[HTML][HTML] Artificial intelligence for cybersecurity: Literature review and future research directions

R Kaur, D Gabrijelčič, T Klobučar - Information Fusion, 2023 - Elsevier
Artificial intelligence (AI) is a powerful technology that helps cybersecurity teams automate
repetitive tasks, accelerate threat detection and response, and improve the accuracy of their …

Explainable artificial intelligence in cybersecurity: A survey

N Capuano, G Fenza, V Loia, C Stanzione - Ieee Access, 2022 - ieeexplore.ieee.org
Nowadays, Artificial Intelligence (AI) is widely applied in every area of human being's daily
life. Despite the AI benefits, its application suffers from the opacity of complex internal …

A secure network model against bot attacks in edge-enabled industrial Internet of Things

VA Memos, KE Psannis, Z Lv - IEEE Transactions on Industrial …, 2022 - ieeexplore.ieee.org
The new Industry 4.0 standard has offered many advantages to the industries improving
their production rate since it evaluates novel cutting-edge technologies like artificial …

Systematic Literature Review of IoT Botnet DDOS Attacks and Evaluation of Detection Techniques

M Gelgi, Y Guan, S Arunachala, M Samba Siva Rao… - Sensors, 2024 - mdpi.com
Internet of Things (IoT) technology has become an inevitable part of our daily lives. With the
increase in usage of IoT Devices, manufacturers continuously develop IoT technology …

[HTML][HTML] H-DOCTOR: Honeypot based firewall tuning for attack prevention

MR Amal, P Venkadesh - Measurement: Sensors, 2023 - Elsevier
A honeypot is a well-known entrapment technique used by network and Internet of Things
(IoT) security professionals to lure intruders. Unlike traditional security measures, they can …

Counter denial of service for next-generation networks within the artificial intelligence and post-quantum era

S Darzi, AA Yavuz - arXiv preprint arXiv:2408.04725, 2024 - arxiv.org
Given the rise in cyber threats to networked systems, coupled with the proliferation of AI
techniques and enhanced processing capabilities, Denial of Service (DoS) attacks are …

Engineering the Human Mind: Social Engineering Attack Using Kali Linux

JW James - SN Computer Science, 2023 - Springer
This in-depth review article examines social engineering attacks and their implementation
through the Kali Linux operating system, delving into the background and significance of …

Enhancing Security in Cloud Computing Using Artificial Intelligence (AI)

D Stutz, JT de Assis, AA Laghari… - … Analytics and Cyber …, 2024 - Wiley Online Library
Cloud computing (CC) technologies (viz artificial intelligence (AI), data science,
blockchain,“big data”(BD), etc.) are progressively widespread and practically applied …

NFV-based scheme for effective protection against bot attacks in AI-enabled IoT

VA Memos, KE Psannis - IEEE Internet of Things Magazine, 2022 - ieeexplore.ieee.org
The Internet of Things (IoT) is the upcoming network that aspires to interconnect “things” to
each other and to the Internet. Many such “things” like smart devices and wireless sensors …

[PDF][PDF] A safer future: Leveraging the AI power to improve the cybersecurity in critical infrastructures.

M Volk - Electrotechnical Review/Elektrotehniski Vestnik, 2024 - ev.fe.uni-lj.si
In the intricate landscape of the cybersecurity, critical infrastructures represent the most vital
systems underpinning the societal and economic wellbeing, with their disruption or …