Integrating Communications and Surveillance Technologies for effective community policing in Nigeria

OO Otuu - Extended Abstracts of the CHI Conference on Human …, 2024 - dl.acm.org
My research investigates how technologically enhanced community policing (CP) approach
can curb crime and insecurity in Nigeria, by efficiently integrating communications and …

[PDF][PDF] Deepfakes and Cybersecurity: Detection and Mitigation

R Shad, P Broklyn, A Egon - 2024 - easychair.org
Deepfake technology, which leverages advanced artificial intelligence (AI) and machine
learning techniques to create hyper-realistic but fabricated media, has emerged as a …

[PDF][PDF] The Evolving Thread Landscape PF Ai-Powered Cyberattacks: a Multi-Faceted Approach to Defense and Mitigate

R Shad, P Broklyn, A Egon - 2024 - easychair.org
The advent of artificial intelligence (AI) has revolutionized numerous industries, enhancing
efficiency and innovation. However, this technological advancement also presents a …

[PDF][PDF] Federated Learning Approaches for Privacy-Preserving Malware Detection

B Klinton, P Broklyn, S Kashar - 2024 - easychair.org
The rapid growth of malware poses a significant threat to the security and privacy of
individuals and organizations. Traditional malware detection approaches rely on centralized …

[PDF][PDF] The Intersection of Artificial Intelligence and Cybersecurity

A Olukemi, P Broklyn, S Adablanu - 2024 - easychair.org
The rapid advancement of artificial intelligence (AI) has brought about significant changes in
various industries, including cybersecurity. This paper aims to explore the intersection of AI …

[PDF][PDF] Adversarial Machine Learning for Robust Intrusion Detection Systems

F Olaoye, P Broklyn, S Adablanu - 2024 - easychair.org
Intrusion detection systems (IDS) play a crucial role in safeguarding computer networks
against malicious activities. However, traditional IDS can be vulnerable to adversarial …

[PDF][PDF] AI-Powered Threat Intelligence: Automating Cyber Threat Analysis and Prediction

R Shad, P Broklyn, K Potter - 2024 - easychair.org
Abstract AI-powered Threat Intelligence (AITI) has emerged as a promising approach to
automate and enhance the analysis and prediction of cyber threats. In this study, we explore …

[PDF][PDF] Explainable AI in Network Anomaly Detection: Enhancing Transparency and Trust

B Klinton, A Egon, S Kashar - 2024 - easychair.org
Network anomaly detection plays a crucial role in ensuring the security and reliability of
computer networks. With the rapid advancement of Artificial Intelligence (AI) techniques, the …

[PDF][PDF] THE CYBERSECURITY IMPLICATION OF EXTENDED REALITY TECHNOLOGIES: SAFEGUARDING USERS IN IMMERSIVE ENVIRONMENTS

C Bell, P Broklyn, A Egon - researchgate.net
The rapid advancement of Extended Reality (XR) technologies, encompassing Virtual
Reality (VR), Augmented Reality (AR), and Mixed Reality (MR), has transformed the way …

[PDF][PDF] THE ETHNICAL IMPLICATION OF AUTONOMOUS CYBERSECURITY WITH TRANSPARENCY AND ACCOUNTABILITY

C Bell, P Broklyn, A Egon - researchgate.net
As cybersecurity technology evolves, the integration of autonomous systems powered by
artificial intelligence (AI) and machine learning (ML) is becoming increasingly prevalent …