Examining Cybersecurity Risks Produced by Generative AI
Book 1
Book 2
Book 3
Book 1
Book 2
Book 3
Book 1
Book 2
Book 3
Book 1
Book 2
Book 3
Home > Computing and Information Technology > Computer networking and communications > Network security > Examining Cybersecurity Risks Produced by Generative AI
Examining Cybersecurity Risks Produced by Generative AI

Examining Cybersecurity Risks Produced by Generative AI


     0     
5
4
3
2
1



International Edition


X
About the Book

As generative artificial intelligence (AI) evolves, it introduces new opportunities across industries, from content creation to problem-solving. However, with these advancements come significant cybersecurity risks that demand closer scrutiny. Generative AI, capable of producing text, images, code, and deepfakes, presents challenges in cybersecurity. Malicious scammers could leverage these technologies to automate cyberattacks, create sophisticated phishing schemes, or bypass traditional security systems with efficiency. This intersection of cutting-edge AI and cybersecurity concerns requires new organizational safeguards for digital environments, highlighting the need for new protocols, regulations, and proactive defense mechanisms to mitigate potential threats. Examining Cybersecurity Risks Produced by Generative AI addresses the intersections of generative AI with cybersecurity, presenting its applications, potential risks, and security frameworks designed to harness its benefits while mitigating challenges. It provides a comprehensive, up-to-date resource on integrating generative models into cybersecurity practice and research. This book covers topics such as deepfakes, smart cities, and phishing attacks, and is a useful resource for computer engineers, security professionals, business owners, policymakers, academicians, researchers, and data scientists.

About the Author :
Ammar Almomani is an Internet Infrastructures Security and Cybersecurity based on AI specialist with a Ph.D. Degree in Computer Science from Universiti Sains Malaysia (USM), which is ranked #142 in the QS World University Rankings 2021. He is recognized as One of the Top 2% of Global Influential Researchers by Stanford University and the Scopus Index-Oct-2023. His academic background also includes a Master of Science in Computer Information Systems and a Bachelor of Computer Science. He has an extensive publication record, with over 113+ articles published in reputable journals and conferences, most of them in Scopus Q1 and Q2 categories, and 8 patents and utility models published as six German utility models and Two India-grated patents. More than 21 articles and patents are under revision. He has significant experience in 20 years of teaching more than 42 topics with various subjects related to cybersecurity and Cybersecurity Engineering area such as “Network Security, Wireless Computer Networks security, Cryptography, Cloud computing, and security special topics (Ethical hacking) Enterprises Information System Security, Big data analytics, artificial intelligence, cybersecurity, networks, communications, and programming languages. with many international certificates. He taught at reputable 5 academic institutions, Supervising many undergraduate and postgraduate students' research projects and theses (Masters/Ph.D.) from many countries such as the UK, Malaysia, Jordan ..etc. As a cybersecurity and Internet infrastructure security specialist, he actively contributed to the field by managing AI and cybersecurity projects with international teams of top researchers and universities. He has authored 76 Scopus articles, H-index-20, 1380 citations, and garnered over 2,762 citations on Google Scholar, with an H-index of 27. Also he actively engaged in the academic community, with a strong online presence and a large readership and following on ResearchGate with about 89390 readers and followers. Currently working at Faculty - Computer Information Science, Higher Colleges of Technology, Sharjah, UAE. He has Five years of management experience with a UAE Golden Visa Holder, and my focus is on improving educational institutes. Moreover, he has made significant contributions to the development of courses and programs, including ABET and AACSB Accreditation Dr. Mohammad Alauthman (contacted at email: mohammad.alauthman@uop.edu.jo) is an associate professor and chair of the Information Security Department at the Faculty of Information Technology, University of Petra inAmman, Jordan. His research interests lie in network security, intrusion detection systems,and the application of artificial intelligence techniques like machine learning and deep learning for botnet detection, DDoS detection, spam email filtering, IoT security, and network traffic classification. He obtained his Ph.D. in computer science with a focus on network security from Northumbria University in the UK in 2016. Alauthman has been awarded several research grants in the field of network security, supporting his work on advanced intrusion detection systems and the development of AI-driven security solutions. These grants have enabled him to conduct extensive research and collaborate with international experts. His funded projects have focused on enhancing the resilience of network infrastructures against emerging threats and improving the accuracy of threat detection mechanisms.


Best Sellers


Product Details
  • ISBN-13: 9798337308333
  • Publisher: IGI Global
  • Publisher Imprint: IGI Global
  • Height: 279 mm
  • No of Pages: 702
  • ISBN-10: 8337308338
  • Publisher Date: 01 May 2025
  • Binding: Paperback
  • Language: English
  • Width: 216 mm


Similar Products

Add Photo
Add Photo

Customer Reviews

REVIEWS      0     
Click Here To Be The First to Review this Product
Examining Cybersecurity Risks Produced by Generative AI
IGI Global -
Examining Cybersecurity Risks Produced by Generative AI
Writing guidlines
We want to publish your review, so please:
  • keep your review on the product. Review's that defame author's character will be rejected.
  • Keep your review focused on the product.
  • Avoid writing about customer service. contact us instead if you have issue requiring immediate attention.
  • Refrain from mentioning competitors or the specific price you paid for the product.
  • Do not include any personally identifiable information, such as full names.

Examining Cybersecurity Risks Produced by Generative AI

Required fields are marked with *

Review Title*
Review
    Add Photo Add up to 6 photos
    Would you recommend this product to a friend?
    Tag this Book Read more
    Does your review contain spoilers?
    What type of reader best describes you?
    I agree to the terms & conditions
    You may receive emails regarding this submission. Any emails will include the ability to opt-out of future communications.

    CUSTOMER RATINGS AND REVIEWS AND QUESTIONS AND ANSWERS TERMS OF USE

    These Terms of Use govern your conduct associated with the Customer Ratings and Reviews and/or Questions and Answers service offered by Bookswagon (the "CRR Service").


    By submitting any content to Bookswagon, you guarantee that:
    • You are the sole author and owner of the intellectual property rights in the content;
    • All "moral rights" that you may have in such content have been voluntarily waived by you;
    • All content that you post is accurate;
    • You are at least 13 years old;
    • Use of the content you supply does not violate these Terms of Use and will not cause injury to any person or entity.
    You further agree that you may not submit any content:
    • That is known by you to be false, inaccurate or misleading;
    • That infringes any third party's copyright, patent, trademark, trade secret or other proprietary rights or rights of publicity or privacy;
    • That violates any law, statute, ordinance or regulation (including, but not limited to, those governing, consumer protection, unfair competition, anti-discrimination or false advertising);
    • That is, or may reasonably be considered to be, defamatory, libelous, hateful, racially or religiously biased or offensive, unlawfully threatening or unlawfully harassing to any individual, partnership or corporation;
    • For which you were compensated or granted any consideration by any unapproved third party;
    • That includes any information that references other websites, addresses, email addresses, contact information or phone numbers;
    • That contains any computer viruses, worms or other potentially damaging computer programs or files.
    You agree to indemnify and hold Bookswagon (and its officers, directors, agents, subsidiaries, joint ventures, employees and third-party service providers, including but not limited to Bazaarvoice, Inc.), harmless from all claims, demands, and damages (actual and consequential) of every kind and nature, known and unknown including reasonable attorneys' fees, arising out of a breach of your representations and warranties set forth above, or your violation of any law or the rights of a third party.


    For any content that you submit, you grant Bookswagon a perpetual, irrevocable, royalty-free, transferable right and license to use, copy, modify, delete in its entirety, adapt, publish, translate, create derivative works from and/or sell, transfer, and/or distribute such content and/or incorporate such content into any form, medium or technology throughout the world without compensation to you. Additionally,  Bookswagon may transfer or share any personal information that you submit with its third-party service providers, including but not limited to Bazaarvoice, Inc. in accordance with  Privacy Policy


    All content that you submit may be used at Bookswagon's sole discretion. Bookswagon reserves the right to change, condense, withhold publication, remove or delete any content on Bookswagon's website that Bookswagon deems, in its sole discretion, to violate the content guidelines or any other provision of these Terms of Use.  Bookswagon does not guarantee that you will have any recourse through Bookswagon to edit or delete any content you have submitted. Ratings and written comments are generally posted within two to four business days. However, Bookswagon reserves the right to remove or to refuse to post any submission to the extent authorized by law. You acknowledge that you, not Bookswagon, are responsible for the contents of your submission. None of the content that you submit shall be subject to any obligation of confidence on the part of Bookswagon, its agents, subsidiaries, affiliates, partners or third party service providers (including but not limited to Bazaarvoice, Inc.)and their respective directors, officers and employees.

    Accept

    Fresh on the Shelf


    Inspired by your browsing history


    Your review has been submitted!

    You've already reviewed this product!