Artificial intelligence for cybersecurity: a systematic mapping of literature

I Wiafe, FN Koranteng, EN Obeng, N Assyne… - IEEE …, 2020 - ieeexplore.ieee.org
Due to the ever-increasing complexities in cybercrimes, there is the need for cybersecurity
methods to be more robust and intelligent. This will make defense mechanisms to be …

A systematic overview of the machine learning methods for mobile malware detection

Y Kim, JJ Lee, MH Go, HY Kang… - Security and …, 2022 - Wiley Online Library
With the deployment of the 5G cellular system, the upsurge of diverse mobile applications
and devices has increased the potential challenges and threats posed to users. Industry and …

Leveraging AI/ML for anomaly detection, threat prediction, and automated response.

OA Ajala - 2024 - preprints.org
The rapid evolution of information and communication technologies, notably the Internet,
has yielded substantial benefits while posing challenges to information system security. With …

Cyber security and the role of intelligent systems in addressing its challenges

Y Harel, IB Gal, Y Elovici - ACM Transactions on Intelligent Systems and …, 2017 - dl.acm.org
We are living in a unique period of history, and the current technology revolution will be
among the most dramatic societal transformations remembered by humanity. The important …

Proposed framework for network lateral movement detection based on user risk scoring in siem

AAA Lah, RA Dziyauddin… - 2018 2nd International …, 2018 - ieeexplore.ieee.org
Network lateral movement or simply called lateral movement is the latest techniques used by
cyber attackers to progressively move through a network while they search and gathered …

Effective Community Detection Over Streaming Bipartite Networks (Technical Report)

N Zhang, Y Ye, YWX Lian, M Chen - arXiv preprint arXiv:2411.01424, 2024 - arxiv.org
The streaming bipartite graph is extensively used to model the dynamic relationship
between two types of entities in many real-world applications, such as movie …

Co-similar malware infection patterns as a predictor of future risk

A Yavneh, R Lothan, D Yamin - PloS one, 2021 - journals.plos.org
The internet is flooded with malicious content that can come in various forms and lead to
information theft and monetary losses. From the ISP to the browser itself, many security …

Web security and vulnerability: A literature review

H Yulianton, H Warnars, B Soewito… - Journal of Physics …, 2020 - iopscience.iop.org
The web continues to grow and attacks against the web continue to increase. This paper
focuses on the literature review on scanning web vulnerabilities and solutions to mitigate …

[PDF][PDF] Searching for the strong AI for cybersecurity

DE Vorobieva, AS Petrenko… - Proceedings of the XI …, 2021 - academia.edu
Currently, the creation of strong artificial intelligence (eng. Strong Artificial Intelligence (AI))
to ensure the required cybersecurity of digital platforms Industry 4.0 is one of the most …

Artificial intelligence a human mind tool saving from cybercrimes and cyber threats

B Singh, R Choudhary, A Sharma… - International Journal of …, 2022 - indianjournals.com
Cyber security has become a major concern in the digital era. The breach in data, cracking
the captcha, identity theft, and other such offences has affected millions of peoples in their …