Articoli di riviste sul tema "AI security"
Cita una fonte nei formati APA, MLA, Chicago, Harvard e in molti altri stili
Vedi i top-50 articoli di riviste per l'attività di ricerca sul tema "AI security".
Accanto a ogni fonte nell'elenco di riferimenti c'è un pulsante "Aggiungi alla bibliografia". Premilo e genereremo automaticamente la citazione bibliografica dell'opera scelta nello stile citazionale di cui hai bisogno: APA, MLA, Harvard, Chicago, Vancouver ecc.
Puoi anche scaricare il testo completo della pubblicazione scientifica nel formato .pdf e leggere online l'abstract (il sommario) dell'opera se è presente nei metadati.
Vedi gli articoli di riviste di molte aree scientifiche e compila una bibliografia corretta.
Chen, Hsinchun. "AI and Security Informatics". IEEE Intelligent Systems 25, n. 5 (settembre 2010): 82–90. http://dx.doi.org/10.1109/mis.2010.116.
Testo completoAgrawal, Jatin, Samarjeet Singh Kalra e Himanshu Gidwani. "AI in cyber security". International Journal of Communication and Information Technology 4, n. 1 (1 gennaio 2023): 46–53. http://dx.doi.org/10.33545/2707661x.2023.v4.i1a.59.
Testo completoBS, Guru Prasad, Dr Kiran GM e Dr Dinesha HA. "AI-Driven cyber security: Security intelligence modelling". International Journal of Multidisciplinary Research and Growth Evaluation 4, n. 6 (2023): 961–65. http://dx.doi.org/10.54660/.ijmrge.2023.4.6.961-965.
Testo completoAbudalou, Mohammad Ali. "Security DevOps: Enhancing Application Delivery with Speed and Security". International Journal of Computer Science and Mobile Computing 13, n. 5 (30 maggio 2024): 100–104. http://dx.doi.org/10.47760/ijcsmc.2024.v13i05.009.
Testo completoReddy, Haritha Madhava. "Role of AI in Security Compliance". INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, n. 11 (23 novembre 2024): 1–6. http://dx.doi.org/10.55041/ijsrem32650.
Testo completoGudimetla, Sandeep Reddy, e Niranjan Reddy Kotha. "AI-POWERED THREAT DETECTION IN CLOUD ENVIRONMENTS". Turkish Journal of Computer and Mathematics Education (TURCOMAT) 9, n. 1 (8 aprile 2018): 638–42. http://dx.doi.org/10.61841/turcomat.v9i1.14730.
Testo completoPoonia, Ramesh Chandra. "Securing the Sustainable Future : Cryptography and Security in AI & IoT". Journal of Discrete Mathematical Sciences and Cryptography 27, n. 4 (2024): i—vii. http://dx.doi.org/10.47974/jdmsc-27-4-foreword.
Testo completoSengupta, Abhijeet. "Securing the Autonomous Future A Comprehensive Analysis of Security Challenges and Mitigation Strategies for AI Agents". INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, n. 12 (24 dicembre 2024): 1–2. https://doi.org/10.55041/ijsrem40091.
Testo completoSamijonov, Nurmukhammad Y. "AI FOR INFORMATION SECURITY AND CYBERSPACE". American Journal of Applied Science and Technology 3, n. 10 (1 ottobre 2023): 39–43. http://dx.doi.org/10.37547/ajast/volume03issue10-08.
Testo completoSamijonov, Nurmukhammad Y. "EMERGING SECURITY CONCERNS BECAUSE OF AI USAGE". Journal of Social Sciences and Humanities Research Fundamentals 3, n. 11 (1 novembre 2023): 43–46. http://dx.doi.org/10.55640/jsshrf-03-11-10.
Testo completoKim, Tae Min. "Development Tasks of AI-based Security Industry". Korean Society of Private Security 23, n. 1 (30 marzo 2024): 181–210. http://dx.doi.org/10.56603/jksps.2024.23.1.181.
Testo completoFish, Ian. "Ethics in AI Security Implications". ITNOW 60, n. 2 (2018): 34. http://dx.doi.org/10.1093/itnow/bwy046.
Testo completoFarhat, Syeda Lamima, Likhitha Tubati, Metrine Osiemo e Rushit Dave. "AI-Based Home Security System". International Journal of Computer Science and Information Technology 16, n. 2 (28 aprile 2024): 37–42. http://dx.doi.org/10.5121/ijcsit.2024.16204.
Testo completoEl-Hadi, Mohamed. "Generative AI Poses Security Risks". مجلة الجمعية المصرية لنظم المعلومات وتکنولوجيا الحاسبات 34, n. 34 (1 gennaio 2024): 72–73. http://dx.doi.org/10.21608/jstc.2024.338476.
Testo completoNallam, Madhuri. "AI Privacy Policies and Security". African Journal of Biological Sciences 6, Si4 (8 luglio 2024): 908–18. http://dx.doi.org/10.48047/afjbs.6.si4.2024.908-918.
Testo completoOseremi Onesi-Ozigagun, Yinka James Ololade, Nsisong Louis Eyo-Udo e Damilola Oluwaseun Ogundipe. "AI-driven biometrics for secure fintech: Pioneering safety and trust". International Journal of Engineering Research Updates 6, n. 2 (30 aprile 2024): 001–12. http://dx.doi.org/10.53430/ijeru.2024.6.2.0023.
Testo completoBin Muhammad, Mohd Hilal, Zulhazlin Bin Abas, Anas Suzastri Bin Ahmad e Mohd Sufyan Bin Sulaiman. "AI-Driven Security: Redefining Security Informations Systems within Digital Governance". International Journal of Research and Innovation in Social Science VIII, n. IX (2024): 2923–36. http://dx.doi.org/10.47772/ijriss.2024.8090245.
Testo completoKolade, Titilayo Modupe, Nsidibe Taiwo Aideyan, Seun Michael Oyekunle, Olumide Samuel Ogungbemi, Dooshima Louisa Dapo-Oyewole e Oluwaseun Oladeji Olaniyi. "Artificial Intelligence and Information Governance: Strengthening Global Security, through Compliance Frameworks, and Data Security". Asian Journal of Research in Computer Science 17, n. 12 (4 dicembre 2024): 36–57. https://doi.org/10.9734/ajrcos/2024/v17i12528.
Testo completoKharbanda, Varun, Seetharaman A e Maddulety K. "Journal". International Journal of Security and Privacy in Pervasive Computing 15, n. 1 (23 marzo 2023): 1–13. http://dx.doi.org/10.4018/ijsppc.318676.
Testo completoVaradhan Krishnan, Varadharaj. "Scaling Security Incident Response with Generative AI". International Journal of Science and Research (IJSR) 13, n. 9 (5 settembre 2024): 808–12. http://dx.doi.org/10.21275/sr24913085010.
Testo completoOurzik, Victoria Yousra. "Security and safety concerns in the age of AI". International Conference on AI Research 4, n. 1 (4 dicembre 2024): 329–37. https://doi.org/10.34190/icair.4.1.3142.
Testo completoShinde, Rucha, Shruti Patil, Ketan Kotecha e Kirti Ruikar. "Blockchain for Securing AI Applications and Open Innovations". Journal of Open Innovation: Technology, Market, and Complexity 7, n. 3 (14 agosto 2021): 189. http://dx.doi.org/10.3390/joitmc7030189.
Testo completoBourair Al-Attar. "Network Security in AI-based healthcare systems". Babylonian Journal of Networking 2023 (30 novembre 2023): 112–24. https://doi.org/10.58496/bjn/2023/015.
Testo completoSarku, Rebecca, Ulfia A. Clemen e Thomas Clemen. "The Application of Artificial Intelligence Models for Food Security: A Review". Agriculture 13, n. 10 (23 ottobre 2023): 2037. http://dx.doi.org/10.3390/agriculture13102037.
Testo completoLisovskyi, Kostiantyn, e Gleb-David Rochenovich. "ARTIFICIAL INTELLIGENCE IN THE SECURITY SYSTEM OF ENTERPRISE". Grail of Science, n. 27 (25 maggio 2023): 308–16. http://dx.doi.org/10.36074/grail-of-science.12.05.2023.049.
Testo completoGrosse, Kathrin, Lukas Bieringer, Tarek R. Besold, Battista Biggio e Alexandre Alahi. "When Your AI Becomes a Target: AI Security Incidents and Best Practices". Proceedings of the AAAI Conference on Artificial Intelligence 38, n. 21 (24 marzo 2024): 23041–46. http://dx.doi.org/10.1609/aaai.v38i21.30347.
Testo completoSunday Adeola Oladosu, Adebimpe Bolatito Ige, Christian Chukwuemeka Ike, Peter Adeyemo Adepoju, Olukunle Oladipupo Amoo e Adeoye Idowu Afolabi. "AI-driven security for next-generation data centers: Conceptualizing autonomous threat detection and response in cloud-connected environments". GSC Advanced Research and Reviews 15, n. 2 (30 maggio 2023): 162–72. https://doi.org/10.30574/gscarr.2023.15.2.0136.
Testo completoHu, Yupeng, Wenxin Kuang, Zheng Qin, Kenli Li, Jiliang Zhang, Yansong Gao, Wenjia Li e Keqin Li. "Artificial Intelligence Security: Threats and Countermeasures". ACM Computing Surveys 55, n. 1 (31 gennaio 2023): 1–36. http://dx.doi.org/10.1145/3487890.
Testo completoMalec, Norbert. "Sztuczna inteligencja a bezpieczeństwo państwa". Prawo i Bezpieczeństwo, n. 1 (2024) (10 giugno 2024): 20–24. http://dx.doi.org/10.4467/29567610pib.24.002.19838.
Testo completoChernysh, Roman, Mariia Chekhovska, Olena Stoliarenko, Olena Lisovska e Andrii Lyseiuk. "Ensuring information security of critical infrastructure objects as a component to guarantee Ukraine’s national security". Revista Amazonia Investiga 12, n. 67 (30 agosto 2023): 87–95. http://dx.doi.org/10.34069/ai/2023.67.07.8.
Testo completoAkhtar, Zarif Bin, e Ahmed Tajbiul Rawol. "Enhancing Cybersecurity through AI-Powered Security Mechanisms". IT Journal Research and Development 9, n. 1 (13 ottobre 2024): 50–67. http://dx.doi.org/10.25299/itjrd.2024.16852.
Testo completoYoshida, Kota, e Takeshi Fujino. "Hardware Security on Edge AI Devices". IEICE ESS Fundamentals Review 15, n. 2 (1 ottobre 2021): 88–100. http://dx.doi.org/10.1587/essfr.15.2_88.
Testo completoYan, Zheng, Willy Susilo, Elisa Bertino, Jun Zhang e Laurence T. Yang. "AI-driven data security and privacy". Journal of Network and Computer Applications 172 (dicembre 2020): 102842. http://dx.doi.org/10.1016/j.jnca.2020.102842.
Testo completoE, Subhashini, Swathi M, Vijayalakshmi V e Ms Pavaiyarkarasi R. "Border Security Robot Using AI Technology". International Research Journal on Advanced Science Hub 6, n. 04 (27 aprile 2024): 63–66. http://dx.doi.org/10.47392/irjash.2024.011.
Testo completoSandhu, Dr Reema. "HARNESSING AI FOR CYBER SECURITY CHALLENGES". International Journal of Engineering Science and Humanities 14, Special Issue 1 (1 maggio 2024): 151–56. http://dx.doi.org/10.62904/tat1v276.
Testo completoM, Remaya. "AI Chatbots Could Weaken National Security". Scientific American 329, n. 5 (dicembre 2023): 73. http://dx.doi.org/10.1038/scientificamerican1223-73.
Testo completoNikam, Rugved Lav. "AI Driven Innovations in Cyber Security". International Journal for Research in Applied Science and Engineering Technology 12, n. 4 (30 aprile 2024): 829–36. http://dx.doi.org/10.22214/ijraset.2024.59803.
Testo completoTan, Yu-an, Qikun Zhang, Yuanzhang Li e Xiao Yu. "AI-Driven Network Security and Privacy". Electronics 13, n. 12 (13 giugno 2024): 2311. http://dx.doi.org/10.3390/electronics13122311.
Testo completoBerghel, Hal. "Bruce Schneier on AI Security (Interview)". Computer 57, n. 11 (novembre 2024): 99–101. http://dx.doi.org/10.1109/mc.2024.3441868.
Testo completoOgiela, Marek R., e Urszula Ogiela. "AI for Security of Distributed Systems". WSEAS TRANSACTIONS ON COMPUTER RESEARCH 12 (21 ottobre 2024): 450–54. http://dx.doi.org/10.37394/232018.2024.12.44.
Testo completoReddy, Haritha Madhava. "Role of AI in Security Compliance". Journal of Artificial Intelligence & Cloud Computing 3, n. 3 (30 giugno 2024): 1–3. http://dx.doi.org/10.47363/jaicc/2024(3)e194.
Testo completoKim, Geunhye, e Kyudong Park. "Effect of AI". Tehnički glasnik 18, n. 1 (30 gennaio 2024): 29–36. http://dx.doi.org/10.31803/tg-20230218142012.
Testo completoArefin, Sabira. "Strengthening Healthcare Data Security with Ai-Powered Threat Detection". International Journal of Scientific Research and Management (IJSRM) 12, n. 10 (7 ottobre 2024): 1477–83. http://dx.doi.org/10.18535/ijsrm/v12i10.ec02.
Testo completoKashyap, Suman. "The Influence of Artificial Intelligence on Cybersecurity". International Journal of Innovative Research in Computer and Communication Engineering 12, Special Is (25 marzo 2024): 13–22. http://dx.doi.org/10.15680/ijircce.2024.1203503.
Testo completoNycz, Mariusz, Mirosław Hajder e Sara Nienajadlo. "Methods for increasing security of web servers". Annales Universitatis Mariae Curie-Sklodowska, sectio AI – Informatica 16, n. 2 (22 dicembre 2017): 39. http://dx.doi.org/10.17951/ai.2016.16.2.39.
Testo completoBurdina, Anna A., Anna V. Bondarenko, Nataliya V. Moskvicheva e Narmina O. Melik-Aslanova. "Management of complex economic security of enterprises: empirical test in Russia". Revista Amazonia Investiga 10, n. 46 (25 ottobre 2021): 303–10. http://dx.doi.org/10.34069/ai/2021.46.10.30.
Testo completoClark, Tim. "Practical Security". ITNOW 65, n. 4 (23 novembre 2023): 49. http://dx.doi.org/10.1093/itnow/bwad131.
Testo completoCao, Xiyu. "The application of artificial intelligence in internet security". Applied and Computational Engineering 18, n. 1 (23 ottobre 2023): 230–35. http://dx.doi.org/10.54254/2755-2721/18/20230995.
Testo completoPidbereznykh, Inna, Oleg Koval, Yevhen Solomin, Vitaliy Kryvoshein e Tetyana Plazova. "Ukrainian policy in the field of information security". Revista Amazonia Investiga 11, n. 60 (30 dicembre 2022): 206–13. http://dx.doi.org/10.34069/ai/2022.60.12.22.
Testo completoVereshchak, Vasyl, Bohdan Holjanych, Kostiantyn Mamchur, Hlib Smoliar e Pavlo Terpiak. "Regional (continental) security: emphases of 2022". Revista Amazonia Investiga 11, n. 54 (30 agosto 2022): 30–40. http://dx.doi.org/10.34069/ai/2022.54.06.3.
Testo completo