To see the other types of publications on this topic, follow the link: AI security.

Journal articles on the topic 'AI security'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'AI security.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Chen, Hsinchun. "AI and Security Informatics." IEEE Intelligent Systems 25, no. 5 (September 2010): 82–90. http://dx.doi.org/10.1109/mis.2010.116.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Agrawal, Jatin, Samarjeet Singh Kalra, and Himanshu Gidwani. "AI in cyber security." International Journal of Communication and Information Technology 4, no. 1 (January 1, 2023): 46–53. http://dx.doi.org/10.33545/2707661x.2023.v4.i1a.59.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

BS, Guru Prasad, Dr Kiran GM, and Dr Dinesha HA. "AI-Driven cyber security: Security intelligence modelling." International Journal of Multidisciplinary Research and Growth Evaluation 4, no. 6 (2023): 961–65. http://dx.doi.org/10.54660/.ijmrge.2023.4.6.961-965.

Full text
Abstract:
The process of defending computer networks from cyber attacks or unintended, unauthorized access is known as cyber security. Organizations, businesses, and governments need cyber security solutions because cyber criminals pose a threat to everyone. Artificial intelligence promises to be a great solution for this. Security experts are better able to defend vulnerable networks and data from cyber attackers by combining the strengths of artificial intelligence and cyber security. This paper provides an introduction to the use of artificial intelligence in cyber security. AI-driven cyber security refers to the use of artificial intelligence and machine learning technologies to enhance the protection of computer systems and networks from cyber threats such as hacking, malware, phishing, and other forms of cyberattacks. AI-powered security solutions are designed to automate the process of detecting, analyzing, and responding to security incidents in real-time, thereby improving the efficiency and effectiveness of cyber defense. These solutions can analyze large amounts of data, identify patterns and anomalies, and make decisions faster and more accurately than humans alone, enabling organizations to stay ahead of evolving cyber threats.
APA, Harvard, Vancouver, ISO, and other styles
4

Abudalou, Mohammad Ali. "Security DevOps: Enhancing Application Delivery with Speed and Security." International Journal of Computer Science and Mobile Computing 13, no. 5 (May 30, 2024): 100–104. http://dx.doi.org/10.47760/ijcsmc.2024.v13i05.009.

Full text
Abstract:
"Protection DevOps: Security DevOps: Enhancing Application Delivery with Speed and Security" is a whole paper that explores the combination of synthetic intelligence (AI) technology into the protection DevOps framework. This integration goals to enhance software transport with the aid of AI-driven automation, predictive analytics, and chance intelligence. Inside the contemporary, rapid-paced virtual panorama, groups face developing pressure to deliver applications quickly while making sure sturdy safety capabilities are in proximity. The traditional method of protection frequently results in delays in deployment and hampers agility. With the aid of incorporating AI capabilities into DevOps protection practices, agencies can achieve stability among pace and safety. This paper examines how AI can optimize several factors of safety DevOps, together with: Automatic threat detection: AI-powered equipment can look at massive quantities of data in real-time to proactively come across and respond to protection threats. This functionality enables figuring out anomalies, predicting functionality dangers, and taking preemptive actions. Practical safety finding out: AI-pushed attempting out tools can carry out complete protection finding out, which includes vulnerability exams, penetration sorting out, and code assessment. Those gear leverage gadgets, studying algorithms to perceive safety gaps and advocate remediation measures. Predictive risk management: AI algorithms can examine historical protection statistics and patterns to expect future protection dangers. This proactive method lets companies put in place location-specific preventive measures and restrict the effects of safety incidents. Non-forestall compliance monitoring: AI-based total compliance system can display and implement regulatory compliance requirements at some point inside the improvement and deployment lifecycle. This guarantees that applications adhere to enterprise standards and regulatory hints. By incorporating AI into DevOps safety, businesses can gather accelerated software shipping without compromising protection. The synergistic aggregate of AI-driven automation, predictive analytics, and threat intelligence empowers DevOps organizations to respond to growing threats while preserving an excessive protection posture. This paper offers insights into the benefits of integrating AI into safety DevOps practices, uncommon use times, implementation strategies, and great practices. It courses agencies looking for to leverage AI technologies to decorate utility shipping with velocity and safety in a dynamic virtual environment.
APA, Harvard, Vancouver, ISO, and other styles
5

Reddy, Haritha Madhava. "Role of AI in Security Compliance." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 11 (November 23, 2024): 1–6. http://dx.doi.org/10.55041/ijsrem32650.

Full text
Abstract:
Abstract—Artificial Intelligence (AI) has emerged as a pivotal tool in enhancing security compliance across various industries. Its ability to analyze vast datasets, detect intricate patterns, and automate complex processes significantly improves risk management and regulatory adherence. AI enables real-time data analysis, promptly identifying potential violations and flagging security threats, thereby strengthening an organization’s overall security framework. However, while AI offers transformative advantages, its integration into existing security systems introduces new challenges, such as data privacy concerns, algorithmic bias, and the need for transparent decision-making. This paper explores the dual role of AI in both enhancing compliance efforts and presenting risks that require careful management. By adopting a balanced approach—leveraging AI’s capabilities while ensuring robust oversight— organizations can optimize compliance processes, address regulatory challenges, and mitigate associated risks. Achieving this balance is critical to securing long-term success in an increasingly regulated and digitized landscape. Keywords—Artificial Intelligence (AI), security compliance, risk management, regulatory compliance, data privacy, algorithmic bias, real-time data analysis, threat detection, automation, cybersecurity, transparency, decision-making, compliance automation, AI integration, ethical AI deployment, organizational security, regulatory frameworks.
APA, Harvard, Vancouver, ISO, and other styles
6

Gudimetla, Sandeep Reddy, and Niranjan Reddy Kotha. "AI-POWERED THREAT DETECTION IN CLOUD ENVIRONMENTS." Turkish Journal of Computer and Mathematics Education (TURCOMAT) 9, no. 1 (April 8, 2018): 638–42. http://dx.doi.org/10.61841/turcomat.v9i1.14730.

Full text
Abstract:
This study assesses the effectiveness of artificial intelligence (AI) technologies in enhancing threat detection within cloud environments, a critical component given the escalating security challenges in cloud computing. Leveraging various AI methodologies, including machine learning models, deep learning, and anomaly detection techniques, the research aims to improve the accuracy and efficiency of security systems. These AI methods were applied to a series of simulated threat scenarios across diverse cloud platforms to evaluate their capability in real-time threat identification and mitigation. Results demonstrated a significant enhancement in detection rates and a decrease in false positives, indicating that AI can substantially improve the robustness of cloud security systems against sophisticated cyber threats. The study highlights the transformative potential of AI in cloud security, showing not only improvements in threat detection but also in the speed and reliability of responses to security incidents. Furthermore, the findings advocate for the integration of AI technologies into existing cloud security infrastructures to achieve more dynamic and adaptable security solutions. The conclusion points towards the need for ongoing research into advanced AI applications in cloud security, suggesting future directions such as the development of self-learning security systems and the exploration of AI's predictive capabilities in pre-empting security breaches. This research provides a foundation for further exploration and potential real-world application of AI in securing cloud environments against an increasingly complex landscape of cyber threats.
APA, Harvard, Vancouver, ISO, and other styles
7

Poonia, Ramesh Chandra. "Securing the Sustainable Future : Cryptography and Security in AI & IoT." Journal of Discrete Mathematical Sciences and Cryptography 27, no. 4 (2024): i—vii. http://dx.doi.org/10.47974/jdmsc-27-4-foreword.

Full text
Abstract:
The objective of this special issue titled “Securing the Sustainable Future: Cryptography and Security in AI & IoT” is to discuss recent advancements of cryptography and security in AI & IoT for a secure, sustainable future. The issue focuses on the social and economic impact of sustainable computing, with sub-topics covering the applications of AI & IoT. Additionally, the conference has explored security mechanisms in the context of sustainability.
APA, Harvard, Vancouver, ISO, and other styles
8

Sengupta, Abhijeet. "Securing the Autonomous Future A Comprehensive Analysis of Security Challenges and Mitigation Strategies for AI Agents." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 12 (December 24, 2024): 1–2. https://doi.org/10.55041/ijsrem40091.

Full text
Abstract:
The proliferation of Artificial Intelligence (AI) agents, characterized by their autonomy and capacity for independent decision-making, presents both unprecedented opportunities and novel security challenges. This research paper provides a comprehensive analysis of the security landscape surrounding AI agents, examining the unique vulnerabilities stemming from their inherent characteristics and the emerging threat vectors targeting these autonomous systems. We delve into a categorized framework of potential attacks, ranging from data poisoning and adversarial manipulation to physical tampering and exploitation of autonomy. Furthermore, we critically evaluate existing and propose novel mitigation strategies, encompassing secure development practices, robustness training, explainable AI techniques for monitoring, and the crucial role of ethical and regulatory frameworks. This paper contributes to the growing body of knowledge on AI security, offering insights for researchers, developers, and policymakers navigating the complexities of securing the autonomous future. Keywords: Artificial Intelligence, AI Agents, Autonomous Systems, Cybersecurity, Machine Learning Security, Adversarial Attacks, Data Poisoning, Robotics Security, Ethical AI, AI Governance
APA, Harvard, Vancouver, ISO, and other styles
9

Samijonov, Nurmukhammad Y. "AI FOR INFORMATION SECURITY AND CYBERSPACE." American Journal of Applied Science and Technology 3, no. 10 (October 1, 2023): 39–43. http://dx.doi.org/10.37547/ajast/volume03issue10-08.

Full text
Abstract:
Taking into account the fact that artificial intelligence can expand the capabilities of humanity, accelerate the speed of data analysis several times, and help people reach correct and accurate conclusions in the decision-making process, it can improve data security or, on the contrary, target propaganda and fake news. Collecting information, taking very little responsibility, and taking into account the fact that social networks can expand the speed and extent of dissemination of information simultaneously in two opposite directions, AI can both strengthen cyber security or create new types of threats to it.
APA, Harvard, Vancouver, ISO, and other styles
10

Samijonov, Nurmukhammad Y. "EMERGING SECURITY CONCERNS BECAUSE OF AI USAGE." Journal of Social Sciences and Humanities Research Fundamentals 3, no. 11 (November 1, 2023): 43–46. http://dx.doi.org/10.55640/jsshrf-03-11-10.

Full text
Abstract:
Recently, there has been a lot of hype surrounding AI, bringing urgent concerns along with lots of myth, as the future of AI is still uncertain. While social media headlines warn that AI is about to outperform humans in near future, there's a good chance that attacks made possible by the increased application of AI will be very potent, precisely targeted, hard to identify, and likely to take advantage of holes in AI systems. This article analyzes the emerging security issues that are forming in the way AI is used in practice.
APA, Harvard, Vancouver, ISO, and other styles
11

Kim, Tae Min. "Development Tasks of AI-based Security Industry." Korean Society of Private Security 23, no. 1 (March 30, 2024): 181–210. http://dx.doi.org/10.56603/jksps.2024.23.1.181.

Full text
Abstract:
Recently, the government's interest in industries utilizing AI has been amplified, with initiatives such as announcing a roadmap aiming to achieve the goal of becoming the world's fifth largest information security industry by 2027, with a market size of 30 trillion won, driven by digitalization and expansion in the security domain. AI represents a paradigm shift demanding innovation across nations, societies, and industries, necessitating proactive preparation and response. In the security sector, the paradigm is shifting from traditional human security to integrated security, convergence security, and AI security. To establish a foothold in the global security market, it is imperative to apply new security systems tailored to the Fourth Industrial Revolution through technological innovation, foster convergence security and physical security industries. Therefore, this study aims to propose the nurturing and development direction of the security industry based on AI, which is the core technology of the Fourth Industrial Revolution, as society evolves into a hyper-intelligent, hyper-connected, and hyper-convergent society. To foster the AI-based security industry, the application and operation of AI-based security systems need to be expanded across the entire security business. These include applying AI virtual security guards, AI-based security robots, AI-based drones, AI-based intelligent video monitoring in security rooms, AI-based autonomous driving technology and smart parking solutions, AI-based security systems in personal protection tasks, AI-based on-site crowd management systems, AI-based IoT integrated security systems, and operation of AI-based machine security systems that can be applied to the six security tasks regulated by security laws and regulations. From a policy perspective, policy support for creating new jobs and ensuring stable employment in AI security-related fields should follow. At the national level, there should be policies to nurture and support the AI-based security industry, along with efforts to address ethical issues related to AI. Furthermore, new education programs related to the Fourth Industrial Revolution and AI need to be introduced according to security laws and regulations. From a technological and academic perspective, it is necessary to enhance the professionalism of security companies to actively respond to the Fourth Industrial Revolution, and continuous development of AI-related security technologies is essential. Academic research should continue, focusing on in-depth research and development of AI security applications in various security sectors.
APA, Harvard, Vancouver, ISO, and other styles
12

Fish, Ian. "Ethics in AI Security Implications." ITNOW 60, no. 2 (2018): 34. http://dx.doi.org/10.1093/itnow/bwy046.

Full text
APA, Harvard, Vancouver, ISO, and other styles
13

Farhat, Syeda Lamima, Likhitha Tubati, Metrine Osiemo, and Rushit Dave. "AI-Based Home Security System." International Journal of Computer Science and Information Technology 16, no. 2 (April 28, 2024): 37–42. http://dx.doi.org/10.5121/ijcsit.2024.16204.

Full text
Abstract:
Home security is of paramount importance in today's world, where we rely more on technology, home security is crucial. Using technology to make homes safer and easier to control from anywhere is important. Home security is important for the occupant’s safety. In this paper, we came up with a low cost, AI based model home security system. The system has a user-friendly interface, allowing users to start model training and face detection with simple keyboard commands. Our goal is to introduce an innovative home security system using facial recognition technology. Unlike traditional systems, this system trains and saves images of friends and family members. The system scans this folder to recognize familiar faces and provides real-time monitoring. If an unfamiliar face is detected, it promptly sends an email alert, ensuring a proactive response to potential security threats.
APA, Harvard, Vancouver, ISO, and other styles
14

El-Hadi, Mohamed. "Generative AI Poses Security Risks." مجلة الجمعية المصرية لنظم المعلومات وتکنولوجيا الحاسبات 34, no. 34 (January 1, 2024): 72–73. http://dx.doi.org/10.21608/jstc.2024.338476.

Full text
APA, Harvard, Vancouver, ISO, and other styles
15

Nallam, Madhuri. "AI Privacy Policies and Security." African Journal of Biological Sciences 6, Si4 (July 8, 2024): 908–18. http://dx.doi.org/10.48047/afjbs.6.si4.2024.908-918.

Full text
Abstract:
AI technologies often trigger concerns about privacy, a concept whose meaning can be challenging to grasp. Consequently, people’s worries about privacy tend to be unclear, complicating efforts to address these concerns and clarify how AI either poses or doesn’t pose threats to individuals. This article highlights overlooked distinctions and explored their impact on concerns about how AI technology affects privacy threats. It implies that security, rather than the fundamentals of privacy, is frequently brought up when individuals voice concerns about privacy with regard to artificial intelligence. However, the focus on security overlooks the significance of privacy in fostering autonomy and shaping our identities. Enhancing understanding of these nuances could assist AI developers in explaining to users which interests are affected and which are not using AI systems.
APA, Harvard, Vancouver, ISO, and other styles
16

Oseremi Onesi-Ozigagun, Yinka James Ololade, Nsisong Louis Eyo-Udo, and Damilola Oluwaseun Ogundipe. "AI-driven biometrics for secure fintech: Pioneering safety and trust." International Journal of Engineering Research Updates 6, no. 2 (April 30, 2024): 001–12. http://dx.doi.org/10.53430/ijeru.2024.6.2.0023.

Full text
Abstract:
AI-driven biometrics is revolutionizing the security landscape in the financial technology (FinTech) sector, enhancing safety measures and fostering trust among users. This review explores the role of AI-driven biometrics in securing FinTech operations, highlighting its benefits and implications. AI-driven biometrics refers to the use of artificial intelligence (AI) algorithms to analyze biological data for authentication purposes. This technology has gained significant traction in the FinTech sector due to its ability to provide a higher level of security than traditional authentication methods. By analyzing unique biological traits such as fingerprints, facial features, and voice patterns, AI-driven biometrics can accurately verify the identity of users, making it difficult for unauthorized individuals to gain access to sensitive financial information. One of the key benefits of AI-driven biometrics in FinTech is its ability to enhance security measures. Traditional authentication methods such as passwords and PINs are increasingly vulnerable to hacking and fraud. AI-driven biometrics, on the other hand, offers a higher level of security by using biological traits that are unique to each individual. This makes it significantly more difficult for fraudsters to gain access to sensitive financial information. In addition to enhancing security, AI-driven biometrics also improves the user experience. By replacing traditional authentication methods with biometric authentication, users can access their accounts more quickly and conveniently, without the need to remember complex passwords or PINs. This not only improves the overall user experience but also reduces the risk of user error and account lockouts. Overall, AI-driven biometrics is pioneering safety and trust in the FinTech sector by providing a higher level of security and enhancing the user experience. As this technology continues to evolve, it is likely to play an increasingly important role in securing financial transactions and fostering trust among users.
APA, Harvard, Vancouver, ISO, and other styles
17

Bin Muhammad, Mohd Hilal, Zulhazlin Bin Abas, Anas Suzastri Bin Ahmad, and Mohd Sufyan Bin Sulaiman. "AI-Driven Security: Redefining Security Informations Systems within Digital Governance." International Journal of Research and Innovation in Social Science VIII, no. IX (2024): 2923–36. http://dx.doi.org/10.47772/ijriss.2024.8090245.

Full text
Abstract:
The increasing integration of Artificial Intelligence (AI) within Security Information Systems (SIS) presents a significant shift in digital governance, where governments rely heavily on secure digital infrastructures to manage public services. The escalating threat landscape has necessitated a proactive approach to cybersecurity, and AI is proving crucial in enhancing threat detection, automating responses, and minimizing human error. However, many governments, particularly in developing nations, are struggling to bridge the gap between their current security measures and the complex challenges posed by sophisticated cyber threats. This study aims to explore how AI can redefine SIS in digital governance by improving national resilience and addressing the gaps in traditional security protocols. The study employs a systematic literature review methodology, examining recent research to analyze AI’s role in enhancing SIS, with a particular focus on machine learning, deep learning, and adaptive security measures. Findings indicate that AI-driven security significantly enhances the speed and accuracy of threat detection, providing dynamic solutions that continuously adapt to evolving threats. Nonetheless, the study also highlights concerns around ethical governance, data privacy, and transparency, pointing to the need for robust regulatory frameworks to govern AI’s deployment in public sector security systems. The implications of this research are twofold: theoretically, it contributes to the broader understanding of AI’s role in cybersecurity resilience; practically, it offers insights for policymakers aiming to integrate AI into their governance strategies. The study concludes by recommending further empirical research, particularly in the context of developing nations, where AI-driven security solutions are needed to enhance national cybersecurity frameworks and protect critical public infrastructures.
APA, Harvard, Vancouver, ISO, and other styles
18

Kolade, Titilayo Modupe, Nsidibe Taiwo Aideyan, Seun Michael Oyekunle, Olumide Samuel Ogungbemi, Dooshima Louisa Dapo-Oyewole, and Oluwaseun Oladeji Olaniyi. "Artificial Intelligence and Information Governance: Strengthening Global Security, through Compliance Frameworks, and Data Security." Asian Journal of Research in Computer Science 17, no. 12 (December 4, 2024): 36–57. https://doi.org/10.9734/ajrcos/2024/v17i12528.

Full text
Abstract:
This study examines the dual role of artificial intelligence (AI) in advancing and challenging global information governance and data security. By leveraging methodologies such as Hierarchical Cluster Analysis (HCA), Principal Component Analysis (PCA), Structural Equation Modeling (SEM), and Multi-Criteria Decision Analysis (MCDA), the study investigates AI-specific vulnerabilities, governance gaps, and the effectiveness of compliance frameworks. Data from the MITRE ATT&CK Framework, AI Incident Database, Global Cybersecurity Index (GCI), and National Vulnerability Database (NVD) form the empirical foundation for this analysis. Key findings reveal that AI-driven data breaches exhibit the highest regulatory scores (0.72) and dependency levels (0.81), underscoring the critical need for robust compliance frameworks in high-risk AI environments. PCA identifies regulatory gaps (45.3% variance) and AI technology type (30.2% variance) as significant factors influencing security outcomes. SEM highlights governance strength as a primary determinant of security effectiveness (coefficient = 0.68, p < 0.001), while MCDA underscores the importance of adaptability in governance frameworks for addressing AI-specific threats. The study recommends adopting quantum-resistant encryption, enhancing international cooperation, and integrating AI automation with human oversight to fortify governance structures. These insights provide actionable strategies for policymakers, industry leaders, and researchers to navigate the complexities of AI governance and align technological advancements with ethical and security imperatives in a rapidly evolving digital landscape.
APA, Harvard, Vancouver, ISO, and other styles
19

Kharbanda, Varun, Seetharaman A, and Maddulety K. "Journal." International Journal of Security and Privacy in Pervasive Computing 15, no. 1 (March 23, 2023): 1–13. http://dx.doi.org/10.4018/ijsppc.318676.

Full text
Abstract:
Artificial intelligence (AI) has emerged as the most widely applicable field across varied industries. Being an evolving technology, it may be quite useful in sensitive areas such as cyber security where there is a dire need for implementation of AI technologies, such as expert systems, neural networks, intelligent agents, and artificial immune systems. The primary reason for AI fitment to cyber security area is its ability to detect anomalies proactively and predictively in the network, thereby working towards securing the network before the damage related to loss of data and/or reputation is done. There are different types of AI technologies as mentioned above that could be applied in cyber security in its varied forms. In this paper, the emphasis is on specific AI technologies that can bring unique benefits to the cyber security field with its unique applicability to different scenarios. The outcome of this study shows that AI technologies such as expert systems, neural networks, intelligent agents, and artificial immune systems are transforming the landscape for managing cyber threats.
APA, Harvard, Vancouver, ISO, and other styles
20

Varadhan Krishnan, Varadharaj. "Scaling Security Incident Response with Generative AI." International Journal of Science and Research (IJSR) 13, no. 9 (September 5, 2024): 808–12. http://dx.doi.org/10.21275/sr24913085010.

Full text
APA, Harvard, Vancouver, ISO, and other styles
21

Ourzik, Victoria Yousra. "Security and safety concerns in the age of AI." International Conference on AI Research 4, no. 1 (December 4, 2024): 329–37. https://doi.org/10.34190/icair.4.1.3142.

Full text
Abstract:
Artificial Intelligence (AI) is transforming industries at an astonishing rate, reshaping how we live, work, and interact with technology. Yet, as AI becomes more pervasive, it brings urgent questions about security and safety. This article explores these critical issues, drawing a clear distinction between AI security and AI safety—two concepts that are often misunderstood but are crucial for responsible AI deployment. AI security focuses on protecting systems from external threats like data breaches, adversarial attacks, and unauthorized access. As AI systems increasingly handle sensitive data and control critical operations, securing them against such risks is essential. A breach or failure could compromise not only privacy but also the integrity of critical infrastructures. On the other hand, AI safety extends beyond technical defenses to the broader societal implications of AI. Issues like algorithmic bias, ethical decision-making, and unintended consequences of AI systems highlight the risks to human well-being. As AI becomes more autonomous, its alignment with human values and societal norms becomes paramount. Furthermore, the existential risks posed by advanced AI—such as loss of control or unintended outcomes—raise profound questions about the future of human-AI coexistence. This article delves into real-world case studies of AI failures and near-misses, offering tangible insights into the potential consequences of unchecked AI growth. It also explores strategies for mitigating these risks, balancing the pursuit of innovation with the need for transparency, accountability, and ethical oversight. As we look to the future, international cooperation and robust regulatory frameworks are essential to managing AI’s growing influence. By examining both technical and ethical dimensions, this article equips readers with a comprehensive understanding of AI security and safety, urging a proactive approach to managing the risks and harnessing the potential of this powerful technology.
APA, Harvard, Vancouver, ISO, and other styles
22

Shinde, Rucha, Shruti Patil, Ketan Kotecha, and Kirti Ruikar. "Blockchain for Securing AI Applications and Open Innovations." Journal of Open Innovation: Technology, Market, and Complexity 7, no. 3 (August 14, 2021): 189. http://dx.doi.org/10.3390/joitmc7030189.

Full text
Abstract:
Nowadays, open innovations such as intelligent automation and digitalization are being adopted by every industry with the help of powerful technology such as Artificial Intelligence (AI). This evolution drives systematic running processes, involves less overhead of managerial activities and increased production rate. However, it also gave birth to different kinds of attacks and security issues at the data storage level and process level. The real-life implementation of such AI-enabled intelligent systems is currently plagued by the lack of security and trust levels in system predictions. Blockchain is a prevailing technology that can help to alleviate the security risks of AI applications. These two technologies are complementing each other as Blockchain can mitigate vulnerabilities in AI, and AI can improve the performance of Blockchain. Many studies are currently being conducted on the applicability of Blockchains for securing intelligent applications in various crucial domains such as healthcare, finance, energy, government, and defense. However, this domain lacks a systematic study that can offer an overarching view of research activities currently going on in applying Blockchains for securing AI-based systems and improving their robustness. This paper presents a bibliometric and literature analysis of how Blockchain provides a security blanket to AI-based systems. Two well-known research databases (Scopus and Web of Science) have been examined for this analytical study and review. The research uncovered that idea proposals in conferences and some articles published in journals make a major contribution. However, there is still a lot of research work to be done to implement real and stable Blockchain-based AI systems.
APA, Harvard, Vancouver, ISO, and other styles
23

Bourair Al-Attar. "Network Security in AI-based healthcare systems." Babylonian Journal of Networking 2023 (November 30, 2023): 112–24. https://doi.org/10.58496/bjn/2023/015.

Full text
Abstract:
With the fast integration of artificial intelligence (AI) in healthcare, boosting diagnostics, treatment tailoring, and predictive analytics, securing patient data, and ensuring system integrity have become key challenges. This research examines the network security concerns particular to AI-based healthcare systems, attempting to uncover main vulnerabilities and assess viable protection strategies. Through a mix of systematic review and experimental validation, we tested numerous machines learning models, including convolutional neural networks (CNN), support vector machines (SVM), and random forests, against adversarial assaults that undermine model accuracy and data privacy. Results demonstrated that adversarial attacks might considerably impair model dependability, with accuracy decreases of up to 32% in CNN models under assault. However, adopting defensive strategies like adversarial training and defensive distillation dramatically increased model resilience, with post-defense accuracy rates returning by 15-25%. These results underline the necessity for strong network security policies suited to AI healthcare applications to guarantee both data protection and operational reliability. Our work adds useful insights on the adaptation of AI network security measures inside healthcare, identifying avenues for legislative updates and ongoing research to safeguard upcoming AI-driven health advances.
APA, Harvard, Vancouver, ISO, and other styles
24

Sarku, Rebecca, Ulfia A. Clemen, and Thomas Clemen. "The Application of Artificial Intelligence Models for Food Security: A Review." Agriculture 13, no. 10 (October 23, 2023): 2037. http://dx.doi.org/10.3390/agriculture13102037.

Full text
Abstract:
Emerging technologies associated with Artificial Intelligence (AI) have enabled improvements in global food security situations. However, there is a limited understanding regarding the extent to which stakeholders are involved in AI modelling research for food security purposes. This study systematically reviews the existing literature to bridge the knowledge gap in AI and food security, focusing on software modelling perspectives. The study found the application of AI models to examine various indicators of food security across six continents, with most studies conducted in sub-Saharan Africa. While research organisations conducting AI modelling were predominantly based in Europe or the Americas, their study communities were in the Global South. External funders also supported AI modelling research on food security through international universities and research institutes, although some collaborations with local organisations and external partners were identified. The analysis revealed three patterns in the application of AI models for food security research: (1) the exclusive utilisation of AI models to assess food security situations, (2) stakeholder involvement in some aspects of the AI modelling process, and (3) stakeholder involvement in AI modelling for food security through an iterative process. Overall, studies on AI models for food security were primarily experimental and lacked real-life implementation of the results with stakeholders. Consequently, this study concluded that research on AI, which incorporates feedback and/or the implementation of research outcomes for stakeholders, can contribute to learning and enhance the validity of the models in addressing food security challenges.
APA, Harvard, Vancouver, ISO, and other styles
25

Lisovskyi, Kostiantyn, and Gleb-David Rochenovich. "ARTIFICIAL INTELLIGENCE IN THE SECURITY SYSTEM OF ENTERPRISE." Grail of Science, no. 27 (May 25, 2023): 308–16. http://dx.doi.org/10.36074/grail-of-science.12.05.2023.049.

Full text
Abstract:
Artificial intelligence (AI) is transforming a number of business functions, including enterprise security systems. Recent years have seen an increase in the use of AI in security systems to detect and mitigate security threats. The purpose of this study is to investigate the use of AI in enterprise security systems. The study aims to identify the novelties in the application of AI to enterprise security systems, the research voids in the existing literature, and the benefits of AI to enterprise security systems. Existing research on the applicability of AI in enterprise security systems will be analyzed through a literature review methodology. The study will shed light on the use of artificial intelligence in enterprise security systems and its future implications.
APA, Harvard, Vancouver, ISO, and other styles
26

Grosse, Kathrin, Lukas Bieringer, Tarek R. Besold, Battista Biggio, and Alexandre Alahi. "When Your AI Becomes a Target: AI Security Incidents and Best Practices." Proceedings of the AAAI Conference on Artificial Intelligence 38, no. 21 (March 24, 2024): 23041–46. http://dx.doi.org/10.1609/aaai.v38i21.30347.

Full text
Abstract:
In contrast to vast academic efforts to study AI security, few real-world reports of AI security incidents exist. Released incidents prevent a thorough investigation of the attackers' motives, as crucial information about the company and AI application is missing. As a consequence, it often remains unknown how to avoid incidents. We tackle this gap and combine previous reports with freshly collected incidents to a small database of 32 AI security incidents. We analyze the attackers' target and goal, influencing factors, causes, and mitigations. Many incidents stem from non-compliance with best practices in security and privacy-enhancing technologies. In the case of direct AI attacks, access control may provide some mitigation, but there is little scientific work on best practices. Our paper is thus a call for action to address these gaps.
APA, Harvard, Vancouver, ISO, and other styles
27

Sunday Adeola Oladosu, Adebimpe Bolatito Ige, Christian Chukwuemeka Ike, Peter Adeyemo Adepoju, Olukunle Oladipupo Amoo, and Adeoye Idowu Afolabi. "AI-driven security for next-generation data centers: Conceptualizing autonomous threat detection and response in cloud-connected environments." GSC Advanced Research and Reviews 15, no. 2 (May 30, 2023): 162–72. https://doi.org/10.30574/gscarr.2023.15.2.0136.

Full text
Abstract:
The dynamic evolution of next-generation data centers, driven by cloud-native and hybrid architectures, has necessitated a paradigm shift in cybersecurity. Traditional security models, designed for static and on-premise environments, struggle to address the complexities of cloud-connected infrastructures and the rapidly evolving threat landscape. Emerging challenges, such as advanced persistent threats (APTs), ransomware, and insider attacks, demand sophisticated and adaptive security solutions. In this context, artificial intelligence (AI) emerges as a transformative technology capable of redefining threat detection and response mechanisms. This review explores the conceptualization of AI-driven security for next-generation data centers, focusing on autonomous threat detection and response. By leveraging AI and machine learning (ML), security systems can achieve real-time anomaly detection, advanced behavior analysis, and predictive risk assessment. These capabilities enhance the accuracy and speed of identifying malicious activities while reducing false positives. Additionally, autonomous response mechanisms, such as self-healing networks and adaptive security policies, enable rapid containment and mitigation of threats, minimizing potential damages. The review also discusses the integration of AI with existing Security Operations Centers (SOCs), highlighting its potential to augment human decision-making and automate repetitive tasks. Furthermore, it examines the role of advanced encryption, identity management, and compliance tools in fortifying security frameworks. Future trends, including the impact of 5G and edge computing, are explored, emphasizing their implications for real-time applications and IoT security. This study underscores the importance of proactive, AI-driven strategies in securing next-generation data centers, ensuring scalability, resilience, and robust protection in an increasingly interconnected digital landscape. By bridging the gap between cloud-native and on-premise environments, AI-powered security frameworks offer a promising path toward achieving autonomous, adaptive, and future-proof cybersecurity.
APA, Harvard, Vancouver, ISO, and other styles
28

Hu, Yupeng, Wenxin Kuang, Zheng Qin, Kenli Li, Jiliang Zhang, Yansong Gao, Wenjia Li, and Keqin Li. "Artificial Intelligence Security: Threats and Countermeasures." ACM Computing Surveys 55, no. 1 (January 31, 2023): 1–36. http://dx.doi.org/10.1145/3487890.

Full text
Abstract:
In recent years, with rapid technological advancement in both computing hardware and algorithm, Artificial Intelligence (AI) has demonstrated significant advantage over human being in a wide range of fields, such as image recognition, education, autonomous vehicles, finance, and medical diagnosis. However, AI-based systems are generally vulnerable to various security threats throughout the whole process, ranging from the initial data collection and preparation to the training, inference, and final deployment. In an AI-based system, the data collection and pre-processing phase are vulnerable to sensor spoofing attacks and scaling attacks, respectively, while the training and inference phases of the model are subject to poisoning attacks and adversarial attacks, respectively. To address these severe security threats against the AI-based systems, in this article, we review the challenges and recent research advances for security issues in AI, so as to depict an overall blueprint for AI security. More specifically, we first take the lifecycle of an AI-based system as a guide to introduce the security threats that emerge at each stage, which is followed by a detailed summary for corresponding countermeasures. Finally, some of the future challenges and opportunities for the security issues in AI will also be discussed.
APA, Harvard, Vancouver, ISO, and other styles
29

Malec, Norbert. "Sztuczna inteligencja a bezpieczeństwo państwa." Prawo i Bezpieczeństwo, no. 1 (2024) (June 10, 2024): 20–24. http://dx.doi.org/10.4467/29567610pib.24.002.19838.

Full text
Abstract:
Technologically advanced artificial intelligence (AI) is making a significant contribution to strengthening national security. AI algorithms facilitate the processing of vast amounts of information, increasing the speed and accuracy of decision-making. Artificial intelligence and machine learning (AI/ML) are crucial for state and integrated hybrid attacks and protecting new threats in cyberspace. Existing AI capabilities have significant potential to impact national security by leveraging existing machine learning technology for automation in labor-intensive activities such as satellite imagery analysis and defense against cyber attacks. This article examines selected aspects of the impact of artificial intelligence on enhancing a state’s ability to protect its interests and its citizens., artificial intelligence through the use of neutron networks, predictive analytics and machine learning algorithms enables security agencies to analyse vast amounts of data and identify patterns indicative of potential threats. Integrating artificial intelligence into surveillance, border control and threat assessment systems enhances the ability to respond preemptively to security challenges. In addition, artificial intelligence algorithms facilitate the processing of vast amounts of information, increasing the speed and accuracy of decision-making by police authorities. The rapid development of AI raises a number of questions for its use in securing not only national security but protecting all citizens. In particular, it is worth answering the question How does artificial intelligence affect national security and clarifying the issue of how law enforcement agencies can use artificial intelligence to maximise the benefits of the new technology in terms of security and protecting communities from rising crime. The analysis is based on a descriptive method in describing the phenomenon; by explaining the concepts and applications of artificial intelligence to determine its role in the national security sphere. An analysis of the usefulness of artificial intelligence in particular in police operations is undertaken, with the aim of defending the thesis that, despite some threats to the protection of human rights from AI, it is becoming the best tool in the fight against all types of crime in the country. Technological advances in AI can also have many positive effects for law enforcement, and useful for law enforcement agencies, for example in facilitating the identification of persons or vehicles, predicting trends in criminal activities, tracking illegal criminal activities or illegal money flows, flagging and responding to fake news. Artificial intelligence (AI) has emerged as one of the biggest threats to information security, but efforts are being made to mitigate this new threat, but also to find solutions on how AI can become an ally in the fight against cyber-security, crime and terrorist threats. Artificial intelligence algorithms search huge datasets of communication traffic, satellite images and social media posts to identify potential cyber security threats, terrorist activities and organized crime. It is advisable, when analyzing the opportunities and threats that AI poses to national and public security, to gain a strategic advantage in the context of rapid technological change and also to manage the many risks associated with AI. The conclusion highlights the impact of AI on national security, creating a range of new opportunities coupled with challenges that government agencies should be prepared for in addressing ethical and security dilemmas. Furthermore, AI improves predictive analytics, thereby enabling security agencies to more accurately anticipate potential threats and enhance their preparedness by identifying vulnerabilities in the national security infrastructure
APA, Harvard, Vancouver, ISO, and other styles
30

Chernysh, Roman, Mariia Chekhovska, Olena Stoliarenko, Olena Lisovska, and Andrii Lyseiuk. "Ensuring information security of critical infrastructure objects as a component to guarantee Ukraine’s national security." Revista Amazonia Investiga 12, no. 67 (August 30, 2023): 87–95. http://dx.doi.org/10.34069/ai/2023.67.07.8.

Full text
Abstract:
The purpose of the article is to define and justify the conceptual foundations of the implementation of the state policy on ensuring the information security of critical infrastructure objects, as a component of guaranteeing the national security of Ukraine. The methodological basis of the study was a set of general scientific and special methods of scientific knowledge: dialectical-phenomenological, systemic analysis and synthesis, structural-functional, deduction and induction, etc. According to the results of the research: the author's definition of the concepts «information security of critical infrastructure objects of Ukraine» and «threats to information security of critical infrastructure objects of Ukraine» was formulated; the elements of the system of threats to the information security of critical infrastructure objects of Ukraine are identified; the factors leading to the emergence of threats to critical infrastructure objects of Ukraine are singled out and groups of basic measures aimed at countering traditional and new threats to the information security of critical infrastructure objects of Ukraine are formulated.
APA, Harvard, Vancouver, ISO, and other styles
31

Akhtar, Zarif Bin, and Ahmed Tajbiul Rawol. "Enhancing Cybersecurity through AI-Powered Security Mechanisms." IT Journal Research and Development 9, no. 1 (October 13, 2024): 50–67. http://dx.doi.org/10.25299/itjrd.2024.16852.

Full text
Abstract:
In the rapidly evolving landscape of digital technology, the proliferation of interconnected systems has brought unprecedented opportunities and challenges. Among these challenges, the escalating frequency and sophistication of cyberattacks pose significant threats to individuals, organizations, and nations. In response, the fusion of Cybersecurity and Artificial Intelligence (AI) has emerged as a pivotal paradigm, offering proactive, intelligent, and adaptable defense mechanisms. This research explores the transformative impacts of AI-powered security on cybersecurity, demonstrating how AI techniques, including machine learning, natural language processing, and anomaly detection, fortify digital infrastructures. By analyzing vast volumes of data at speeds beyond human capacity, AI-driven cybersecurity systems can identify subtle patterns indicative of potential threats, allowing for early detection and prevention. The exploration consolidates existing studies, highlighting the trends and gaps that this research addresses. Expanded results and discussions provide a detailed analysis of the practical benefits and challenges of AI applications in cybersecurity, including case studies that offer concrete evidence of AI's impact. Novel contributions are emphasized through comparisons with other studies, showcasing improvements in accuracy, precision, recall, and F-score metrics, which demonstrate the effectiveness of AI in enhancing cybersecurity measures. The synergy between AI and human expertise is explored, highlighting how AI-driven tools augment human analysts' capabilities. Ethical considerations and the "black box" nature of AI algorithms are addressed, advocating for transparent and interpretable AI models to foster trust and collaboration between man and machine. The challenges posed by adversarial AI, where threat actors exploit AI system vulnerabilities, are examined. Strategies for building robust AI security mechanisms, including adversarial training, model diversification, and advanced threat modeling, are discussed. The research also emphasizes a holistic approach that combines AI-driven automation with human intuition and domain knowledge. As AI continues to rapidly evolve, a proactive and dynamic cybersecurity posture can be established, bolstering defenses, mitigating risks, and ensuring the integrity of our increasingly interconnected digital world.
APA, Harvard, Vancouver, ISO, and other styles
32

Yoshida, Kota, and Takeshi Fujino. "Hardware Security on Edge AI Devices." IEICE ESS Fundamentals Review 15, no. 2 (October 1, 2021): 88–100. http://dx.doi.org/10.1587/essfr.15.2_88.

Full text
APA, Harvard, Vancouver, ISO, and other styles
33

Yan, Zheng, Willy Susilo, Elisa Bertino, Jun Zhang, and Laurence T. Yang. "AI-driven data security and privacy." Journal of Network and Computer Applications 172 (December 2020): 102842. http://dx.doi.org/10.1016/j.jnca.2020.102842.

Full text
APA, Harvard, Vancouver, ISO, and other styles
34

E, Subhashini, Swathi M, Vijayalakshmi V, and Ms Pavaiyarkarasi R. "Border Security Robot Using AI Technology." International Research Journal on Advanced Science Hub 6, no. 04 (April 27, 2024): 63–66. http://dx.doi.org/10.47392/irjash.2024.011.

Full text
APA, Harvard, Vancouver, ISO, and other styles
35

Sandhu, Dr Reema. "HARNESSING AI FOR CYBER SECURITY CHALLENGES." International Journal of Engineering Science and Humanities 14, Special Issue 1 (May 1, 2024): 151–56. http://dx.doi.org/10.62904/tat1v276.

Full text
Abstract:
Although human beings possess intelligence but still lack the capabilities to understand the problem and in finding solutions to them. However, when it comes to mitigating errors in operational tasks and finding deviations, artificial intelligence is leading human ability and is competing in every domain. Artificial intelligence is contributing in assessing errors that human beings are making vulnerably. It can help to protect organizations from Internet threats, identify types of malware, ensure practical security standards and help create better prevention and recovery strategies as a solution to cyber security. In this research paper, it is highlighted on how AI technologies and applications can contribute to cyber security, the opportunities provided by AI to different people and organisations and the potential challenges faced while relying completely on AI. The recommendations while implementing AI solutions are discussed followed by conclusion in the end.
APA, Harvard, Vancouver, ISO, and other styles
36

M, Remaya. "AI Chatbots Could Weaken National Security." Scientific American 329, no. 5 (December 2023): 73. http://dx.doi.org/10.1038/scientificamerican1223-73.

Full text
APA, Harvard, Vancouver, ISO, and other styles
37

Nikam, Rugved Lav. "AI Driven Innovations in Cyber Security." International Journal for Research in Applied Science and Engineering Technology 12, no. 4 (April 30, 2024): 829–36. http://dx.doi.org/10.22214/ijraset.2024.59803.

Full text
Abstract:
Abstract: The explosion of cyber threats presents a huge challenge to traditional cyber security methods, requiring the integration of advanced technologies such as artificial intelligence. This research paper provides an in-depth analysis of the current landscape of AI applications in cybersecurity. We will look at different AI techniques, such as machine learning, deep learning, natural language processing and anomaly detection, and explain their role in improving threat detection, incident response and vulnerability management. In addition, we explore AI-based cybersecurity challenges such as competitor attacks, data protection issues, and model interpretability. Based on recent advances and emerging trends, we propose future research directions to address these challenges and realize the full potential of AI to protect digital assets and critical infrastructure. Our synthesis aims to inform policymakers, industry participants and researchers about the transformative impact of AI on cybersecurity and inspire collaboration to build resilient and adaptive defenses in the face of evolving cyber threats.
APA, Harvard, Vancouver, ISO, and other styles
38

Tan, Yu-an, Qikun Zhang, Yuanzhang Li, and Xiao Yu. "AI-Driven Network Security and Privacy." Electronics 13, no. 12 (June 13, 2024): 2311. http://dx.doi.org/10.3390/electronics13122311.

Full text
APA, Harvard, Vancouver, ISO, and other styles
39

Berghel, Hal. "Bruce Schneier on AI Security (Interview)." Computer 57, no. 11 (November 2024): 99–101. http://dx.doi.org/10.1109/mc.2024.3441868.

Full text
APA, Harvard, Vancouver, ISO, and other styles
40

Ogiela, Marek R., and Urszula Ogiela. "AI for Security of Distributed Systems." WSEAS TRANSACTIONS ON COMPUTER RESEARCH 12 (October 21, 2024): 450–54. http://dx.doi.org/10.37394/232018.2024.12.44.

Full text
Abstract:
Cryptographic techniques are currently used in computer security systems designed to guarantee the integrity and security of encrypted information. They are based on advanced cryptographic algorithms that can also operate on a public key infrastructure. Such algorithms can also be based on user keys and personalized approaches applied to encrypt data and create VPN tunnels. The paper will present new possibilities of using artificial intelligence algorithms in the creation of new protocols designed to guarantee the cybersecurity of distributed computer systems. Artificial intelligence techniques can find application in such an area, especially in the analysis of protocol security, and can also be applied to the creation of new protocols dedicated to specific remote services, which will provide a greater level of security and allow better data protection.
APA, Harvard, Vancouver, ISO, and other styles
41

Reddy, Haritha Madhava. "Role of AI in Security Compliance." Journal of Artificial Intelligence & Cloud Computing 3, no. 3 (June 30, 2024): 1–3. http://dx.doi.org/10.47363/jaicc/2024(3)e194.

Full text
Abstract:
Artificial Intelligence (AI) has emerged as a pivotal tool in enhancing security compliance across various industries. Its ability to analyze vast datasets, detect intricate patterns, and automate complex processes significantly improves risk management and regulatory adherence.
APA, Harvard, Vancouver, ISO, and other styles
42

Kim, Geunhye, and Kyudong Park. "Effect of AI." Tehnički glasnik 18, no. 1 (January 30, 2024): 29–36. http://dx.doi.org/10.31803/tg-20230218142012.

Full text
Abstract:
Abstract: Artificial intelligence (AI) is considered a vital factor that will fundamentally alter the cybersecurity environment. AI technology is progressing much faster than expected, and AI-based security services are being introduced into the global security market on a daily basis. However, how AI can contribute to the cybersecurity field and what changes it will bring remain unknown. Nonetheless, cybersecurity is not merely a technical issue but also a process for dealing with regulations, policies, and security risks; therefore, the introduction of AI technology introduction can make a fundamental difference in cybersecurity policy as a whole. This study primarily aims to better understand the concept and characteristics of AI from the cybersecurity perspective and identify its future implications on cybersecurity environment at the national policy level. This study predicts what modifications will be made to national cybersecurity strategies (NCSS) when machine learning (ML) is introduced and implemented. It also provides a basic policy recommendation that offers potential responses to these changes. The study first describes the emergence of AI in the cybersecurity field and explains AI-ML technical services and AI security policy elements. Second, through NCSS material analysis, this study categorizes NCSS into 11 categories and selects the critical functions of each dimension. Finally, it predicts the changes that will occur when AI is introduced within the selected NCSS category. It also introduces the priorities and considerations required for these changes.
APA, Harvard, Vancouver, ISO, and other styles
43

Arefin, Sabira. "Strengthening Healthcare Data Security with Ai-Powered Threat Detection." International Journal of Scientific Research and Management (IJSRM) 12, no. 10 (October 7, 2024): 1477–83. http://dx.doi.org/10.18535/ijsrm/v12i10.ec02.

Full text
Abstract:
As the healthcare industry undergoes rapid digital transformation, the need for robust cybersecurity measures has never been more critical. AI-driven solutions, such as Machine Learning (ML) and anomaly detection, are proving to be pivotal in securing healthcare data. These technologies enable healthcare organizations to identify cyber threats proactively, automate incident response, and enhance data security. Furthermore, AI's ability to provide continuous network monitoring, predictive analytics, and real-time anomaly detection offers healthcare providers the tools needed to mitigate risks before they escalate. This research highlights the key applications of AI in healthcare data security, including its effectiveness in vulnerability management and regulatory compliance. It also delves into the ethical and operational challenges of integrating AI-driven threat detection systems into healthcare settings, including concerns related to bias in AI models, regulatory hurdles, and the complexity of AI system integration into existing healthcare infrastructures. In a 2023 study, Accenture reported that AI-based cybersecurity systems reduced detection and response time by up to 60%, illustrating how AI accelerates response to potential data breaches​. Similarly, HIMSS noted that the risk of data breaches in healthcare could be halved by AI technologies that continuously monitor and analyze data​. These findings emphasize AI's role in minimizing the delays and errors typically associated with human-driven responses​. AI techniques such as supervised, unsupervised, and semi-supervised learning play a crucial role in anomaly detection. These models identify irregular patterns in healthcare systems, flagging potential threats even when subtle​. For example, deep learning approaches, including Convolutional Neural Networks (CNNs) and Recurrent Neural Networks (RNNs), can uncover outliers in healthcare data, enhancing system security​. The ability of AI to continuously learn from previous attacks ensures that systems evolve with emerging threats, further solidifying its place in healthcare cybersecurity​. Additionally, AI aids in predictive analytics, which can forecast future cyber threats based on historical data, allowing healthcare providers to address vulnerabilities proactively​. By leveraging such capabilities, AI not only safeguards sensitive patient data but also enables healthcare institutions to stay compliant with stringent regulatory standards like HIPAA and GDPR​. However, AI implementation in healthcare security comes with its own challenges. Integrating AI into legacy systems requires substantial infrastructure upgrades, and the complexity of dynamic encryption can strain system resources​. Furthermore, the ethical concerns surrounding AI, such as the transparency of decision-making processes and potential bias in AI algorithms, must be carefully managed to ensure equitable and effective security solutions​
APA, Harvard, Vancouver, ISO, and other styles
44

Kashyap, Suman. "The Influence of Artificial Intelligence on Cybersecurity." International Journal of Innovative Research in Computer and Communication Engineering 12, Special Is (March 25, 2024): 13–22. http://dx.doi.org/10.15680/ijircce.2024.1203503.

Full text
Abstract:
As the digital landscape continues to evolve, the integration of Artificial Intelligence (AI) into various sectors has become increasingly prevalent. One significant area where AI is exerting a profound impact is data system security. This paper explores the multifaceted influence of AI on enhancing the security measures employed to safeguard sensitive data within diverse technological environments. The first section elucidates how AI technologies, particularly machine learning algorithms, empower security systems to adapt dynamically to emerging threats. By analyzing vast datasets in real-time, AI-driven security solutions can identify anomalous patterns and potential vulnerabilities, enabling proactive threat mitigation and rapid response capabilities. Furthermore, the paper discusses the role of AI in automating routine security tasks, thereby alleviating the burden on human operators and reducing the likelihood of human error. Through intelligent automation, AI streamlines security operations, enhances efficiency, and enables organizations to allocate resources more effectively to address sophisticated cyber threats. Moreover, the utilization of AI for predictive analytics is explored, highlighting its ability to forecast potential security breaches based on historical data and emerging trends. By leveraging predictive insights, organizations can preemptively fortify their defenses, preempting cyberattacks before they occur and minimizing potential damages. Additionally, the paper examines the ethical considerations inherent in AI-driven security systems, emphasizing the importance of transparency, accountability, and bias mitigation. While AI holds immense potential for bolstering data system security, ethical dilemmas such as privacy infringements and discriminatory practices necessitate careful scrutiny and regulatory oversight. Lastly, the paper outlines future directions and challenges in leveraging AI for data system security, including the need for continued research and development to enhance the robustness and reliability of AI algorithms, as well as the imperative for collaboration between industry stakeholders, policymakers, and cybersecurity experts to navigate the evolving threat landscape effectively. As the digital landscape continues to evolve, the integration of artificial intelligence (AI) has become increasingly imperative in fortifying security measures across various domains. This abstract delves into the multifaceted role of AI in bolstering security, encompassing its applications in threat detection, anomaly recognition, and decisionmaking processes. In conclusion, this paper underscores the transformative impact of AI on data system security, illuminating its capacity to revolutionize threat detection, mitigation, and response strategies. By harnessing the power of AI-driven technologies responsibly and ethically, organizations can fortify their defenses against an increasingly sophisticated array of cyber threats, thereby safeguarding critical data assets and preserving trust in digital ecosystems.
APA, Harvard, Vancouver, ISO, and other styles
45

Nycz, Mariusz, Mirosław Hajder, and Sara Nienajadlo. "Methods for increasing security of web servers." Annales Universitatis Mariae Curie-Sklodowska, sectio AI – Informatica 16, no. 2 (December 22, 2017): 39. http://dx.doi.org/10.17951/ai.2016.16.2.39.

Full text
Abstract:
<p>This article is addressed in most part to people dealing with security of web servers. This paper begins with presenting the statistical dimension of the issue of data security in the modern Internet. This paper begins with presenting statistics dealing with issues of data security on the modern World Wide Web. The authors main focus in this work is presenting the challenges of dealing with security and protection of web communication. The work analyses the security of implementing SSL/TLS (Secure Socket Layer/Transport Layer Security) protocol and proposes a new method of increasing security of web servers. This article is addressed to people dealing with analysis and security of web servers.</p>
APA, Harvard, Vancouver, ISO, and other styles
46

Burdina, Anna A., Anna V. Bondarenko, Nataliya V. Moskvicheva, and Narmina O. Melik-Aslanova. "Management of complex economic security of enterprises: empirical test in Russia." Revista Amazonia Investiga 10, no. 46 (October 25, 2021): 303–10. http://dx.doi.org/10.34069/ai/2021.46.10.30.

Full text
Abstract:
There is a new meaningful interpretation of the concept of "integrated economic security of industrial enterprise"; the problems of analyzing complex economic security are substantiated. Based on the study of the regulatory and legal and methodological support of the process of managing economic security in modern economic and political conditions, generalizations and analysis of existing practice in Russia and abroad, the main shortcomings in approaches to assessing the integrated economic security of industrial enterprises have been identified. The article examines the methods for assessing economic security: matrix, product, operational, dynamic one and methods of assessment based on the market value of the company. The parameters of the integrated economic security of industrial enterprise are classified: financial and economic security, information, technological, material and technical, personnel, epidemiological security, conceptual model for assessing financial and economic and integrated security of enterprise has been developed. The practical implementation of the proposed developments has been carried out. It is recommended to use the developed model of economic security management as enterprise resource planning (ERP) module of the enterprise system.
APA, Harvard, Vancouver, ISO, and other styles
47

Clark, Tim. "Practical Security." ITNOW 65, no. 4 (November 23, 2023): 49. http://dx.doi.org/10.1093/itnow/bwad131.

Full text
APA, Harvard, Vancouver, ISO, and other styles
48

Cao, Xiyu. "The application of artificial intelligence in internet security." Applied and Computational Engineering 18, no. 1 (October 23, 2023): 230–35. http://dx.doi.org/10.54254/2755-2721/18/20230995.

Full text
Abstract:
The global integration of the internet has led to a significant increase in the importance of cybersecurity. Artificial Intelligence (AI) has emerged as a viable solution for enhancing cybersecurity measures. AI has the potential to improve the speed and effectiveness of detecting and responding to cyber threats. This study explores the intersection of network security and AI, with a focus on the various ways in which AI can be used to enhance network security, such as intrusion detection, malware detection, and behavioural analytics. The study also examines the potential risks associated with AI in cybersecurity, including the possibility of AI being utilized for cyber-attacks. Additionally, the study discusses the challenges associated with implementing AI for network security, such as the lack of available large datasets for AI training, network infrastructure complexity, and the requirement for skilled AI professionals in cybersecurity. Ethical considerations arising from the use of AI in network security are also addressed. The study emphasizes the need for a balanced approach towards integrating AI into cybersecurity measures, taking into account potential benefits and challenges.
APA, Harvard, Vancouver, ISO, and other styles
49

Pidbereznykh, Inna, Oleg Koval, Yevhen Solomin, Vitaliy Kryvoshein, and Tetyana Plazova. "Ukrainian policy in the field of information security." Revista Amazonia Investiga 11, no. 60 (December 30, 2022): 206–13. http://dx.doi.org/10.34069/ai/2022.60.12.22.

Full text
Abstract:
The article analyzes the modern challenges of the time, which shape the information security policy of Ukraine. The paper analyzes the approaches to the definition of information security to understand this concept. Conclusions are made that information security is a constant movement, changeable, versatile concept, which cannot be stable. The article studies the information security of Ukraine as a component in the system of international information security. It is established that in the conditions of war, the role of information security of Ukraine in the international community has sharply increased. Ukraine's policy in the sphere of economic security is clearly marked in its legislation and meets the challenges of our time. The article presents a list of the main threats to the information security of the country: threats to independence and sovereignty through hybrid, information warfare by the aggressor state Russia, threats in the systems of the interaction of state bodies, threats related to the media, threats due to the lack of awareness and culture of information security among the population. Conclusions are made that future cases in the field of information security will be related to the elimination of threats. A list of goals for achieving information security is presented.
APA, Harvard, Vancouver, ISO, and other styles
50

Vereshchak, Vasyl, Bohdan Holjanych, Kostiantyn Mamchur, Hlib Smoliar, and Pavlo Terpiak. "Regional (continental) security: emphases of 2022." Revista Amazonia Investiga 11, no. 54 (August 30, 2022): 30–40. http://dx.doi.org/10.34069/ai/2022.54.06.3.

Full text
Abstract:
The intensification of the processes of globalization, regionalization, geopoliticization and the desire of countries to integrate into the world financial, economic and social-political space lead to the emergence of new challenges and dangers and intensification of existing ones in the field of regional political and security cooperation. The strengthening of military activity on the territory of sovereign countries, the lack of a peaceful settlement of regional conflict situations, and the growth of tension and instability require regional cooperation in the fight against common threats on the basis of ensuring the implementation of the principles of international law. Regarding the results of the research on the features of ensuring regional (continental) security under the influence of challenges and threats in 2022, it has been established that there are four groups from among the countries of the world that are characterized by common features of ensuring regional (continental) security, namely: highly developed countries that are able to ensure a high level of security, the efficiency of its management and the stability of state governance; countries with a relatively high level of development that ensure high standards of regional (continental) security, however, significant efforts are directed to solving security issues; countries with an intermediate level of development that are significantly influenced by other countries and are in a state of struggle for the redistribution of spheres of influence; countries with a low level of development that have not completed the process of transformational restructuring and require strengthened measures in order to ensure regional (continental) security.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography