Generative Artificial Intelligence for Next-Generation Security Paradigms
- Nyhet
Inbunden, Engelska, 2026
AvSantosh Kumar Srivastava,Durgesh Srivastava,Manoj Kumar Mahto,Ben Othman Soufiane,Praveen Kantha,Ben Othman Soufiene
3 079 kr
Beställningsvara. Skickas inom 10-15 vardagar. Fri frakt för medlemmar vid köp för minst 249 kr.
Produktinformation
- Utgivningsdatum2026-01-16
- FormatInbunden
- SpråkEngelska
- Antal sidor496
- FörlagJohn Wiley & Sons Inc
- ISBN9781394305643
Tillhör följande kategorier
Santosh Kumar Srivastava, PhD is an Associate Professor in the Department of Applied Computational Science and Engineering at the GL Bajaj Institute of Technology and Management with more than 21 years of experience. He has published more than 15 papers in reputed national and international journals and conferences and five patents. He is a distinguished researcher in the areas of computer networking, wireless technology, network security, and cloud computing.Durgesh Srivastava, PhD is an Associate Professor in the Chitkara University Institute of Engineering and Technology at Chitkara University with more than 14 years of academic and research experience. He has published more than 30 papers in reputed national and international journals and conferences, as well as several books and patents. His research interests include machine learning, soft computing, pattern recognition, and software engineering, modeling, and design.Manoj Kumar Mahto, PhD is an Assistant Professor at BRCM College of Engineering and Technology. Bahal, Haryana, India. He has published more than 15 journal articles, ten book chapters, and three patents. His research interests encompass AI and machine learning, image processing, and natural language processing.Ben Othman Soufiane, PhD works in the Programming and Information Center Research Laboratory associated with the Higher Institute of Informatics and Techniques of Communication. He has published more than 70 papers in reputed international journals, conferences, and book chapters. His research focuses on the Internet of Medical Things, wireless body sensor networks, wireless networks, artificial intelligence, machine learning, and big data.Praveen Kantha, PhD is an Associate Professor in the School of Engineering and Technology at Chitkara University. He is the author of 20 research papers published in national and international journals and conferences, several book chapters, and two patents. His research interests include machine learning, intrusion detection, big data analytics, and autonomous and connected vehicles.
- Preface xix1 Introduction to Generative Artificial Intelligence 1Ch Raja Ramesh, P. Muralidhar, K. M. V. Madan Kumar, B. Srinu, G. Raja Vikram and Rakesh Nayak1.1 Introduction 21.2 Historical Context 31.3 Fundamental Architecture of Generative AI 51.3.1 Data Processing Layer 51.3.2 Generative Model Layer 61.3.3 Improvement and Feedback Layer 71.3.4 Integration and Deployment Layer 81.4 Applications of Generative AI 81.5 Ethical Implications 101.6 Societal Implications 121.7 Use Cases in Generative AI 141.8 Education 141.9 Health Care 151.10 Challenges in Generative AI 171.11 Challenges in Education 171.12 Challenges in Health Care 181.13 Future Directions 191.14 Interpretable and Controllable Generative AI 201.15 Collaboration between AI and Human Creativity 211.16 Conclusion 21References 222 Deep Learning in Cyber Security: A Guide to Harnessing Generative AI for Enhanced Threat Detection 25P. Lavanya Kumari, Rajendra Prasad, Sai Teja Inampudi, Nagaram Nagarjuna and Vishesh Chawan2.1 Introduction 262.1.1 Overview of Cyber Security 262.1.2 Role of AI in Cyber Security 272.1.3 Introduction to Deep Learning and Generative AI 282.2 Deep Learning Basics 282.2.1 Understanding Neural Networks 282.2.2 Types of Deep Learning Models 302.2.3 Training Deep Learning Models 312.3 Generative AI 322.3.1 Understanding Generative Models 322.3.2 Applications of Generative AI 332.3.3 Generative AI in Cyber Security 352.4 Enhancing Threat Detection with Generative AI 372.4.1 Current Challenges in Threat Detection 372.4.2 How Generative AI Enhances Threat Detection 382.4.3 Case Studies of Generative AI in Threat Detection 392.5 Implementing Generative AI for Threat Detection 402.5.1 Preparing Your Data 402.5.2 Building a Generative Model 412.5.3 Evaluating Model Performance 422.6 Future Trends in AI-Driven Cyber Security 432.6.1 Emerging Trends 432.6.2 Potential Challenges 432.7 Conclusion 44References 453 Cognitive Firewalls: Reinventing Cybersecurity through Generative Models 49Ramandeep Kaur and Santosh Kumar Srivastava3.1 Introduction 503.1.1 Cybersecurity’s Significance 503.1.2 Value of Cyber Threats 513.1.3 Introduction to Generative AI and Deep Learning in Cyber Security 513.1.4 Goal of the Chapter 533.2 Basics of Deep Learning 533.2.1 Overview of Machine Learning & Deep Learning 533.2.2 Important Ideas: Neural Networks (NNs), Layers and Activation Functions 543.2.3 Deep Learning Architectures: CNN, RNN, and GANs 553.3 Synopsis of Cybersecurity 563.3.1 Awareness of Cyber Threats: DDoS, Phishing, and Malware 573.3.2 Customary Cybersecurity Tools: Firewalls, Antivirus Software, and IDS/IPS 573.3.3 Restrictions on Conventional Methods 583.3.4 The Function of Artificial Intelligence in Cybersecurity 583.4 Cybersecurity and Generative AI 603.4.1 Overview of Generative AI: GAN and VAE 603.4.2 How Generative AI is Different from Other AI Methods 603.4.3 Cyber Security’s Potential Applications 623.4.4 Ethical Issues and Challenges 633.5 Enhanced Threat Detection Using Generative AI 643.5.1 Techniques for Anomaly Detection 643.5.2 Real-Time Threat Detection with Generative AI 653.6 Execution Techniques 673.6.1 Building a Cyber Security Generative AI Model 673.6.2 Gathering and Preparing Data 683.6.3 Testing and Training of Models 703.6.4 Deployment Considerations 713.7 Case Research and Utilization 723.7.1 Applications of Generative AI in Cybersecurity in the Real World 723.7.2 Success Stories and Lessons Learned 733.7.3 Comparison with Routine Methodologies 753.8 Prospective Patterns and Directions 773.8.1 New Developments in Cybersecurity and Deep Learning 773.8.2 Future Directions for Generative AI in Threat Detection 783.8.3 Prospective Fields of Study 793.9 Key Findings 803.10 Conclusion 80References 814 Biometric Fusion: Exploring Generative AI Applications in Multi-Modal Security Systems 85Suryakanta, Ritu, Anu Rani, Neerja Negi, Surya Kant Pal and Kamalpreet Singh Bhangu4.1 Introduction 864.2 Literature Review 884.3 Overview of Multi-Modal Biometric Security Systems 934.4 Generative AI in Multi-Modal Biometric Security 944.5 Benefits of Generative AI in Multi-Modal Biometric Systems 974.6 Challenges and Ethical Considerations 994.7 Future Directions 1004.8 Conclusion 103References 1045 Dynamic Threat Intelligence: Leveraging Generative AI for Real-Time Security Response 107Manoj Kumar Mahto5.1 Introduction 1085.1.1 The Evolving Threat Landscape 1085.1.2 Importance of Real-Time Security Response 1095.1.3 Role of Generative AI in Modern Cybersecurity 1105.2 Fundamentals of Threat Intelligence 1115.2.1 Definition and Types of Threat Intelligence 1115.2.2 Traditional vs. Dynamic Threat Intelligence 1125.2.3 Challenges in Current Threat Intelligence Systems 1125.3 Generative AI in Cybersecurity 1135.3.1 Overview of Generative AI Technologies 1135.3.2 Use Cases in Cybersecurity: From Threat Detection to Response 1145.3.3 Strengths and Limitations of Generative AI 1155.3.3.1 Strengths of Generative AI in Cybersecurity 1155.3.3.2 Limitations of Generative AI in Cybersecurity 1165.4 Architecture for Dynamic Threat Intelligence 1165.4.1 Key Components of a Generative AI-Driven Security System 1185.4.2 Integration with Existing Security Infrastructure 1195.4.3 Real-Time Data Processing and Threat Correlation 1205.5 Applications and Use Cases 1205.6 Techniques for Leveraging Generative AI 1235.6.1 Natural Language Processing (NLP) for Threat Intelligence 1245.6.2 Synthetic Data Generation for Cybersecurity Simulations 1255.6.3 Real-Time Incident Response Automation 1255.7 Addressing Ethical and Privacy Concerns 1265.7.1 Ethical Considerations in AI-Powered Security 1275.7.2 Managing Bias in Generative AI Models 1275.7.3 Ensuring Privacy in Threat Intelligence Data 1285.8 Case Studies and Real-World Implementations 1285.9 Future Directions in Threat Intelligence 1315.9.1 Advances in Generative AI for Cybersecurity 1325.9.2 The Role of Explainable AI in Threat Response 1335.9.3 Long-Term Trends and Challenges 1335.10 Conclusion 134References 1356 Cognitive Security: Integrating Generative AI for Adaptive and Self-Learning Defenses 137Akruti Sinha, Akshet Patel and Deepak Sinwar6.1 Introduction 1386.2 Cognitive Security and Human Vulnerabilities 1406.2.1 Definition 1406.2.2 Human Role in Cognitive Security Including Vulnerability 1416.2.3 Attacks and Attacker’s Strategies 1456.3 GenAI in Security 1476.4 Self-Learning Systems in Cognitive Security 1496.4.1 Anomaly Detection and Threat Identification 1506.4.2 Automated Response and Mitigation 1506.4.3 Continuous Learning and Adaptation 1506.4.4 Enhanced Decision Support 1506.5 Predictive Security Analytics with Generative Models 1526.6 AI-Driven Incident Response and Remediation 1556.7 Ethical Perspective 1586.8 Security Considerations 1596.9 Mitigation Strategies 1606.10 Conclusion 161References 1627 Quantum Computing and Generative AI: Securing the Future of Information 167Kuldeep Singh Kaswan, Jagjit Singh Dhatterwal, Kiran Malik and Praveen Kantha7.1 Introduction 1687.2 Foundations of Quantum Computing 1717.3 Quantum Algorithms 1747.4 Current Landscape of Quantum Computing 1797.5 Generative AI: Understanding the Technology 1827.6 Quantum-Inspired Generative AI 1837.7 Synergies and Challenges 1847.8 Applications and Future Prospects 1857.9 Case Studies and Success Stories 1867.10 Result 1877.11 Conclusion 190References 1918 Blockchain-Enabled Smart City Solutions: Exploring the Technology’s Evolution and Applications 195Pratiksh Lalitbhai Khakhariya, Sushil Kumar Singh, Ravikumar R. N. and Deepak Kumar Verma8.1 Introduction 1968.2 Related Work 1988.2.1 Preliminaries 1998.2.1.1 Smart Cities 1998.2.1.2 Blockchain Technology 2008.2.1.3 IoT Technology and Architecture 2028.3 Blockchain-Based Secure Architecture for IoT-Enabled Smart Cities 2068.3.1 Overview of IoT-Enabled Smart Cities Using Blockchain Technology 2068.3.2 Security Issues and Solutions 2128.4 Open Research Challenges and Future Directions 2138.4.1 Open Research Challenges 2148.4.2 Future Directions 2158.5 Conclusion 220Acknowledgment 220References 220Contents xi9 Human-Centric Security: The Role of Generative AI in User Behavior Analysis 227Sunil Sharma, Priyajit Dash, Bhupendra Soni and Yashwant Singh Rawal9.1 Introduction to Human-Centric Security and Generative AI 2289.1.1 Human-Centric Security: An Evolving Paradigm 2289.1.1.1 The Role of Generative AI 2289.1.1.2 The Evolution of AI in Security 2299.1.1.3 What is Generative AI 2299.1.1.4 Benefits of Generative AI in Security 2299.1.1.5 Applications of Generative AI in Security 2309.2 Importance of User Behavior Analysis 2319.2.1 Enhancing Security through Behavioral Insights 2319.2.2 Supporting Fraud Detection and Prevention 2329.2.3 Improving User Authentication 2329.2.4 Enhancing User Experience and Trust 2339.2.5 Enabling Proactive Security Measures 2339.3 Behavioral Biometrics Enhanced by Generative AI 2349.3.1 Introduction to Behavioral Biometrics 2349.3.2 Fundamental Principles of Behavioral Biometrics 2349.3.3 Integrating Generative AI with Behavioral Biometrics 2369.3.4 Enhancing Accuracy and Reliability 2369.4 Formulating User-Centric Security Policies 2379.4.1 Challenges in Policy Formulation 2389.4.2 AI’s Role in Policy Adaptation and Implementation 2399.4.3 Ethical Considerations and User Privacy 2419.5 Human-AI Collaboration in Security Frameworks 2429.5.1 Key Components of Human-AI Collaboration 2429.5.2 Models of Human-AI Interaction 2439.5.3 Experimental Workflow and Findings 2449.6 Future Trends in Collaborative Security 2479.7 Challenges and Future Directions 2489.7.1 Technical Challenges 2499.7.2 Anticipating Future Threat Landscapes 2509.7.3 Human-AI Collaborative Defense 2529.8 Conclusion 253References 25310 Human Centric Security: Human Behavior Analysis Based on GenAI 257P. Muralidhar, Ch. Raja Ramesh, V. K. S. K. Sai Vadapalli and Bh. Lakshmi Madhuri10.1 Introduction 25810.2 Model of ChatGPT 25910.3 Human Interaction with ChatGPT 26110.4 Impact of GAI in Cyber Security 26210.5 Attacks Enhanced by GAI 26310.6 Replicate Version of ChatGPT 26510.6.1 Vulnerabilities of GAI Models 26510.6.2 Road Map of GAI in Cybersecurity and Privacy 26610.7 Enhancement of Destructions with ChatGPT 27110.8 Protection Measures Using GAI Models 27410.8.1 Cyber Security Reporting 27410.8.2 Generating Secure Code Using ChatGPT 27410.8.3 Detection the Cyber Attacks 27410.8.4 Improving Ethical Guidelines 27410.9 GAI Tools to Boost Security 27510.10 Future Trends and Challenges 27610.11 Conclusion 277References 27711 Machine Learning-Based Malicious Web Page Detection Using Generative AI 281Ashwini Kumar, Harikesh Singh, Mayank Singh and Vimal Gupta11.1 Introduction 28211.1.1 Background and Motivation 28211.1.2 Threat Landscape: Rise of Malicious Web Pages 28411.1.3 Role of ML and GenAI in Cybersecurity 28511.1.4 Objectives of the Chapter 28611.2 Related Work 28711.2.1 Signature-Based Detection Systems 28711.2.2 Heuristic and Rule-Based Techniques 28811.2.3 Traditional ML Approaches: SVM, Decision Trees, Random Forests 28811.2.4 Deep Learning for Web Page Classification 28911.2.5 Recent Advances in GenAI for Cybersecurity 29011.2.6 Comparative Analysis of Approaches 29111.3 Methodology 29211.3.1 Data Collection and Preprocessing 29211.3.2 Feature Engineering 29211.3.3 Machine Learning Models 29311.3.4 Integrating Generative AI 29311.3.5 Hybrid Detection Architecture 29311.4 Experimental Evaluation 29411.4.1 Datasets 29411.4.2 Preprocessing and Feature Extraction 29411.4.3 Experimental Setup 29511.4.4 Evaluation Metrics 29611.4.5 Results 29611.5 Challenges and Limitations 29711.5.1 Evasion Techniques and Obfuscation 29811.5.2 Data Quality and Labeling 29811.5.3 Generalization and Domain Adaptation 29811.5.4 Dual-Use Nature of Generative AI 29911.5.5 Explainability and Interpretability 29911.6 Conclusion 30011.7 Future Directions 30011.7.1 Adaptive and Continual Learning 30111.7.2 Multi-Modal Threat Analysis 30111.7.3 Explainable AI (XAI) in Detection Pipelines 30111.7.4 Federated and Privacy-Preserving Learning 30211.7.5 Responsible Use of Generative AI 302References 30212 A Comprehensive Survey of the 6G Network Technologies: Challenges, Possible Attacks, and Future Research 305Riddhi V. Harsora, Sushil Kumar Singh, Ravikumar R. N., Deepak Kumar Verma and Santosh Kumar Srivastava12.1 Introduction 30612.2 Related Work 30812.2.1 6G Necessities 31012.2.1.1 Virtualization Security Solution 31012.2.1.2 Automated Management System 31112.2.1.3 Users’ Privacy-Preservation 31112.2.1.4 Data Security Using AI 31112.2.1.5 Post-Quantum Cryptography 31112.2.1.6 Security Issues and Solutions 31212.2.1.7 Low-Latency Communication 31212.2.1.8 Terahertz Communication 31412.2.1.9 Quantum-Safe Encryption 31412.2.1.10 Privacy-Preserving Techniques 31412.2.1.11 Reliability and Resilience 31512.2.1.12 Authentication and Authorization 31512.2.1.13 AI-Driven Network Optimization 31512.2.1.14 Malware and Cyber Attacks 31512.3 6G Security: Possible Attacks and Solutions on Emerging Technologies 31612.3.1 Physical Layer Security 31612.3.1.1 Visible Light Communication Technology 31712.3.1.2 Terahertz Technology 31812.3.1.3 Molecular Communication 32012.3.2 ABC Security 32112.3.2.1 Artificial Intelligence 32212.3.2.2 Blockchain 32412.3.2.3 Quantum Communication 32612.4 6G Survey Scenario and Future Scope 32712.4.1 6G Survey Scenario 32712.4.2 6G Future Scope 32812.5 Conclusion 329Acknowledgment 330References 33013 RDE-GAI-IDS: Real-Time Distributed Ensemble and Generative-AI-Based Intrusion Detection System to Detect Threats in Edge Computing Networks 335Amit Kumar, Vivek Kumar, Manoj Kumar Mahto and Abhay Pratap Singh Bhadauria13.1 Introduction 33613.2 Related Work 33813.3 Proposed Methodology 34013.3.1 Dataset Description 34113.3.2 Data Integration 34113.3.3 Data Pre-Processing (DP) 34213.3.4 Remove Missing and Infinite Feature Values 34213.3.5 Data Normalization 34213.3.6 Feature Selection 34313.3.7 Generative Artificial Intelligence (GAI) 34313.4 Constructing the Model 34813.4.1 RF Algorithm 34813.4.2 DT Algorithm 34913.4.3 ET Algorithm 34913.4.4 KNN Algorithm 34913.4.5 Training and Testing 35113.5 Experimental Results & Discussion 35113.5.1 Performance Evaluation Criteria 35113.5.2 Comparison with Previous Methods 35313.6 Conclusion 356References 35614 Leveraging Generative AI for Advanced Threat Detection in Cybersecurity 359Anuradha Reddy, Mamatha Kurra, G. S. Pradeep Ghantasala and Pellakuri Vidyullatha14.1 Introduction 36014.2 Purpose 36114.3 Scope 36214.4 History 36314.5 Applications in Industry 36714.6 Applications in Defense 36914.6.1 Leveraging Generative AI for Advanced Threat Detection in Cybersecurity in Banking 37014.6.2 Leveraging Generative AI for Advanced Threat Detection in Cybersecurity in Military Applications 37214.6.3 Leveraging Generative AI for Advanced Threat Detection in Cybersecurity in Health Care Applications 37414.7 Challenges and Considerations 37614.7.1 Future Trends and Directions 37814.8 Conclusion 381References 38215 Quantum Computing and Generative AI-Securing the Future of Information 383Deeya Shalya, Rimon Ranjit Das and Gurpreet Kaur15.1 Introduction 38415.2 Generative AI-Enabled Intelligent Resource Allocation for Quantum Computing Networks 38815.3 The Synergy of Two Worlds: Bridging Classical and Quantum Computing in Hybrid Quantum-Classical Machine Learning Models 39115.3.1 The Collaborative Approach 39315.3.2 Real-World Application 39315.4 Generative AI in Medical Practice: Privacy and Security Challenges 39415.4.1 Introduction 39415.5 Quantum Machine Learning 39815.5.1 Background 39815.5.2 Complexity 40215.6 qGAN-Quantum Generative Adversarial Network 40415.6.1 Linear-Algebra Based Quantum Machine Learning 40515.6.1.1 Quantum Principal Component Analysis 40615.6.1.2 Quantum Support Vector Machines and Kernel Methods 40715.6.1.3 qBLAS Based Optimization 40815.6.1.4 NT Angled Datasets for Quantum Machine Learning 41015.6.2 Reading Classical Data into Quantum Machines 41115.6.3 Deep Quantum Learning 41215.6.4 Quantum Machine Learning for Quantum Data 41415.7 The Impact of the NISQ Era on Quantum Computing and Generative AI 41515.7.1 Quantum Machine Learning in the NISQ Era 41715.7.2 Quantum Convolution Neural Network 41915.8 Conclusion and Future Scope 42015.8.1 Challenges in Resource Allocation for Quantum Computing Networks 42115.8.2 Barren Plateaus 422Acknowledgements 424References 425Bibliography 42816 Redefining Security: Significance of Generative AI and Difficulties of Conventional Encryption 431R. Nandhini, Gaurab Mudbhari and S. Prince Sahaya Brighty16.1 Introduction 43216.1.1 Encryption’s Significance in Cybersecurity 43316.2 Traditional Encryption Techniques 43416.2.1 Different Encryption Method Types 43416.2.1.1 Symmetric Encryption 43516.2.1.2 Asymmetric Encryption 43516.2.1.3 Hash Functions 43516.2.2 Challenges and Limitations of Conventional Encryption 43616.2.2.1 Brute-Force Attacks 43616.2.2.2 Issue in Key Management 43616.2.2.3 Blind Spots in Anomaly Detection 43616.3 Introduction to Generative AI 43716.3.1 Unimodal (CV & NLP) 43716.3.2 Combining Different Modes—Visual and Linguistic 43816.3.3 The Potential of Generative AI for Data Simulation 43916.3.3.1 Beneficial Patterns in the Data 44016.3.3.2 User Behavior Modeling 44016.4 Applications of Generative AI in Cybersecurity 44016.4.1 Deceptive Honeypots 44116.4.2 Dynamic Defense Systems 44116.4.3 An Application of Generative AI in E-Commerce Platforms and to Update Its Adaptive Data Systems 44216.4.4 Adaptive Data System Updates 44216.4.5 Predictive Threat Identification 44216.4.6 Behavioral Biometrics for Anomaly Detection 44216.4.7 Enhanced User Authentication Systems 44316.5 Problems in Implementing Generative AI 44316.5.1 Algorithm Fairness and Bias 44316.5.2 Ensuring Equitable AI Decisions 44416.5.3 Taking on Malevolent AI Models 44416.5.4 Technical Resource Demands for Generative AI 44516.6 Combining Generative AI with Traditional Methods 44516.6.1 Hybrid Security Models 44616.7 Emerging Trends in AI and Security: A Double-Edged Sword 44616.7.1 AI-Powered Attacks 44616.7.1.1 AI in Defense: Strengthening the Cybersecurity Barrier 44616.7.1.2 Explainable AI (XAI): Establishing Transparency and Trust 44716.7.1.3 Generative AI: A Powerful Tool with Potential Risks 44716.8 Conclusion 447References 448Index 453
Du kanske också är intresserad av
Smart Agritech
Santosh Kumar Srivastava, Durgesh Srivastava, Korhan Cengiz, Pramod Gaur, India) Srivastava, Santosh Kumar (Galgotias University, India) Srivastava, Durgesh (Chitkara University, Turkey) Cengiz, Korhan (Istinye University, Istanbul, UAE) Gaur, Pramod (Birla Institute of Technology & Science, Pilani - Dubai
3 699 kr
Intelligent Internet of Things for Smart Healthcare Systems
Durgesh Srivastava, Neha Sharma, Deepak Sinwar, Jabar H. Yousif, Hari Prabhat Gupta, Punjab) Srivastava, Durgesh (Chitkara University, India) Sharma, Neha (Chandigarh University, Punjab, India) Sinwar, Deepak (Manipal University Jaipur, Oman) Yousif, Jabar H. (Sohar University, India) Gupta, Hari Prabhat (IIT (BHU) Varanasi
809 kr