Security and privacy for 6G: A survey on prospective technologies and challenges

VL Nguyen, PC Lin, BC Cheng… - … Surveys & Tutorials, 2021 - ieeexplore.ieee.org
Sixth-generation (6G) mobile networks will have to cope with diverse threats on a space-air-
ground integrated network environment, novel technologies, and an accessible user …

The ai-based cyber threat landscape: A survey

N Kaloudi, J Li - ACM Computing Surveys (CSUR), 2020 - dl.acm.org
Recent advancements in artificial intelligence (AI) technologies have induced tremendous
growth in innovation and automation. Although these AI technologies offer significant …

Deep Q-learning based reinforcement learning approach for network intrusion detection

H Alavizadeh, H Alavizadeh, J Jang-Jaccard - Computers, 2022 - mdpi.com
The rise of the new generation of cyber threats demands more sophisticated and intelligent
cyber defense solutions equipped with autonomous agents capable of learning to make …

Artificial intelligence crime: An overview of malicious use and abuse of AI

TF Blauth, OJ Gstrein, A Zwitter - Ieee Access, 2022 - ieeexplore.ieee.org
The capabilities of Artificial Intelligence (AI) evolve rapidly and affect almost all sectors of
society. AI has been increasingly integrated into criminal and harmful activities, expanding …

Artificial intelligence in the cyber domain: Offense and defense

TC Truong, QB Diep, I Zelinka - Symmetry, 2020 - mdpi.com
Artificial intelligence techniques have grown rapidly in recent years, and their applications in
practice can be seen in many fields, ranging from facial recognition to image analysis. In the …

Open-sourcing highly capable foundation models: An evaluation of risks, benefits, and alternative methods for pursuing open-source objectives

E Seger, N Dreksler, R Moulange, E Dardaman… - arXiv preprint arXiv …, 2023 - arxiv.org
Recent decisions by leading AI labs to either open-source their models or to restrict access
to their models has sparked debate about whether, and how, increasingly capable AI …

A survey on cyber situation-awareness systems: Framework, techniques, and insights

H Alavizadeh, J Jang-Jaccard, SY Enoch… - ACM Computing …, 2022 - dl.acm.org
Cyberspace is full of uncertainty in terms of advanced and sophisticated cyber threats that
are equipped with novel approaches to learn the system and propagate themselves, such as …

Computational intelligence enabled cybersecurity for the internet of things

S Zhao, S Li, L Qi, L Da Xu - IEEE Transactions on Emerging …, 2020 - ieeexplore.ieee.org
The computational intelligence (CI) based technologies play key roles in campaigning
cybersecurity challenges in complex systems such as the Internet of Things (IoT), cyber …

[PDF][PDF] Artificial intelligence and the offence-defence balance in cyber security

ME Bonfanti - Cyber Security: Socio-Technological Uncertainty …, 2022 - library.oapen.org
A first subsection defines artificial intelligence–then, the chapter introduces recent AI
initiatives in the private sector and on the state level. A third subsection moves on to outline …

A survey on artificial intelligence in malware as next-generation threats

CT Thanh, I Zelinka - Mendel, 2019 - ib-b2b.test.infv.eu
Recent developments in Artificial intelligence (AI) have a vast transformative potential for
both cybersecurity defenders and cybercriminals. Anti-malware solutions adopt intelligent …