Applications of artificial intelligence techniques to combating cyber crimes: A review

S Dilek, H Çakır, M Aydın - arXiv preprint arXiv:1502.03552, 2015 - arxiv.org
With the advances in information technology (IT) criminals are using cyberspace to commit
numerous cyber crimes. Cyber infrastructures are highly vulnerable to intrusions and other …

[PDF][PDF] Artificial intelligence for cybersecurity: A systematic mapping of literature

IA Mohammed - Artif. Intell, 2020 - researchgate.net
This paper discussed how artificial intelligence (AI) may be used to address cybersecurity
issues. Although secure communication between people, services, and devices is possible …

Artificial intelligence in cyber defense

E Tyugu - 2011 3rd International conference on cyber conflict, 2011 - ieeexplore.ieee.org
The speed of processes and the amount of data to be used in defending the cyber space
cannot be handled by humans without considerable automation. However, it is difficult to …

Towards next-generation intrusion detection

R Koch - 2011 3rd International Conference on Cyber Conflict, 2011 - ieeexplore.ieee.org
Today, Intrusion Detection Systems (IDS) are integral components of larger networks. Even
so, security incidents are on a day-to-day basis: Numerous data leakage scandals arouse …

Application of artificial intelligence in cybersecurity

S Verma, N Gupta - Innovations in Computer Science and Engineering …, 2020 - Springer
This paper provides an introduction to application of artificial intelligence (AI) could solve the
problems in cybersecurity. The physical gadgets and human impedance are insufficient for …

Artificial intelligence-based solutions for cyber security problems

M Yildirim - artificial intelligence paradigms for smart cyber …, 2021 - igi-global.com
Due to its nature, cyber security is one of the fields that can benefit most from the techniques
of artificial intelligence (AI). Under normal circumstances, it is difficult to write software to …

[PDF][PDF] Survey on the applications of artificial intelligence in cyber security

SB Atiku, AU Aaron, GK Job, F Shittu… - International Journal of …, 2020 - researchgate.net
the rise in cyber attacks has overwhelmed the monetary resources and human ability to
analyze and combat every new form of cyber threat in the cyber security industry. With the …

[PDF][PDF] Makine öğrenmesi teknikleriyle saldırı tespiti: Karşılaştırmalı analiz

Ç Kaya, O Yildiz - Marmara University Journal of Science, 2014 - avesis.gazi.edu.tr
Özet İnternet, günlük hayatımızın vazgeçilmez bir parçasıdır. Artan web uygulamaları ve
kullanıcı sayısı, veri güvenliği açısından bazı riskleri de beraberinde getirmiştir. Ağ güvenliği …

Cyber attacks of a power grid analysis using a deep neural network approach

DI Dogaru, I Dumitrache - Journal of Control Engineering and Applied …, 2019 - ceai.srait.ro
The integration of new technologies into the power grid leads to a growing, complex,
interconnected system that is exposed to various cyber vulnerabilities. A power grid …

A multi-theoretical literature review on information security investments using the resource-based view and the organizational learning theory

E Weishäupl, E Yasasin, G Schryen - 2015 - epub.uni-regensburg.de
The protection of information technology (IT) has become and is predicted to remain a key
economic challenge for organizations. While research on IT security investment is fast …