Artificial Intelligence in Cyber Security: Impact and Implications Security Challenges, Technical and Ethical Issues, Forensic Investigative Challenges

Gespeichert in:
Bibliographische Detailangaben
Weitere Verfasser: Montasari, Reza (HerausgeberIn), Jahankhani, Hamid (HerausgeberIn)
Format: Elektronisch E-Book
Sprache:English
Veröffentlicht: Cham Springer International Publishing 2021
Cham Springer
Ausgabe:1st ed. 2021
Schriftenreihe:Advanced Sciences and Technologies for Security Applications
Schlagworte:
Online-Zugang:DE-634
DE-858
DE-Aug4
DE-1050
DE-573
DE-M347
DE-92
DE-898
DE-860
DE-861
DE-863
DE-862
DE-523
DE-384
DE-473
DE-19
DE-703
DE-20
DE-706
DE-29
DE-739
DE-355
URL des Erstveröffentlichers
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!

MARC

LEADER 00000nam a2200000zcb4500
001 BV047635593
003 DE-604
005 00000000000000.0
007 cr|uuu---uuuuu
008 211213s2021 xx o|||| 00||| eng d
020 |a 9783030880408  |c Online  |9 978-3-030-88040-8 
024 7 |a 10.1007/978-3-030-88040-8  |2 doi 
035 |a (ZDB-2-SCS)9783030880408 
035 |a (OCoLC)1289760405 
035 |a (DE-599)BVBBV047635593 
040 |a DE-604  |b ger  |e rda 
041 0 |a eng 
049 |a DE-860  |a DE-19  |a DE-858  |a DE-Aug4  |a DE-898  |a DE-861  |a DE-188  |a DE-523  |a DE-473  |a DE-29  |a DE-863  |a DE-1050  |a DE-20  |a DE-862  |a DE-92  |a DE-384  |a DE-573  |a DE-M347  |a DE-703  |a DE-706  |a DE-739  |a DE-634  |a DE-355 
082 0 |a 005.8  |2 23 
245 1 0 |a Artificial Intelligence in Cyber Security: Impact and Implications  |b Security Challenges, Technical and Ethical Issues, Forensic Investigative Challenges  |c edited by Reza Montasari, Hamid Jahankhani 
250 |a 1st ed. 2021 
264 1 |a Cham  |b Springer International Publishing  |c 2021 
264 1 |a Cham  |b Springer 
300 |a 1 Online-Ressource (VI, 306 p. 99 illus., 81 illus. in color) 
336 |b txt  |2 rdacontent 
337 |b c  |2 rdamedia 
338 |b cr  |2 rdacarrier 
490 0 |a Advanced Sciences and Technologies for Security Applications  |x 2363-9466 
650 4 |a Systems and Data Security 
650 4 |a Artificial Intelligence 
650 4 |a Security Science and Technology 
650 4 |a Ethics 
650 4 |a Computer security 
650 4 |a Artificial intelligence 
650 4 |a System safety 
650 4 |a Ethics 
700 1 |a Montasari, Reza  |4 edt 
700 1 |a Jahankhani, Hamid  |4 edt 
776 0 8 |i Erscheint auch als  |n Druck-Ausgabe  |z 978-3-030-88039-2 
776 0 8 |i Erscheint auch als  |n Druck-Ausgabe  |z 978-3-030-88041-5 
776 0 8 |i Erscheint auch als  |n Druck-Ausgabe  |z 978-3-030-88042-2 
856 4 0 |u https://doi.org/10.1007/978-3-030-88040-8  |x Verlag  |z URL des Erstveröffentlichers  |3 Volltext 
912 |a ZDB-2-SCS 
940 1 |q ZDB-2-SCS_2021 
943 1 |a oai:aleph.bib-bvb.de:BVB01-033019888 
966 e |u https://doi.org/10.1007/978-3-030-88040-8  |l DE-634  |p ZDB-2-SCS  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-030-88040-8  |l DE-858  |p ZDB-2-SCS  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-030-88040-8  |l DE-Aug4  |p ZDB-2-SCS  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-030-88040-8  |l DE-1050  |p ZDB-2-SCS  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-030-88040-8  |l DE-573  |p ZDB-2-SCS  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-030-88040-8  |l DE-M347  |p ZDB-2-SCS  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-030-88040-8  |l DE-92  |p ZDB-2-SCS  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-030-88040-8  |l DE-898  |p ZDB-2-SCS  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-030-88040-8  |l DE-860  |p ZDB-2-SCS  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-030-88040-8  |l DE-861  |p ZDB-2-SCS  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-030-88040-8  |l DE-863  |p ZDB-2-SCS  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-030-88040-8  |l DE-862  |p ZDB-2-SCS  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-030-88040-8  |l DE-523  |p ZDB-2-SCS  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-030-88040-8  |l DE-384  |p ZDB-2-SCS  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-030-88040-8  |l DE-473  |p ZDB-2-SCS  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-030-88040-8  |l DE-19  |p ZDB-2-SCS  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-030-88040-8  |l DE-703  |p ZDB-2-SCS  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-030-88040-8  |l DE-20  |p ZDB-2-SCS  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-030-88040-8  |l DE-706  |p ZDB-2-SCS  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-030-88040-8  |l DE-29  |p ZDB-2-SCS  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-030-88040-8  |l DE-739  |p ZDB-2-SCS  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-030-88040-8  |l DE-355  |p ZDB-2-SCS  |x Verlag  |3 Volltext 

Datensatz im Suchindex

_version_ 1819311790445559808
any_adam_object
author2 Montasari, Reza
Jahankhani, Hamid
author2_role edt
edt
author2_variant r m rm
h j hj
author_facet Montasari, Reza
Jahankhani, Hamid
building Verbundindex
bvnumber BV047635593
collection ZDB-2-SCS
ctrlnum (ZDB-2-SCS)9783030880408
(OCoLC)1289760405
(DE-599)BVBBV047635593
dewey-full 005.8
dewey-hundreds 000 - Computer science, information, general works
dewey-ones 005 - Computer programming, programs, data, security
dewey-raw 005.8
dewey-search 005.8
dewey-sort 15.8
dewey-tens 000 - Computer science, information, general works
discipline Informatik
doi_str_mv 10.1007/978-3-030-88040-8
edition 1st ed. 2021
format Electronic
eBook
fullrecord <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>04134nam a2200769zcb4500</leader><controlfield tag="001">BV047635593</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">211213s2021 xx o|||| 00||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783030880408</subfield><subfield code="c">Online</subfield><subfield code="9">978-3-030-88040-8</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1007/978-3-030-88040-8</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-2-SCS)9783030880408</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1289760405</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV047635593</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-860</subfield><subfield code="a">DE-19</subfield><subfield code="a">DE-858</subfield><subfield code="a">DE-Aug4</subfield><subfield code="a">DE-898</subfield><subfield code="a">DE-861</subfield><subfield code="a">DE-188</subfield><subfield code="a">DE-523</subfield><subfield code="a">DE-473</subfield><subfield code="a">DE-29</subfield><subfield code="a">DE-863</subfield><subfield code="a">DE-1050</subfield><subfield code="a">DE-20</subfield><subfield code="a">DE-862</subfield><subfield code="a">DE-92</subfield><subfield code="a">DE-384</subfield><subfield code="a">DE-573</subfield><subfield code="a">DE-M347</subfield><subfield code="a">DE-703</subfield><subfield code="a">DE-706</subfield><subfield code="a">DE-739</subfield><subfield code="a">DE-634</subfield><subfield code="a">DE-355</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Artificial Intelligence in Cyber Security: Impact and Implications</subfield><subfield code="b">Security Challenges, Technical and Ethical Issues, Forensic Investigative Challenges</subfield><subfield code="c">edited by Reza Montasari, Hamid Jahankhani</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">1st ed. 2021</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Cham</subfield><subfield code="b">Springer International Publishing</subfield><subfield code="c">2021</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Cham</subfield><subfield code="b">Springer</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (VI, 306 p. 99 illus., 81 illus. in color)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">Advanced Sciences and Technologies for Security Applications</subfield><subfield code="x">2363-9466</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Systems and Data Security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Artificial Intelligence</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Security Science and Technology</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Ethics</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Artificial intelligence</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">System safety</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Ethics</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Montasari, Reza</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Jahankhani, Hamid</subfield><subfield code="4">edt</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">978-3-030-88039-2</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">978-3-030-88041-5</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">978-3-030-88042-2</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1007/978-3-030-88040-8</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Erstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-2-SCS</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">ZDB-2-SCS_2021</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-033019888</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-030-88040-8</subfield><subfield code="l">DE-634</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-030-88040-8</subfield><subfield code="l">DE-858</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-030-88040-8</subfield><subfield code="l">DE-Aug4</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-030-88040-8</subfield><subfield code="l">DE-1050</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-030-88040-8</subfield><subfield code="l">DE-573</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-030-88040-8</subfield><subfield code="l">DE-M347</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-030-88040-8</subfield><subfield code="l">DE-92</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-030-88040-8</subfield><subfield code="l">DE-898</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-030-88040-8</subfield><subfield code="l">DE-860</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-030-88040-8</subfield><subfield code="l">DE-861</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-030-88040-8</subfield><subfield code="l">DE-863</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-030-88040-8</subfield><subfield code="l">DE-862</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-030-88040-8</subfield><subfield code="l">DE-523</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-030-88040-8</subfield><subfield code="l">DE-384</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-030-88040-8</subfield><subfield code="l">DE-473</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-030-88040-8</subfield><subfield code="l">DE-19</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-030-88040-8</subfield><subfield code="l">DE-703</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-030-88040-8</subfield><subfield code="l">DE-20</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-030-88040-8</subfield><subfield code="l">DE-706</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-030-88040-8</subfield><subfield code="l">DE-29</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-030-88040-8</subfield><subfield code="l">DE-739</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-030-88040-8</subfield><subfield code="l">DE-355</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection>
id DE-604.BV047635593
illustrated Not Illustrated
indexdate 2024-12-24T09:02:04Z
institution BVB
isbn 9783030880408
issn 2363-9466
language English
oai_aleph_id oai:aleph.bib-bvb.de:BVB01-033019888
oclc_num 1289760405
open_access_boolean
owner DE-860
DE-19
DE-BY-UBM
DE-858
DE-Aug4
DE-898
DE-BY-UBR
DE-861
DE-188
DE-523
DE-473
DE-BY-UBG
DE-29
DE-863
DE-BY-FWS
DE-1050
DE-20
DE-862
DE-BY-FWS
DE-92
DE-384
DE-573
DE-M347
DE-703
DE-706
DE-739
DE-634
DE-355
DE-BY-UBR
owner_facet DE-860
DE-19
DE-BY-UBM
DE-858
DE-Aug4
DE-898
DE-BY-UBR
DE-861
DE-188
DE-523
DE-473
DE-BY-UBG
DE-29
DE-863
DE-BY-FWS
DE-1050
DE-20
DE-862
DE-BY-FWS
DE-92
DE-384
DE-573
DE-M347
DE-703
DE-706
DE-739
DE-634
DE-355
DE-BY-UBR
physical 1 Online-Ressource (VI, 306 p. 99 illus., 81 illus. in color)
psigel ZDB-2-SCS
ZDB-2-SCS_2021
publishDate 2021
publishDateSearch 2021
publishDateSort 2021
publisher Springer International Publishing
Springer
record_format marc
series2 Advanced Sciences and Technologies for Security Applications
spelling Artificial Intelligence in Cyber Security: Impact and Implications Security Challenges, Technical and Ethical Issues, Forensic Investigative Challenges edited by Reza Montasari, Hamid Jahankhani
1st ed. 2021
Cham Springer International Publishing 2021
Cham Springer
1 Online-Ressource (VI, 306 p. 99 illus., 81 illus. in color)
txt rdacontent
c rdamedia
cr rdacarrier
Advanced Sciences and Technologies for Security Applications 2363-9466
Systems and Data Security
Artificial Intelligence
Security Science and Technology
Ethics
Computer security
Artificial intelligence
System safety
Montasari, Reza edt
Jahankhani, Hamid edt
Erscheint auch als Druck-Ausgabe 978-3-030-88039-2
Erscheint auch als Druck-Ausgabe 978-3-030-88041-5
Erscheint auch als Druck-Ausgabe 978-3-030-88042-2
https://doi.org/10.1007/978-3-030-88040-8 Verlag URL des Erstveröffentlichers Volltext
spellingShingle Artificial Intelligence in Cyber Security: Impact and Implications Security Challenges, Technical and Ethical Issues, Forensic Investigative Challenges
Systems and Data Security
Artificial Intelligence
Security Science and Technology
Ethics
Computer security
Artificial intelligence
System safety
title Artificial Intelligence in Cyber Security: Impact and Implications Security Challenges, Technical and Ethical Issues, Forensic Investigative Challenges
title_auth Artificial Intelligence in Cyber Security: Impact and Implications Security Challenges, Technical and Ethical Issues, Forensic Investigative Challenges
title_exact_search Artificial Intelligence in Cyber Security: Impact and Implications Security Challenges, Technical and Ethical Issues, Forensic Investigative Challenges
title_full Artificial Intelligence in Cyber Security: Impact and Implications Security Challenges, Technical and Ethical Issues, Forensic Investigative Challenges edited by Reza Montasari, Hamid Jahankhani
title_fullStr Artificial Intelligence in Cyber Security: Impact and Implications Security Challenges, Technical and Ethical Issues, Forensic Investigative Challenges edited by Reza Montasari, Hamid Jahankhani
title_full_unstemmed Artificial Intelligence in Cyber Security: Impact and Implications Security Challenges, Technical and Ethical Issues, Forensic Investigative Challenges edited by Reza Montasari, Hamid Jahankhani
title_short Artificial Intelligence in Cyber Security: Impact and Implications
title_sort artificial intelligence in cyber security impact and implications security challenges technical and ethical issues forensic investigative challenges
title_sub Security Challenges, Technical and Ethical Issues, Forensic Investigative Challenges
topic Systems and Data Security
Artificial Intelligence
Security Science and Technology
Ethics
Computer security
Artificial intelligence
System safety
topic_facet Systems and Data Security
Artificial Intelligence
Security Science and Technology
Ethics
Computer security
Artificial intelligence
System safety
url https://doi.org/10.1007/978-3-030-88040-8
work_keys_str_mv AT montasarireza artificialintelligenceincybersecurityimpactandimplicationssecuritychallengestechnicalandethicalissuesforensicinvestigativechallenges
AT jahankhanihamid artificialintelligenceincybersecurityimpactandimplicationssecuritychallengestechnicalandethicalissuesforensicinvestigativechallenges