<?xml version="1.0" encoding="UTF-8"?>
<item xmlns="http://omeka.org/schemas/omeka-xml/v5" itemId="18131" public="1" featured="0" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://omeka.org/schemas/omeka-xml/v5 http://omeka.org/schemas/omeka-xml/v5/omeka-xml-5-0.xsd" uri="https://archives.christuniversity.in/items/show/18131?output=omeka-xml" accessDate="2026-05-04T06:44:39+00:00">
  <collection collectionId="15">
    <elementSetContainer>
      <elementSet elementSetId="1">
        <name>Dublin Core</name>
        <description>The Dublin Core metadata element set is common to all Omeka records, including items, files, and collections. For more information see, http://dublincore.org/documents/dces/.</description>
        <elementContainer>
          <element elementId="50">
            <name>Title</name>
            <description>A name given to the resource</description>
            <elementTextContainer>
              <elementText elementTextId="44496">
                <text>Book Chapter</text>
              </elementText>
            </elementTextContainer>
          </element>
        </elementContainer>
      </elementSet>
    </elementSetContainer>
  </collection>
  <itemType itemTypeId="27">
    <name>Book Chapter</name>
    <description>Faculty Publications- Book Chapter</description>
  </itemType>
  <elementSetContainer>
    <elementSet elementSetId="1">
      <name>Dublin Core</name>
      <description>The Dublin Core metadata element set is common to all Omeka records, including items, files, and collections. For more information see, http://dublincore.org/documents/dces/.</description>
      <elementContainer>
        <element elementId="50">
          <name>Title</name>
          <description>A name given to the resource</description>
          <elementTextContainer>
            <elementText elementTextId="149843">
              <text>Machine Learning in Cyber Threats Intelligent System</text>
            </elementText>
          </elementTextContainer>
        </element>
        <element elementId="41">
          <name>Description</name>
          <description>An account of the resource</description>
          <elementTextContainer>
            <elementText elementTextId="149844">
              <text>Cybercriminals disrupt services, exfiltrate sensitive data, and exploit victim machines and networks to perform malicious activities against organizations. A malicious adversary seeks to steal, destroy, or compromise business assets that have a specific financial, reputational, or intellectual value. As a result, organizations are complementing their perimeter defenses with threat intelligence platforms to address these security challenges and eliminate security blind spots for their systems. Any type of information useful for identifying, assessing, monitoring, and responding to cyber threats is considered cyber threat intelligence. Organizations can benefit from increased visibility into cyber threats and policy violations. An organizations threat intelligence allows them to prevent or mitigate various types of cyberattacks. The use of machine learning and artificial intelligence is a key component of cybersecurity conflict, which together allows attackers and defenders to function at new speeds and scales. In spear-phishing attacks, relatively frivolous machine learning algorithms have been used to overwhelming effect as adversarial artificial intelligence. This chapter discusses the various cyber threats, cyber security attack types, publicly available datasets for research work, and machine learning techniques in cyber-physical systems.  2024 selection and editorial matter, S. Vijayalakshmi, P. Durgadevi, Lija Jacob, Balamurugan Balusamy, and Parma Nand; individual chapters, the contributors.</text>
            </elementText>
          </elementTextContainer>
        </element>
        <element elementId="39">
          <name>Creator</name>
          <description>An entity primarily responsible for making the resource</description>
          <elementTextContainer>
            <elementText elementTextId="149845">
              <text>Jaisingh W.; Nanjundan P.; George J.P.</text>
            </elementText>
          </elementTextContainer>
        </element>
        <element elementId="48">
          <name>Source</name>
          <description>A related resource from which the described resource is derived</description>
          <elementTextContainer>
            <elementText elementTextId="149846">
              <text>Artificial Intelligence for Cyber Defense and Smart Policing, pp. 1-20.</text>
            </elementText>
          </elementTextContainer>
        </element>
        <element elementId="45">
          <name>Publisher</name>
          <description>An entity responsible for making the resource available</description>
          <elementTextContainer>
            <elementText elementTextId="149847">
              <text>CRC Press</text>
            </elementText>
          </elementTextContainer>
        </element>
        <element elementId="40">
          <name>Date</name>
          <description>A point or period of time associated with an event in the lifecycle of the resource</description>
          <elementTextContainer>
            <elementText elementTextId="149848">
              <text>2024-01-01</text>
            </elementText>
          </elementTextContainer>
        </element>
        <element elementId="43">
          <name>Identifier</name>
          <description>An unambiguous reference to the resource within a given context</description>
          <elementTextContainer>
            <elementText elementTextId="149849">
              <text>&lt;a href="https://doi.org/10.1201/9781003251781-1" target="_blank" rel="noreferrer noopener"&gt;https://doi.org/10.1201/9781003251781-1&lt;/a&gt;
&lt;br /&gt;&lt;br /&gt;&lt;a href="https://www.scopus.com/inward/record.uri?eid=2-s2.0-85190232809&amp;amp;doi=10.1201%2F9781003251781-1&amp;amp;partnerID=40&amp;amp;md5=ec3bada096b848bc8f7a6e2ff5b650c8" target="_blank" rel="noreferrer noopener"&gt;https://www.scopus.com/inward/record.uri?eid=2-s2.0-85190232809&amp;amp;doi=10.1201%2f9781003251781-1&amp;amp;partnerID=40&amp;amp;md5=ec3bada096b848bc8f7a6e2ff5b650c8&lt;/a&gt;</text>
            </elementText>
          </elementTextContainer>
        </element>
        <element elementId="47">
          <name>Rights</name>
          <description>Information about rights held in and over the resource</description>
          <elementTextContainer>
            <elementText elementTextId="149850">
              <text>Restricted Access</text>
            </elementText>
          </elementTextContainer>
        </element>
        <element elementId="46">
          <name>Relation</name>
          <description>A related resource</description>
          <elementTextContainer>
            <elementText elementTextId="149851">
              <text>ISBN: 978-100381553-2; 978-103217093-0</text>
            </elementText>
          </elementTextContainer>
        </element>
        <element elementId="42">
          <name>Format</name>
          <description>The file format, physical medium, or dimensions of the resource</description>
          <elementTextContainer>
            <elementText elementTextId="149852">
              <text>Online</text>
            </elementText>
          </elementTextContainer>
        </element>
        <element elementId="44">
          <name>Language</name>
          <description>A language of the resource</description>
          <elementTextContainer>
            <elementText elementTextId="149853">
              <text>English</text>
            </elementText>
          </elementTextContainer>
        </element>
        <element elementId="51">
          <name>Type</name>
          <description>The nature or genre of the resource</description>
          <elementTextContainer>
            <elementText elementTextId="149854">
              <text>Book chapter</text>
            </elementText>
          </elementTextContainer>
        </element>
        <element elementId="38">
          <name>Coverage</name>
          <description>The spatial or temporal topic of the resource, the spatial applicability of the resource, or the jurisdiction under which the resource is relevant</description>
          <elementTextContainer>
            <elementText elementTextId="149855">
              <text>Jaisingh W., Presidency University, Bengaluru, India; Nanjundan P., Department of Data Science, Christ University, Pune, Lavasa, India; George J.P., Department of Data Science, Christ University Delhi NCR Campus, India</text>
            </elementText>
          </elementTextContainer>
        </element>
      </elementContainer>
    </elementSet>
  </elementSetContainer>
</item>
