Journal articles on the topic 'AI security'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'AI security.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Chen, Hsinchun. "AI and Security Informatics." IEEE Intelligent Systems 25, no. 5 (September 2010): 82–90. http://dx.doi.org/10.1109/mis.2010.116.
Full textAgrawal, Jatin, Samarjeet Singh Kalra, and Himanshu Gidwani. "AI in cyber security." International Journal of Communication and Information Technology 4, no. 1 (January 1, 2023): 46–53. http://dx.doi.org/10.33545/2707661x.2023.v4.i1a.59.
Full textBS, Guru Prasad, Dr Kiran GM, and Dr Dinesha HA. "AI-Driven cyber security: Security intelligence modelling." International Journal of Multidisciplinary Research and Growth Evaluation 4, no. 6 (2023): 961–65. http://dx.doi.org/10.54660/.ijmrge.2023.4.6.961-965.
Full textAbudalou, Mohammad Ali. "Security DevOps: Enhancing Application Delivery with Speed and Security." International Journal of Computer Science and Mobile Computing 13, no. 5 (May 30, 2024): 100–104. http://dx.doi.org/10.47760/ijcsmc.2024.v13i05.009.
Full textReddy, Haritha Madhava. "Role of AI in Security Compliance." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 11 (November 23, 2024): 1–6. http://dx.doi.org/10.55041/ijsrem32650.
Full textGudimetla, Sandeep Reddy, and Niranjan Reddy Kotha. "AI-POWERED THREAT DETECTION IN CLOUD ENVIRONMENTS." Turkish Journal of Computer and Mathematics Education (TURCOMAT) 9, no. 1 (April 8, 2018): 638–42. http://dx.doi.org/10.61841/turcomat.v9i1.14730.
Full textPoonia, Ramesh Chandra. "Securing the Sustainable Future : Cryptography and Security in AI & IoT." Journal of Discrete Mathematical Sciences and Cryptography 27, no. 4 (2024): i—vii. http://dx.doi.org/10.47974/jdmsc-27-4-foreword.
Full textSengupta, Abhijeet. "Securing the Autonomous Future A Comprehensive Analysis of Security Challenges and Mitigation Strategies for AI Agents." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 12 (December 24, 2024): 1–2. https://doi.org/10.55041/ijsrem40091.
Full textSamijonov, Nurmukhammad Y. "AI FOR INFORMATION SECURITY AND CYBERSPACE." American Journal of Applied Science and Technology 3, no. 10 (October 1, 2023): 39–43. http://dx.doi.org/10.37547/ajast/volume03issue10-08.
Full textSamijonov, Nurmukhammad Y. "EMERGING SECURITY CONCERNS BECAUSE OF AI USAGE." Journal of Social Sciences and Humanities Research Fundamentals 3, no. 11 (November 1, 2023): 43–46. http://dx.doi.org/10.55640/jsshrf-03-11-10.
Full textKim, Tae Min. "Development Tasks of AI-based Security Industry." Korean Society of Private Security 23, no. 1 (March 30, 2024): 181–210. http://dx.doi.org/10.56603/jksps.2024.23.1.181.
Full textFish, Ian. "Ethics in AI Security Implications." ITNOW 60, no. 2 (2018): 34. http://dx.doi.org/10.1093/itnow/bwy046.
Full textFarhat, Syeda Lamima, Likhitha Tubati, Metrine Osiemo, and Rushit Dave. "AI-Based Home Security System." International Journal of Computer Science and Information Technology 16, no. 2 (April 28, 2024): 37–42. http://dx.doi.org/10.5121/ijcsit.2024.16204.
Full textEl-Hadi, Mohamed. "Generative AI Poses Security Risks." مجلة الجمعية المصرية لنظم المعلومات وتکنولوجيا الحاسبات 34, no. 34 (January 1, 2024): 72–73. http://dx.doi.org/10.21608/jstc.2024.338476.
Full textNallam, Madhuri. "AI Privacy Policies and Security." African Journal of Biological Sciences 6, Si4 (July 8, 2024): 908–18. http://dx.doi.org/10.48047/afjbs.6.si4.2024.908-918.
Full textOseremi Onesi-Ozigagun, Yinka James Ololade, Nsisong Louis Eyo-Udo, and Damilola Oluwaseun Ogundipe. "AI-driven biometrics for secure fintech: Pioneering safety and trust." International Journal of Engineering Research Updates 6, no. 2 (April 30, 2024): 001–12. http://dx.doi.org/10.53430/ijeru.2024.6.2.0023.
Full textBin Muhammad, Mohd Hilal, Zulhazlin Bin Abas, Anas Suzastri Bin Ahmad, and Mohd Sufyan Bin Sulaiman. "AI-Driven Security: Redefining Security Informations Systems within Digital Governance." International Journal of Research and Innovation in Social Science VIII, no. IX (2024): 2923–36. http://dx.doi.org/10.47772/ijriss.2024.8090245.
Full textKolade, Titilayo Modupe, Nsidibe Taiwo Aideyan, Seun Michael Oyekunle, Olumide Samuel Ogungbemi, Dooshima Louisa Dapo-Oyewole, and Oluwaseun Oladeji Olaniyi. "Artificial Intelligence and Information Governance: Strengthening Global Security, through Compliance Frameworks, and Data Security." Asian Journal of Research in Computer Science 17, no. 12 (December 4, 2024): 36–57. https://doi.org/10.9734/ajrcos/2024/v17i12528.
Full textKharbanda, Varun, Seetharaman A, and Maddulety K. "Journal." International Journal of Security and Privacy in Pervasive Computing 15, no. 1 (March 23, 2023): 1–13. http://dx.doi.org/10.4018/ijsppc.318676.
Full textVaradhan Krishnan, Varadharaj. "Scaling Security Incident Response with Generative AI." International Journal of Science and Research (IJSR) 13, no. 9 (September 5, 2024): 808–12. http://dx.doi.org/10.21275/sr24913085010.
Full textOurzik, Victoria Yousra. "Security and safety concerns in the age of AI." International Conference on AI Research 4, no. 1 (December 4, 2024): 329–37. https://doi.org/10.34190/icair.4.1.3142.
Full textShinde, Rucha, Shruti Patil, Ketan Kotecha, and Kirti Ruikar. "Blockchain for Securing AI Applications and Open Innovations." Journal of Open Innovation: Technology, Market, and Complexity 7, no. 3 (August 14, 2021): 189. http://dx.doi.org/10.3390/joitmc7030189.
Full textBourair Al-Attar. "Network Security in AI-based healthcare systems." Babylonian Journal of Networking 2023 (November 30, 2023): 112–24. https://doi.org/10.58496/bjn/2023/015.
Full textSarku, Rebecca, Ulfia A. Clemen, and Thomas Clemen. "The Application of Artificial Intelligence Models for Food Security: A Review." Agriculture 13, no. 10 (October 23, 2023): 2037. http://dx.doi.org/10.3390/agriculture13102037.
Full textLisovskyi, Kostiantyn, and Gleb-David Rochenovich. "ARTIFICIAL INTELLIGENCE IN THE SECURITY SYSTEM OF ENTERPRISE." Grail of Science, no. 27 (May 25, 2023): 308–16. http://dx.doi.org/10.36074/grail-of-science.12.05.2023.049.
Full textGrosse, Kathrin, Lukas Bieringer, Tarek R. Besold, Battista Biggio, and Alexandre Alahi. "When Your AI Becomes a Target: AI Security Incidents and Best Practices." Proceedings of the AAAI Conference on Artificial Intelligence 38, no. 21 (March 24, 2024): 23041–46. http://dx.doi.org/10.1609/aaai.v38i21.30347.
Full textSunday Adeola Oladosu, Adebimpe Bolatito Ige, Christian Chukwuemeka Ike, Peter Adeyemo Adepoju, Olukunle Oladipupo Amoo, and Adeoye Idowu Afolabi. "AI-driven security for next-generation data centers: Conceptualizing autonomous threat detection and response in cloud-connected environments." GSC Advanced Research and Reviews 15, no. 2 (May 30, 2023): 162–72. https://doi.org/10.30574/gscarr.2023.15.2.0136.
Full textHu, Yupeng, Wenxin Kuang, Zheng Qin, Kenli Li, Jiliang Zhang, Yansong Gao, Wenjia Li, and Keqin Li. "Artificial Intelligence Security: Threats and Countermeasures." ACM Computing Surveys 55, no. 1 (January 31, 2023): 1–36. http://dx.doi.org/10.1145/3487890.
Full textMalec, Norbert. "Sztuczna inteligencja a bezpieczeństwo państwa." Prawo i Bezpieczeństwo, no. 1 (2024) (June 10, 2024): 20–24. http://dx.doi.org/10.4467/29567610pib.24.002.19838.
Full textChernysh, Roman, Mariia Chekhovska, Olena Stoliarenko, Olena Lisovska, and Andrii Lyseiuk. "Ensuring information security of critical infrastructure objects as a component to guarantee Ukraine’s national security." Revista Amazonia Investiga 12, no. 67 (August 30, 2023): 87–95. http://dx.doi.org/10.34069/ai/2023.67.07.8.
Full textAkhtar, Zarif Bin, and Ahmed Tajbiul Rawol. "Enhancing Cybersecurity through AI-Powered Security Mechanisms." IT Journal Research and Development 9, no. 1 (October 13, 2024): 50–67. http://dx.doi.org/10.25299/itjrd.2024.16852.
Full textYoshida, Kota, and Takeshi Fujino. "Hardware Security on Edge AI Devices." IEICE ESS Fundamentals Review 15, no. 2 (October 1, 2021): 88–100. http://dx.doi.org/10.1587/essfr.15.2_88.
Full textYan, Zheng, Willy Susilo, Elisa Bertino, Jun Zhang, and Laurence T. Yang. "AI-driven data security and privacy." Journal of Network and Computer Applications 172 (December 2020): 102842. http://dx.doi.org/10.1016/j.jnca.2020.102842.
Full textE, Subhashini, Swathi M, Vijayalakshmi V, and Ms Pavaiyarkarasi R. "Border Security Robot Using AI Technology." International Research Journal on Advanced Science Hub 6, no. 04 (April 27, 2024): 63–66. http://dx.doi.org/10.47392/irjash.2024.011.
Full textSandhu, Dr Reema. "HARNESSING AI FOR CYBER SECURITY CHALLENGES." International Journal of Engineering Science and Humanities 14, Special Issue 1 (May 1, 2024): 151–56. http://dx.doi.org/10.62904/tat1v276.
Full textM, Remaya. "AI Chatbots Could Weaken National Security." Scientific American 329, no. 5 (December 2023): 73. http://dx.doi.org/10.1038/scientificamerican1223-73.
Full textNikam, Rugved Lav. "AI Driven Innovations in Cyber Security." International Journal for Research in Applied Science and Engineering Technology 12, no. 4 (April 30, 2024): 829–36. http://dx.doi.org/10.22214/ijraset.2024.59803.
Full textTan, Yu-an, Qikun Zhang, Yuanzhang Li, and Xiao Yu. "AI-Driven Network Security and Privacy." Electronics 13, no. 12 (June 13, 2024): 2311. http://dx.doi.org/10.3390/electronics13122311.
Full textBerghel, Hal. "Bruce Schneier on AI Security (Interview)." Computer 57, no. 11 (November 2024): 99–101. http://dx.doi.org/10.1109/mc.2024.3441868.
Full textOgiela, Marek R., and Urszula Ogiela. "AI for Security of Distributed Systems." WSEAS TRANSACTIONS ON COMPUTER RESEARCH 12 (October 21, 2024): 450–54. http://dx.doi.org/10.37394/232018.2024.12.44.
Full textReddy, Haritha Madhava. "Role of AI in Security Compliance." Journal of Artificial Intelligence & Cloud Computing 3, no. 3 (June 30, 2024): 1–3. http://dx.doi.org/10.47363/jaicc/2024(3)e194.
Full textKim, Geunhye, and Kyudong Park. "Effect of AI." Tehnički glasnik 18, no. 1 (January 30, 2024): 29–36. http://dx.doi.org/10.31803/tg-20230218142012.
Full textArefin, Sabira. "Strengthening Healthcare Data Security with Ai-Powered Threat Detection." International Journal of Scientific Research and Management (IJSRM) 12, no. 10 (October 7, 2024): 1477–83. http://dx.doi.org/10.18535/ijsrm/v12i10.ec02.
Full textKashyap, Suman. "The Influence of Artificial Intelligence on Cybersecurity." International Journal of Innovative Research in Computer and Communication Engineering 12, Special Is (March 25, 2024): 13–22. http://dx.doi.org/10.15680/ijircce.2024.1203503.
Full textNycz, Mariusz, Mirosław Hajder, and Sara Nienajadlo. "Methods for increasing security of web servers." Annales Universitatis Mariae Curie-Sklodowska, sectio AI – Informatica 16, no. 2 (December 22, 2017): 39. http://dx.doi.org/10.17951/ai.2016.16.2.39.
Full textBurdina, Anna A., Anna V. Bondarenko, Nataliya V. Moskvicheva, and Narmina O. Melik-Aslanova. "Management of complex economic security of enterprises: empirical test in Russia." Revista Amazonia Investiga 10, no. 46 (October 25, 2021): 303–10. http://dx.doi.org/10.34069/ai/2021.46.10.30.
Full textClark, Tim. "Practical Security." ITNOW 65, no. 4 (November 23, 2023): 49. http://dx.doi.org/10.1093/itnow/bwad131.
Full textCao, Xiyu. "The application of artificial intelligence in internet security." Applied and Computational Engineering 18, no. 1 (October 23, 2023): 230–35. http://dx.doi.org/10.54254/2755-2721/18/20230995.
Full textPidbereznykh, Inna, Oleg Koval, Yevhen Solomin, Vitaliy Kryvoshein, and Tetyana Plazova. "Ukrainian policy in the field of information security." Revista Amazonia Investiga 11, no. 60 (December 30, 2022): 206–13. http://dx.doi.org/10.34069/ai/2022.60.12.22.
Full textVereshchak, Vasyl, Bohdan Holjanych, Kostiantyn Mamchur, Hlib Smoliar, and Pavlo Terpiak. "Regional (continental) security: emphases of 2022." Revista Amazonia Investiga 11, no. 54 (August 30, 2022): 30–40. http://dx.doi.org/10.34069/ai/2022.54.06.3.
Full text