Advances in information security, privacy, and ethics book series,
Journal Year:
2024,
Volume and Issue:
unknown, P. 411 - 464
Published: July 26, 2024
The
chapter
discusses
how
ethics
and
transparency
relate
to
creating
secure
web
models
for
AI.
AI
plays
a
role
in
development,
the
authors
consider
as
two
critical
aspects
of
this
subject,
which
influences
users,
stakeholders,
or
society.
examination
begins
with
principles,
include
fairness,
accountability,
privacy
requirements.
They
then
get
into
problems
models.
In
chapter,
they
break
down
bias
fairness
concerns
at
source
find
ways
resolve
them
This
relates
trust
where
explainability
are
highlighted.
also
provide
case
studies
showing
effectiveness
transparent
explainable
increasing
user
engagement.
delve
decision-making
frameworks
help
navigate
ethical
dilemmas
development.
It
represents
conversation
on
atmospherics
empowerment
tools,
such
monitoring
evaluation
guidelines
mobilisation
implementation
practice
governance.
To
sum
up,
underline
views
us
do
AI-driven
Therefore,
urge
all
stakeholders
make
cornerstones
responsible
webs.
Advances in information security, privacy, and ethics book series,
Journal Year:
2025,
Volume and Issue:
unknown, P. 347 - 368
Published: Feb. 14, 2025
Since
the
invention
of
Internet
Things
(IoT),
people
are
seeing
a
new
world
in
healthcare.
The
rapid
growth
IoT
has
brought
with
it
solutions
to
dilemmas
and
few
challenges
cloud
devices.
But
keeping
mind
benefits
these
devices,
need
be
solved
efficiency
security.
Putting
place
storage
analysis
for
specific
periods
is
very
popular
medicine.
On
other
hand,
creating
big
data,
considering
sensitivity,
some
limitations
have
accepted.
use
latency,
throughput,
bandwidth
increases
cost
Internet.
Numerous
alternative
paradigms,
most
notably
edge
computing
fog
computing,
evolved
solve
shortcomings.
Consequently,
studies
shown
an
increase
hybrid
based.
Advances in information security, privacy, and ethics book series,
Journal Year:
2025,
Volume and Issue:
unknown, P. 229 - 262
Published: Feb. 14, 2025
Cybersecurity
is
enriched
due
to
Artificial
Intelligence
(AI),
which
provides
better
real-time
threat
detection
and
anomaly
identification,
response
systems.
As
attackers
grow
more
sophisticated
leverage
AI
in
creating
malware.
The
present
study
gives
an
overview
of
the
future
threats
associated
with
AI-driven
attacks
challenges
faced
by
existing
cybersecurity
countermeasures.
Additionally,
it
also
analyses
feasibility
using
capabilities
like
predictive
intelligence,
advanced
quantum
computing
for
some
these
emerging
threats.
For
such
as,
we
need
user
permissions
rights
on
this
application,
should
take
into
consideration
privacy
policies
while
designing
security
as
well.
To
end,
get
ready
against
risks
a
proactive
adaptive
approach
needed
stressing
collaboration
between
industry,
academia
well
global
entities.
Advances in information security, privacy, and ethics book series,
Journal Year:
2025,
Volume and Issue:
unknown, P. 1 - 40
Published: Feb. 14, 2025
The
technology
is
becoming
a
little
more
widely
known
with
its
data
security
and
hyper-transaction
reliability.
By
very
design
of
decentralization
implementation
cryptographic
principles
to
maintain
integrity,
blockchain
eliminates
central
points
failure
making
tampering
unauthorized
changes
virtually
impossible
as
well.
This
part
the
diary
will
discuss
how
giving
our
financial
transactions,
providing
safety
identities
agreements
seamless
smart
contracts.
From
healthcare
supply
chain
management,
it
amazing
witness
many
industries
are
beginning
incorporate
decree
validity
information,
prevent
fraud.
But
you
know
what
they
say
—
new
tech
has
ways
break.
ride
been
accompanied
by
scalability
challenges,
energy
consumption
worries,
regulation
problems
so
on.
There
also
some
promising
prospects,
quantum-resistant
algorithms
enhanced
interoperability
may
resolve
these
widen
blockchain's
influence.
Advances in information security, privacy, and ethics book series,
Journal Year:
2025,
Volume and Issue:
unknown, P. 63 - 98
Published: Feb. 14, 2025
The
proliferation
of
IoT
devices
and
sensors
leads
to
greater
efficiency
but
also
greatly
increased
attack
surfaces.
In
this
part
the
series,
we
delve
into
some
key
security
issues
that
plague
ecosystems
with
a
solution-
understanding
device
vulnerabilities
how
they
led
data
exposure.
are
frequently
built
without
strong
defences
in
place,
lack
secure
firmware
combined
weak
authentication
making
them
top
list
for
attackers.
We
will
turn
real-world
threats,
such
as
distributed
denial
service
(DDoS)
attacks
launched
by
botnets
breaches
disclose
personal
information
or
sensitive
business
information.
Although
chapter
certainly
warns
risks,
it
is
no
means
doom-and-gloom
line
reasoning.
paper
outlines
best
practices
systems,
from
security-by-design
principles
leveraging
AI
blockchain
technologies.
Advances in information security, privacy, and ethics book series,
Journal Year:
2025,
Volume and Issue:
unknown, P. 41 - 62
Published: Feb. 14, 2025
Mobile
applications
have
become
a
crucial
part
of
modern
life,
facilitating
everything
from
social
interactions
to
financial
transactions.
However,
this
ubiquity
also
presents
significant
security
challenge.
The
landscape
mobile
app
is
fraught
with
vulnerabilities
and
threats
that
can
compromise
user
data,
privacy,
the
overall
integrity
applications.
This
paper
delves
into
issues
affect
It
provides
an
in-depth
analysis
various
attack
methods
used
by
cybercriminals
extract
data
explores
how
users
protect
their
information
being
compromised.
discussion
will
cover
common
tactics
employed
attackers,
potential
consequences
losing
application
these
threats,
critical
measures
necessary
for
safeguarding
against
such
attacks.
Advances in information security, privacy, and ethics book series,
Journal Year:
2024,
Volume and Issue:
unknown, P. 281 - 332
Published: July 26, 2024
Protecting
AI
in
web
applications
is
necessary.
This
domain
a
composite
of
technology
and
huge
scope
with
good
prospects
immense
difficulties.
chapter
covers
the
landscape
security
issues
advancing
generative
techniques
for
integration
into
development
frameworks.
The
initial
section
on
development—a
conversation
subtleties
AI-based
methods.
In
literal
stance,
offers
13
ways
to
approach
it.
Among
threats
are
those
that
introduce
related
deployments,
which
illustrate
why
it
vital
defenders
infrastructure
owners
implement
mitigation
measures
proactively.
pertains
privacy
data
lessons
securing
preventing
vulnerability.
explores
attacks,
model
poisoning,
bias
issues,
defence
mechanisms,
long-term
strategies.
Additionally,
Service
A
promotes
transparency,
explainability,
compliance
applicable
laws
while
structuring
methodology
deployment
methods/operation.
text
outlines
how
respond
recover
from
incidents
as
provides
response
frameworks
everyone
involved
managing
breaches.
Finally,
addresses
trends,
possible
threats,
learned
real-world
case
studies.
order
contribute
addressing
these
research
needs,
this
sheds
light
considerations
associated
suggests
recommendations
can
help
researchers,
practitioners,
policymakers
enhance
posture
popular
advancements
used
generating
applications.
Advances in digital crime, forensics, and cyber terrorism book series,
Journal Year:
2024,
Volume and Issue:
unknown, P. 235 - 286
Published: Sept. 12, 2024
Cyber
threats
are
becoming
more
advanced,
and
so
is
cybersecurity,
which
getting
intellectual
better
at
hiding
its
presence.
The
requirement
to
achieve
the
balance
between
proactive
resistive
threat-hunting
measures
in
this
dynamic
environment
very
high.
Part
four
outlines
how
new
AI
techniques
enable
design
of
existing
processes
for
hunting
potential
threats.
main
objective
digress
into
core
principles
threat
hunting,
starting
from
being
including
scenarios
deducing
clues
based
on
hypothesis.
Then,
authors
will
highlight
limitations
conventional
methods
detecting
gimmicks
that
fool
even
skilled
hunters
with
an
unseen
smoking
hiddenly
a
never-ending
evolutionary
process.
Two
well-studied
approaches
tackling
these
challenges
generative
models
like
adversarial
networks
(GANs)
variational
autoencoders
(VAEs).
Advances in digital crime, forensics, and cyber terrorism book series,
Journal Year:
2024,
Volume and Issue:
unknown, P. 191 - 234
Published: Sept. 12, 2024
Collaboration
in
providing
threat
intelligence
and
disseminating
information
enables
cyber
security
professionals
to
embrace
digital
most
successfully,
whose
risks
are
ever-changing.
This
article
dwells
on
the
capacity
of
machine
change
by
categorising
indicators
compromise
(IOC)
actors,
then
highlights
limits
traditional
methods.
Among
Artificial
tools
such
as
generative
adversarial
networks
(GANs)
Variational
autoencoders
(VAEs),
which
key
innovators,
one
can
create
synthetic
or
fake
data
that
emulates
real
attack
scenarios
past.
allows
cyber-related
be
analysed
differently
from
before.
In
addition,
this
feature
secure
stakeholder
collaborations.
It
is
also
meant
mainly
for
factual
protects
private
but
exchange
helpful
information.
clear
fact
showcasing
real-world
examples
demonstrates
Al's
automation
through
cybersecurity
detection.
Advances in information security, privacy, and ethics book series,
Journal Year:
2024,
Volume and Issue:
unknown, P. 77 - 124
Published: July 26, 2024
Protecting
virtual
assets
from
cyber
threats
is
essential
as
we
live
in
a
digitally
advanced
world.
Providing
responsible
emphasis
on
proper
network
security
and
intrusion
detection
imperative.
On
the
other
hand,
traditional
strategies
need
supportive
tool
to
adapt
transforming
threat
space.
New
generative
AI
techniques
like
adversarial
networks
(GANs)
variational
autoencoders
(VAEs)
are
mainstream
technologies
required
meet
gap.
This
chapter
deals
with
how
these
models
can
enhance
by
inspecting
traffic
for
anomalies
malicious
behaviors
detected
through
unsupervised
learning,
which
considers
strange
or
emerging
phenomena.
survey
features
innovations
fault
detection,
behavior
control,
deep
packet
inspection,
classification,
examples
of
real-world
intrusions
GAN-based
systems.
Furthermore,
focuses
challenges
attacks
that
require
development
solid
defense
mechanisms,
such
networks.
Ethics
becomes
following
matter
our
list
discussions,
given
privacy
transparency
accountability
be
observed
when
working
security.
Finally,
authors
examine
trends
determine
cyber-attacks
dealt
comprehensively.
Advances in computational intelligence and robotics book series,
Journal Year:
2024,
Volume and Issue:
unknown, P. 33 - 54
Published: Dec. 13, 2024
This
chapter
explores
the
synergistic
integration
of
internet
things
(IoT)
with
robotics
and
drones,
highlighting
how
this
convergence
is
revolutionizing
industrial
operations
capabilities.
It
delves
into
mechanisms
through
which
IoT
devices
sensors
enhance
autonomy,
efficiency,
intelligence
robotic
systems
enabling
real-time
data
exchange
analysis.
The
discusses
implementation
for
advanced
monitoring,
predictive
maintenance,
seamless
operational
control,
illustrating
its
impact
practical
examples
across
various
sectors.
also
addresses
challenges
scalability,
security,
interoperability,
presenting
forward-looking
strategies
to
navigate
these
hurdles.
By
emphasizing
transformative
potential
in
augmenting
capabilities
underscores
pivotal
role
driving
innovation
excellence
digital
age.