Sie sind bereits eingeloggt. Klicken Sie auf 2. tolino select Abo, um fortzufahren.
Bitte loggen Sie sich zunächst in Ihr Kundenkonto ein oder registrieren Sie sich bei bücher.de, um das eBook-Abo tolino select nutzen zu können.
This book highlights a collection of state-of-the-art research on Safe Artificial General Intelligence (AGI), highlighting the crucial role of cybersecurity, smart applications, and sustainable technologies in ensuring a secure AI future. It illustrates the latest trends in AI safety, exploring the potential risks and dangers associated with AGI development and ways to prevent unintended consequences. The book discusses the convergence of various fields, such as AI, cybersecurity, smart applications, and sustainable technologies, by providing an overview of theoretical, practical, and…mehr
This book highlights a collection of state-of-the-art research on Safe Artificial General Intelligence (AGI), highlighting the crucial role of cybersecurity, smart applications, and sustainable technologies in ensuring a secure AI future. It illustrates the latest trends in AI safety, exploring the potential risks and dangers associated with AGI development and ways to prevent unintended consequences. The book discusses the convergence of various fields, such as AI, cybersecurity, smart applications, and sustainable technologies, by providing an overview of theoretical, practical, and simulation concepts of AGI. It also displays solutions that will help mitigate the risks and ensure the responsible and ethical development of AGI. It provides insights and perspectives from experts in these fields and offers a comprehensive guide to understanding the challenges and opportunities associated with the development of safe and secure AGI.
The book includes chapters on various topics related to AGI security, including the ethical and legal aspects of AGI development, the role of explainability in ensuring transparency and accountability, the use of machine learning for intrusion detection and prevention, and the application of smart technologies for securing AGI systems.
Additionally, it explores the impact of sustainable technologies on AGI security, such as the use of renewable energy sources to power AGI systems and the development of eco-friendly hardware. This book is a valuable source for researchers, students, and practitioners interested in the fields of artificial general intelligence, cybersecurity, smart applications, and sustainable technologies.
Dr. Salma El Hajjami is an assistant professor and researcher at the Faculty of Science, Ibn Zohr University, Agadir, Morocco. She is a Ph.D., graduate in Computer Science from the Laboratory of Artificial Intelligence, Data Science, and Emerging Systems from ENSA, Sidi Mohammed Ben Abdellah University, Fez, Morocco. She is a computer science engineer, who graduated from the National School of Applied Sciences Fez, Morocco. She has previous expertise acting in the Ministry of Interior Morocco as a research and development engineer. Dr. Salma has made contributions in the fields of social big data, semantics analytics, anomaly detection, and imbalanced big data published at international conferences and journals. Her main research topics are machine learning, deep learning, imbalanced big data, data science, and blockchain.
2. Keshav Kaushik is an accomplished academician, cybersecurity, and digital forensics expert currently serving as an Assistant Professor at the Amity School of Engineering and Technology, Amity University Mohali, Punjab, India. As a key member of the Cybersecurity Centre of Excellence, he has been instrumental in advancing the field of cybersecurity through his dedicated teaching and innovative research. In addition to his academic role, he holds the prestigious position of Vice-Chairperson for the Meerut ACM Professional Chapter, highlighting his leadership and commitment to the professional community. His academic journey includes a notable stint as a Faculty Intern during the Summer Faculty Research Fellow Programme 2016 at the Indian Institute of Technology (IIT) Ropar, reflecting his continuous pursuit of knowledge and professional development. His scholarly contributions are extensive and impactful, with over 135 publications to his credit. This includes 25 peer-reviewed articles in SCI/SCIE/Scopus-indexed journals and 50+ publications in Scopus-indexed conferences. He is also an inventor, holding one granted patent and six published patents, alongside five granted copyrights. His editorial expertise is showcased by publishing 30 books and 25 book chapters, further cementing his reputation as a thought leader in the field. His professional certifications are a testament to his expertise and commitment to excellence. He is a Certified Ethical Hacker (CEH v11) by EC-Council, a CQI and IRCA Certified ISO/IEC 27001:2013 Lead Auditor, a Quick Heal Academy Certified Cyber Security Professional (QCSP), and an IBM Cybersecurity Analyst. His recognition as a Bentham Ambassador by Bentham Science Publishers and his role as a Guest Editor for the IEEE Journal of Biomedical and Health Informatics underscore his influence and authority in cybersecurity. He is a dynamic speaker, having delivered over 50 national and international talks on cybersecurity and digital forensics topics. His mentorship was acknowledged during the Smart India Hackathon 2017, under the aegis of the Indian Space Research Organization (ISRO), with a certificate of appreciation from AICTE, MHRD, and i4c. A two-time GATE qualifier with an impressive 96.07 percentile (2012 and 2016), he has also received accolades from the Uttarakhand Police for his significant contributions to cybercrime investigation training. With a career marked by significant achievements and a profound impact on cybersecurity and digital forensics, he continues to inspire and lead in both academic and professional circles.
3. Dr. Inam Ullah Khan is the Founder of AIEYS. He was visiting researcher at king’s College London, Uk. Also, he was faculty member at different universities in Pakistan which include Center for Emerging Sciences Engineering & Technology (CESET), Islamabad, Abdul Wali Khan University, Garden Campus, Timergara Campus, University of Swat & Shaheed Zulfikar Ali Bhutto Institute of Science and Technology (SZABIST), Islamabad Campus. He did Ph.D. in Electronics Engineering from Department of Electronic Engineering, Isra University, Islamabad Campus, School of Engineering & Applied Sciences (SEAS). Also, he did his M.S. degree in Electronic Engineering at Department of Electronic Engineering, Isra University, Islamabad Campus, School of Engineering & Applied Sciences (SEAS). He had done undergraduate degree in Bachelor of Computer Science from Abdul Wali Khan University Mardan, Pakistan. Apart from that his Master’s thesis is published as a book on topic “Route Optimization with Ant Colony Optimization (ACO)” in Germany which is available on Amazon. More interestingly, he use to teach subjects like Computer Network Security, Artificial Intelligence, Evolutionary Computing, Professional Practice, Software Engineering, Data Communication & Networks, Data Base, Cyber Security, Visual Programming, Computer Organization & Assembly Language and introduction to programming. He authored/coauthored more than 30 research articles in reputable journals, conferences and book chapters. More interestingly he recently introduced a novel routing protocol E-ANTHOCNET in the area of flying ad hoc networks. His research interest includes Network System Security, Intrusion Detection, Intrusion Prevention, cryptography, Optimisation techniques, WSN, IoT, Mobile Ad Hoc Networks (MANETS), Flying Ad Hoc Networks, and Machine Learning. He has served international conferences as Technical program committee member which include, EAI International Conference on Future Intelligent Vehicular Technologies, Islamabad, Pakistan and 2nd International Conference on Future Networks and Distributed Systems, Amman, Jordan, June 26–27, 2018, International Workshop on Computational Intelligence and Cybersecurity in Emergent Networks (CICEN’21) that will be held in conjunction with the 12th International Conference on Ambient Systems, Networks and Technologies (EUSPN2021) which is co-organized in November 1–4, 2021, Leuven, Belgium. Also, he was technical program committee member at international workshop on intelligent systems for sustainable smart cities, New Delhi, India, February 19–20, 2022. In addition, he served as Editor in about 12 Books on Various topics. Currently, he served as special session chair at International Conference on Advances in Communication Technology and Computer Engineering ICACTCE'22 on topic: Fusion of Emerging Technologies: Communication Networks & Future Applications. Also, he is Guest Editor with many International Journals. Apart from that he is General Chair at International Conference on Trends and Innovations in Smart Technologies (ICTIST’22), virtually from London, United Kingdom. At the moment he is General Chair at 2nd International Conference on Trends and Innovations in Smart Technologies (ICTIST’24). More interestingly, he was invited as technology expert many times on Pakistan National Television.
Inhaltsangabe
.- Overview of Artificial General Intelligence (AGI).
.- The benefits and risks of AGI.
.- Overview of the book's objectives and structure.
.- Cybersecurity challenges and risks in AGI development and deployment.
.- Strategies for ensuring the safe and secure development and deployment of AGI.
.- Ethical considerations in cybersecurity for AGI.
.- The role of smart applications in facilitating the development of AGI.
.- Economic and societal implications of AGI.
.- Ethical and societal considerations in the development of smart applications for AGI.
.- Introduction to sustainable technologies for AGI.
.- Renewable energy and AGI.
.- Overview of Artificial General Intelligence (AGI).
.- The benefits and risks of AGI.
.- Overview of the book's objectives and structure.
.- Cybersecurity challenges and risks in AGI development and deployment.
.- Strategies for ensuring the safe and secure development and deployment of AGI.
.- Ethical considerations in cybersecurity for AGI.
.- The role of smart applications in facilitating the development of AGI.
.- Economic and societal implications of AGI.
.- Ethical and societal considerations in the development of smart applications for AGI.
.- Introduction to sustainable technologies for AGI.