Part 3: Applications of AI in Cybersecurity
After providing a strong theoretical background in the previous part, this part gives you more practical skills by dedicating chapters to concrete scenarios in cybersecurity and providing examples with coding exercises. This part equips you with ideas and implementation expertise that you can use in your organization. We are provided with a wide range of cybersecurity applications, from malware and network intrusion detection to fraud, phishing, and spam detection, as well as defending industrial control systems. We include a dedicated chapter on LLMs, a growing field in AI, highlighting their applications in cybersecurity.
This part has the following chapters:
- Chapter 7, Malware and Network Intrusion Detection and Analysis
- Chapter 8, User and Entity Behavior Analysis
- Chapter 9, Fraud, Spam, and Phishing Detection
- Chapter 10, User Authentication and Access Control
- Chapter 11, Threat Intelligence
- Chapter 12,...