No DRM
  • ePub with PDF download
Description & Coverage
Description:

As a result of recent technological developments, artificial intelligence and machine learning methodologies have advanced. Deep learning techniques, in particular, have outperformed "traditional" machine learning methods in highly cognitive tasks like image recognition, audio classification, speech translation, natural language processing, machine translation, computer games, robots, and self-driving cars, resulting in the development of new industry standards. As a result, the subject of how artificial intelligence or machine learning-based technologies might be used to fulfill cyber security goals is crucial to address. The goal of this book is to close the gap between artificial intelligence and cyber security. The book covers a wide range of modern and practical artificial intelligence techniques, frameworks, and development tools. It also provides a comprehensive review of techniques and applications of Industry 5.0 enabled Intelligent Healthcare Centric Cyber Security.

Coverage:
Table of Contents
Search this Book:
Reset
Editorial Policy
In order to ensure the highest ethical practices are achieved for each book, IGI Global provides a full document of policies and guidelines that all editors, authors, and reviewers are expected to follow. View Full Editorial Policy
Peer Review Process
The peer review process is the driving force behind all IGI Global books and journals. All IGI Global reviewers maintain the highest ethical standards and each manuscript undergoes a rigorous double-blind peer review process, which is backed by our full membership to the Committee on Publication Ethics (COPE). The full publishing process and peer review are conducted within the IGI Global eEditorial Discovery® online submission system and on average takes 30 days. Learn More
Ethics & Malpractice
IGI Global affirms that ethical publication practices are critical to the successful development of knowledge. Therefore, it is the policy of IGI Global to maintain high ethical standards in all publications. These standards pertain to all books, journals, chapters, and articles accepted for publication. This is in accordance with standard scientific principles and IGI Global’s position as a source of scientific knowledge. Learn More
Archiving
All of IGI Global's content is archived via the CLOCKSS and LOCKSS initiative. Additionally, all IGI Global published content is available in IGI Global's InfoSci® platform.