Application of Artificial Intelligence in User Interfaces Design for Cyber Security Threat Modeling / / written by Jide Ebenezer Taiwo Akinsola [and six others].
In recent years, Cyber Security threat modeling has been discovered to have the capacity of combatting and mitigating against online threats. In order to minimize the associated risk, these threats need to be modelled with appropriate Intelligent User Interface (IUI) design and consequently the deve...
Saved in:
VerfasserIn: | |
---|---|
Place / Publishing House: | London : : IntechOpen,, 2021. |
Year of Publication: | 2021 |
Language: | English |
Physical Description: | 1 online resource (194 pages) |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
LEADER | 03484nam a2200313 i 4500 | ||
---|---|---|---|
001 | 993581466604498 | ||
005 | 20230323221636.0 | ||
006 | m o d | ||
007 | cr ||||||||||| | ||
008 | 230323s2021 enk o 000 0 eng d | ||
020 | |a 1-83962-897-9 | ||
035 | |a (CKB)4920000002071596 | ||
035 | |a (NjHacI)994920000002071596 | ||
035 | |a (EXLCZ)994920000002071596 | ||
040 | |a NjHacI |b eng |e rda |c NjHacl | ||
050 | 4 | |a Q335 |b .T359 2021 | |
082 | 0 | 4 | |a 006.3 |2 23 |
100 | 1 | |a Taiwo Akinsola, Jide Ebenezer, |e author. | |
245 | 1 | 0 | |a Application of Artificial Intelligence in User Interfaces Design for Cyber Security Threat Modeling / |c written by Jide Ebenezer Taiwo Akinsola [and six others]. |
246 | |a Surfactants and Detergents | ||
264 | 1 | |a London : |b IntechOpen, |c 2021. | |
300 | |a 1 online resource (194 pages) | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
588 | |a Description based on: online resource; title from PDF information screen (IntechOpen, viewed March 23, 2023). | ||
520 | |a In recent years, Cyber Security threat modeling has been discovered to have the capacity of combatting and mitigating against online threats. In order to minimize the associated risk, these threats need to be modelled with appropriate Intelligent User Interface (IUI) design and consequently the development and evaluation of threat metrics. Artificial Intelligence (AI) has revolutionized every facet of our daily lives and building a responsive Cyber Security Threat Model requires an IUI. The current threat models lack IUI, hence they cannot deliver convenience and efficiency. However, as the User Interface (UI) functionalities and User Experience (UX) continue to increase and deliver more astonishing possibilities, the present threat models lack the predictability capacity thus Machine Learning paradigms must be incorporated. Meanwhile, this deficiency can only be handled through AI-enabled UI that utilizes baseline principles in the design of interfaces for effective Human-Machine Interaction (HMI) with lasting UX. IUI helps developers or designers enhance flexibility, usability, and the relevance of the interaction to improving communication between computer and human. Baseline principles must be applied for developing threat models that will ensure fascinating UI-UX. Application of AI in UI design for Cyber Security Threat Modeling brings about reduction in critical design time and ensures the development of better threat modeling applications and solutions. | ||
505 | 0 | |a 1. Introduction -- 1.1 Cyber security threat modeling -- 2. Human machine interfaces -- 2.1 User Interface -- 2.2 User experience -- 3. Artificial intelligence in user Interface design -- 3.1 Empirical studies on intelligent user interfaces -- 3.2 Challenges in IUI -- 3.3 Comparative analysis of intelligent user interfaces -- 3.4 IUI design methods -- 3.5 AI versus UI design -- 3.6 IUI design model -- 3.7 AI-based UI and UX prototyping tools -- 4. Cyber security threat models -- 4.1 Cyber security threat modeling process -- 4.1.1 Threat analysis -- 4.1.2 Identification of asset -- 4.1.3 Mitigation capacity -- 4.1.4 Evaluation of vulnerability -- 4.1.5 Mapping of threats -- 4.2 Predictive analytics of threat models -- 4.3 Baseline principles for intelligent user interfaces design -- 4.4 Application of AI in UI design for cyber security threat modeling -- 5. Conclusion -- References. | |
650 | 0 | |a Artificial intelligence. | |
776 | |z 1-83962-896-0 | ||
906 | |a BOOK | ||
ADM | |b 2023-04-15 13:21:25 Europe/Vienna |f system |c marc21 |a 2022-11-12 21:32:05 Europe/Vienna |g false | ||
AVE | |P DOAB Directory of Open Access Books |x https://eu02.alma.exlibrisgroup.com/view/uresolver/43ACC_OEAW/openurl?u.ignore_date_coverage=true&portfolio_pid=5343028070004498&Force_direct=true |Z 5343028070004498 |8 5343028070004498 |