- Awards Season
- Big Stories
- Pop Culture
- Video Games
A Comprehensive Guide to the Basics of Artificial Intelligence
Artificial intelligence (AI) is a rapidly growing field that has the potential to revolutionize the way we interact with technology. AI is a complex topic, but understanding the basics can help you make informed decisions about how to use it in your business. In this guide, we’ll cover the fundamentals of AI, including what it is, how it works, and its potential applications.
What Is Artificial Intelligence?
At its core, artificial intelligence is a branch of computer science that focuses on creating machines and software that can think and act like humans. AI systems are designed to learn from their environment and make decisions based on what they learn. This means they can be used to automate processes, recognize patterns, and even solve complex problems. AI is used in many different industries, from healthcare to finance to manufacturing.
How Does Artificial Intelligence Work?
AI systems are powered by algorithms that allow them to process data and make decisions. These algorithms are typically based on machine learning techniques such as supervised learning and unsupervised learning. Supervised learning involves providing an AI system with labeled data so it can learn from it; unsupervised learning involves allowing an AI system to explore data without any labels or guidance. Both techniques enable an AI system to identify patterns in data and make predictions about future outcomes.
Potential Applications of Artificial Intelligence
The potential applications of AI are virtually limitless. It can be used for everything from automated customer service agents to self-driving cars to medical diagnosis tools. In addition, AI can be used for predictive analytics, natural language processing (NLP), facial recognition, and much more. As the technology continues to advance, we’ll see more innovative uses for AI in our everyday lives.
In conclusion, artificial intelligence is a powerful tool that has the potential to revolutionize many different industries. Understanding the basics of how it works and its potential applications can help you make informed decisions about how you use it in your business or personal life.
This text was generated using a large language model, and select text has been reviewed and moderated for purposes such as readability.
MORE FROM ASK.COM
We apologize for the inconvenience...
To ensure we keep this website safe, please can you confirm you are a human by ticking the box below.
If you are unable to complete the above request please contact us using the below link, providing a screenshot of your experience.
Please solve this CAPTCHA to request unblock to the website
Academia.edu no longer supports Internet Explorer.
To browse Academia.edu and the wider internet faster and more securely, please take a few seconds to upgrade your browser .
Enter the email address you signed up with and we'll email you a reset link.
- We're Hiring!
- Help Center
Artificial Intelligence in Cyber Security - A Review
by International Journal of Scientific Research in Science and Technology IJSRST
2021, International Journal of Scientific Research in Science and Technology
In this paper we are going to discuss how Artificial Intelligence (AI) can be used to address cyber security issues and cyber-threats. Cyber security is a vast growing field since the last decade. So the number of applications as well as the number of threats are rising continuously. This paper discuss the uses of Artificial Intelligence in cyber security and also shed some light on the disadvantages.
Free Related PDFs
Security is the most vital part of working in any organization. For nations, we need national security, for homes we need home security. Similarly, for protecting our cyberspace we need Cyber Security. During recent times only, we have seen automation in our strategies to defend our cyberspace. Also, as everything gets digitized, the need for security of the digital world is more than ever. But are we able to defend ourselves? There has been a "42 percent increase in cybersecurity incidents in companies" according to a report by Capgemini. We need to be prepared beforehand as the number of attacks and attackers is increasing but the increase in numbers of defenders of cyberspace is not as such. This paper aims to showcase the advancements of Artificial Intelligence and how this technology converges with the field of Cyber Security. The security of a computer system is essential in its functioning. Artificial Intelligence solutions if properly implemented are proved help...
2022, International Journal for Research in Applied Science & Engineering Technology (IJRASET)
The cyber security industry's financial resources and human abilities to assess and battle every new type of cyber danger have been overwhelmed by the surge in cyber assaults. With the rise of the digital world, there is a rising quantity of personal and financial data that has to be secured against cyber-attacks. In reality, cyber assaults may devastate an organization's reputation or cause it to fail totally. This study investigates the use of artificial intelligence (AI) to improve cyber security. Artificial intelligence has advanced to the point that it has surpassed human capability in activities like data analytics. The analysis indicated that using AI to regulate cyber attacks has both benefits and drawbacks the benefits exceed the drawbacks. This study discovers that AI systems are likely to increase the safety of customers and enterprises in cyberspace due to the fast and efficient technology necessary to operate them  .
The speed of processes and also the quantity of knowledge to be utilized in defensive the cyber area cannot be handled by humans while not sizeable automation. However, it is troublesome to develop software system with standard mounted algorithms (hard-wired logic on deciding level) for effectively defensive against the dynamically evolving attacks in networks. This example may be handled by applying strategies of computing that offer flexibility and learning capability to software system. This paper presents a quick survey of computing applications in cyber security, and analyzes the prospects of enhancing the cyber security capabilities by suggests that of accelerating the intelligence of the security systems. Once measuring the papers obtainable regarding AI applications in cyber security, we will conclude that helpful applications exist already. They belong; initial of all, to applications of artificial neural nets in perimeter security and a few alternative cyber security areas. From the opposite facet – it has become obvious that several cyber security issues may be resolved with success only strategies of AI are getting used. For instance, wide information usage is critical in deciding, and intelligent call support is one in all however unresolved issues in cyber security.
In this era when the technology has come so far with a tremendous advancement in internet of things and connected devices, the experts of Cyber Security are facing a lot of issues. They need all the support that they can get to help them prevent the cyber-attacks and security breaches The organizations being more connected than ever is leading to heavy traffic, increase in security attack vectors, breaches in security and a lot more threats in the cyber are that is becoming more and more difficult to handle by humans alone. Developing a software system with standard logic for effectively defending against the growing cyber-attacks is however bothersome. On the other hand, the problems of cyber security can be efficiently resolved using the strategies involving AI.
Atiku Baba Shidawa , Achi Aaron , zaharaddeen ismail , Goteng K . Job
the rise in cyber attacks has overwhelmed the monetary resources and human ability to analyze and combat every new form of cyber threat in the cyber security industry. With the increasing digital presence, there is a large amount of personal and financial information that should be protected from cyber attacks. In fact, cyber attacks can ruin the reputation of an organization or letdown the organization completely. This research examines the use of AI in the enhancement of cyber security. Recent developments in artificial intelligence are transformational and have exceeded the level of human performance in tasks such as data analytics. The study adopted the thematic literature review method, and data were sourced from Google scholar, science direct, research gates, academia, and others. The investigation revealed that application of AI in controlling cyber attack has advantages and disadvantages; however, the advantages outweigh the disadvantages. This researcher discovers that with...
Syed Adnan Jawaid
Artificial Intelligence has transformed the cyber security industry by enabling organizations to systematize and enlarge outdated safety procedures. AI can provide more effective threat detection and response capabilities, enhance vulnerability management, and improve compliance and governance. AI technologies such as machine learning, natural language processing, behavioral analytics, and deep learning can enhance cyber security defenses and protect against a wide range of cyber threats, including malware, phishing attacks, and insider threats. Theoretical underpinnings of AI in cyber security, such as machine learning, natural language processing, behavioral analytics, and deep learning, are discussed. The advantages of using AI in cyber security are discussed including speed and accuracy, continuous learning and adaptation, and efficiency and scalability. It's important to note that AI is not a silver bullet for cyber security and should be used in conjunction with other security measures to provide a comprehensive defense strategy. AI has transformed the way cyber security operates in today's digital age. By analyzing vast amounts of data quickly and accurately it has become a valuable tool for organizations looking to protect their assets from cyber threats.
Cyber-attackers unit investment automation technology to launch strikes, whereas many organisations unit still victimisation manual efforts to mixture internal security findings and contextualising them with external threat data. Victimisation these ancient ways that, it'll take weeks or months to sight intrusions, throughout that amount attackers can exploit vulnerabilities to compromise systems and extract info. To wear down these challenges, progressive organisations unit exploring the employment of AI (AI) in their regular cyber risk management operations. The speed of processes and conjointly the amount of data to be used in defensive the cyberspace can't be handled by humans whereas not sizeable automation. However, it's hard to develop code with customarily mounted algorithms (hard-wired logic on deciding level) for effectively defensive against the dynamically evolving attacks in networks. this instance is also handled by applying methods of computing that supply...
In today's digital era, the emerge of IOT and linked devices, cyber security experts come across a lot of encounters. The specialists require all the aid to overcome attacks, security cracks, its affects and respond to the attacks. A lot of linked workplaces lead to heavy traffic, high security attack vectors, security breaches and many more that the cyber environment cannot be handled by humans without sizeable automation. It is not easy to create software managed system with standard working algorithms (hard-wired logic on deciding level) for successfully cautious against the prominently growing attacks in networks. It is a evident fact that number of cyber security problems are now settled as an add on with progress only procedures of Artificial Intelligence techniques unit acquiring utilized. Cyber Security applications and analyses can now be moulded with AI applications and its existing methods.
2023, International Journal of Innovative Science and Research Technology
Due to the expansion of the internet of things and connected devices, cyber security professionals in the modern digital world face a significant number of challenges. Experts require all available resources in order to both respond to attacks and prevent further security breaches. Due to factors such as heavy traffic, an increase in the number of security attack vectors, security vulnerabilities, and many others, the number of connected workplaces renders it impossible for humans to govern cyberspace without significant automation. However, designing software systems with conventionally mounted algorithms (decision-making logic that is hardwired) can be difficult. These algorithms are necessary to provide an effective defence against the growing number of network hazards. It is now common knowledge that adopting problem-solving strategies based on artificial intelligence is the key to effectively addressing the vast majority of cyber security issues currently being addressed. This article provides a concise analysis of cyber security applications for computers. In addition, it investigates the perspectives on how to enhance cyber security capabilities by providing applications that utilise artificial intelligence, in addition to the current methods
FREE RELATED PAPERS
The work paper aims to underline the benefits of using Artificial Intelligence to improve the business productivity, and in the same time to address awareness in order to overcome fear in exploring new technology, because of cyber-attacks. How vulnerable are businesses to computerization? 100%. Internet is a virtual space available for everyone. Storing data on any device that can be connected to the internet can become vulnerable in any given second. This article comes to show how we can use cybersecurity to protect our business, presenting in the same time cases of risk management form Malta.
The current year has seen unprecedented amount of hacker/ransomware attacks on government as well as private enterprises spread all across the world. Shadow Brokers came in form this year by leaking alleged NSA tools, which included a Windows exploit known as EternalBlue. In May, WannaCry ransomware crippled hundreds of thousands of computers belonging to public utilities, large corporations, and private citizens. It also affected National Health Service hospitals and facilities in the United Kingdom. It was halted in its tracks by utilising its flaws and activating a kill switch. WannaCry rode on Shadow Brokers leak of Windows OS weakness EternalBlue and the fact that the Windows MS17-010 patch had not been updated on many machines by the users. In June, Petya (also known as NotPetya/ Nyetya/Goldeneye) infected machines worldwide. It is suspected that its main target was to carry out a cyber-attack on Ukraine. It hit various utility services in Ukraine including the central bank, power companies, airports, and public transportation1. In 2009, Conficker2 worm had infected civil and defence establishments of many nations, for example, the UK DOD had reported large-scale infection of its major computer systems including ships, submarines, and establishments of Royal Navy. The French Naval computer network 'Intramar' was infected, the network had to be quarantined, and air operations suspended. The German Army also reported infection of over a hundred of its computers. Conficker sought out flaws in Windows OS software and propagated by forming a botnet, it was very difficult to weed it out because it used a combination of many advanced malware techniques. It became the largest known computer worm infection by afflicting millions of computers in over 190 countries. It is evident from the above incidents, which have the capability to inflict damage to both military and public institutions, that the amount of data and the speeds at which processing is required in case of cyber defence is beyond the capacity of human beings. Conventional algorithms are also unable to tackle dynamically changing data during a cyber-attack. Therefore, there is an increasing opinion that effective cyber defence can only be provided by real time flexible Artificial Intelligence (AI) systems with learning capability. The US Defence Science Board report of 20133 states that " in a perfect world, DOD operational systems would be able to tell a commander when and if they were compromised, whether the system is still usable in full or degraded mode, identify alternatives to aid the commander in completing the mission, and finally provide the ability to restore the system to a known, trusted state. Today's technology does not allow that level of fidelity and understanding of systems. " The report brings out that, systems such as automated intrusion detection, automated patch management, status data from each network, and regular network audits are currently unavailable. As far as cyber defence in military is concerned, in the US, it is the responsibility of the Cyber Command to " protect, monitor, analyze, detect, and respond to unauthorized activity within DOD information systems and computer networks " 4. The offensive cyber operations could involve both military and intelligence agencies since both computer network exploitation and computer network attacks are involved. The commander of Cyber Command is also the Director of National Security Agency, thus enabling the Cyber Command to execute computer exploitations that may result in physical destruction of military or civilian infrastructure of the adversary. AI utilizes a large number of concepts like, Machine Learning, Fuzzy Logic Control Systems, and Artificial Neural Networks (ANNs), etc. each of which singly or in combination are theoretically amenable for designing an efficient cyber-defence systems. The designed AI cyber defence system should proficiently monitor the network in real time and must be aware
IJSES Editor , Samah Mohammed
In light of the technical developments and the amount of data used and the sources available in the network and the various devices that expose it to a cyber attack, it has become necessary to use advanced technologies that have the ability to search for any threat and discovered it and prevent it from causing damage. The attack, which means that it may be used negatively to achieve damage, which makes it imperative for us to update and develop the methods used and databases. In this paper, the study was focused on the most important information about artificial intelligence, cyber attack and the advantages of artificial intelligence AI-Based approach for defending against cyberspace attacks and Defense Strategy For Artificial Intelligence Adversarial attack, and finally AI applications of security threats in cyberattack. It is a narrative review summarizes the findings of some existing literature for readers from outside the field who require a rapid and general summary in the role of artificial intelligence in cyber attacks.
Dr. Bibhu Dash
Modern Artificial Intelligence breakthroughs are proving to become the finest alternative for defending against cyber-attacks. Experts are employing artificial intelligence (AI) and its component machine learning as a technique for combating cyber-attacks. Currently, security analysts employ this technology to detect abnormalities, saving time and money for the company. Cyber specialists are facing challenging times in our digital era, especially with the explosion of IoT and connected gadgets. The experts require all available resources to prevent assaults and security flaws, as well as to respond to attacks. Artificial intelligence solutions can improve overall security execution and provide greater security from a rising variety of complex cyber threats, where traditional security systems may be less competent and insufficient. In this study, we look at how human reasoning and AI can be used to improve cyber security. The major goal of this research is to highlight the progress that has been accomplished so far in the field of using AI approaches to combat cyber-attacks.
BOHR International Journal of Engineering (BIJE)
2022, BOHR publishers
Artificial intelligence (AI) and expert systems are essential and vital tools to counter potentially dangerous threats in cyber security. The protection of data requires skilled cyber security technicians for various types of roles. The essential role of an expert system is to monitor the threats and assist the technician to strengthen security. The system uses various datasets like a machine and deep learning as well as reinforced learning in order to make intelligent decisions. The Internet of things (IoT) is one of the major concerns for cyber security because it is potentially the second most likely vulnerable link in the cyber security environment because an attacker can easily gain access to the system by breaching any IoT device that is connected to the system. Still human is the strongest and potentially the weakest link in the cyber security environment. This review intends to present AI and expert systems for cyber security.
2021, Wireless Communications and Mobile Computing
Devices are increasingly getting connected to the internet with the advances in technologies called the Internet of Things (IoT). The IoTs are the physical device in which are embedded with software, sensors, among other technologies. Linking and switching data resources with other devices, IoT has been recognized to be a trending research arena due to the world’s technological advancement. Every stage of technology avails several capacities, for instance, the IoT avails any device, anyone, any service, any technological path or any network, any place, and any context to be connected. The effective IoT applications permit public and private business organizations to regulate their assets, optimize the performance of the business, and develop new business models. In this study, we scrutinize the IoT progress as an approach to the technological upgrade through analyzing traits, architectures, applications, enabling technologies, and future challenges. To enable an aging society, and o...
cyberthreats have increased extensively during the last decade. Cybercriminals have become more sophisticated. Current security controls are not enough to defend networks from the number of highly skilled cybercriminals. Cybercriminals have learned how to evade the most sophisticated tools, such as Intrusion Detection and Prevention Systems (IDPS), and botnets are almost invisible to current tools. Fortunately, the application of Artificial Intelligence (AI) may increase the detection rate of IDPS systems, and Machine Learning (ML) techniques are able to mine data to detect botnets’ sources. However, the implementation of AI may bring other risks, and cybersecurity experts need to find a balance between risk and benefits.
The increasing threats of increasingly complex and frequent attacks make awkward a strong defensive position. Recent serious data breaches, such as those of the US Government Human Resources (OPM) department, have made headlines and the demand for better security has increased. As a result, today's decision makers demand better protection. In the face of new daily cyber threats, IT experts fear violations and the destruction or manipulation of data. This leads to significantly increased expenditure. According to Gartner's research, the data security market will exceed $ 1, 000, 000, 000.00 by 2019. In this environment, a new technology based on artificial intelligence and machine training emerges that is redefining device protection - and thus, security. With the use of predictive and predictive techniques to detect attacks before they are executed and outside the system architecture, artificial intelligence is much more than just a technical innovation, it is a paradigm shift of philosophy and understanding. Artificial Intelligence (AI) as a subfield of computer science performs cognitive skills such as learning, planning, or problem-solving in computer systems.
International Research Group - IJET JOURNAL
Due to its ability to evaluate security threats in real-time and take appropriate action, artificial intelligence has emerged as a key component of cyber security. AI now has a bigger impact on spotting and stopping attacks that keep businesses on the cutting edge. Threat detection and prevention are the main focus of AI's role in cybersecurity. Artificial intelligence can detect trends and anomalies in network traffic and user behavior that may indicate a potential cyberattack through the use of machine learning algorithms and advanced data analysis. This allows security personnel to respond to potential attacks quickly and proactively. Through predictive modeling, AI can be used to prevent attacks. AI also can recognize potential threats before they occur and take action to avoid them by assessing past attacks and detecting similarities. Creating automated incident response systems is another important function of artificial intelligence in cybersecurity. These systems can evaluate data, identify potential risks, and then work to contain or mitigate the attack, minimizing damage and disruption. Businesses must employ artificial intelligence in cybersecurity to protect their networks and sensitive data from ever changing online threats. Because of its ability to analyze vast volumes of data in real time and automate incident response, AI is swiftly becoming into a key tool for efficient cybersecurity in today's digital environment. In this paper, we will discuss the role of AI in cybersecurity including its uses in threat detection and prevention.
Kushagra Pal , Roopam Tiwari
2018, International Research Journal of Engineering and Technology
With the advancement in technology, attackers are making use of cyberspace to perform various cyber attacks. Cyber frameworks are highly sensitive to intrusion as well as many other threats. As every workplaces now a days are connected to some network in one way or another leads to heavy traffic or network congestion, more security attack attempts and security breaches. We need to have security from these attacks. The treatment of various attacks is also accessible, but the approach to find which system is being attacked is difficult. This paper provides an introduction of the Cyber Security techniques and how Artificial Intelligence (AI) could help in solving the cyber security problems. It also shows the work done in the area of Artificial Intelligence for fighting against cyber assaults.
Willem de Ru
Computer-based information systems will probably always have to contend with security issues. Much research have already gone into the field of information security. These research results have yielded some very sophisticated and effective security mechanisms and procedures. However, due to the ever increasing sophistication of criminals, combined with the ever changing and evolving information technology environment, some limitations still exist within the field of information security. Recent years have seen the proliferation of products embracing so-called artificial intelligence technologies. These products are in fields as diverse as engineering, business and medicine. The successes achieved in these fields pose the question whether artificial intelligence has a role to play within the field of information secu-
International Journal of Software Engineering & Applications
Internet usage has increased quickly, particularly in the previous decade. With the widespread use of the internet, cybercrime is growing at an alarming rate in our daily lives. However, with the growth of artificial intelligence (AI), businesses are concentrating more on preventing cybercrime. AI is becoming an essential component of every business, affecting individuals worldwide. Cybercrime is one of the most prominent domains where AI has begun demonstrating valuable inputs. As a result, AI is being deployed as the first line of defense in most firms' systems. Because AI can detect new assaults faster than humans, it is the best alternative for constructing better protection against cybercrime. AI technologies also offer more significant potential in the development of such technology. This paper discusses recent cyber intrusions and how the AI-enabled industry is preparing to defend itself in the long run.
Central Asian Studies
In this advanced world, with the upheaval of IoT and connected gadgets, network protection specialists face plenty of experiences. The specialists need all the assistance to forestall assaults and security breaks and react to the assaults. The number of connected working environments leads to weighty traffic, greater security assault vectors, security penetrates, and lots more that the digital territory can't be taken care of by people while not sizeable robotization. It has ended up being obvious that various network safety issues are also settled with progress just systems of computerized reasoning region unit securing used. Digital protection processing applications and investigations the perspectives on improving the network safety capacities by proposing artificial intelligence applications and the all around existing techniques.
Selma Dilek , Mustafa Aydın
With the advances in information technology (IT) criminals are using cyberspace to commit numerous cyber crimes. Cyber infrastructures are highly vulnerable to intrusions and other threats. Physical devices and human intervention are not sufficient for monitoring and protection of these infrastructures; hence, there is a need for more sophisticated cyber defense systems that need to be flexible, adaptable and robust, and able to detect a wide variety of threats and make intelligent real-time decisions. Numerous bio-inspired computing methods of Artificial Intelligence have been increasingly playing an important role in cyber crime detection and prevention. The purpose of this study is to present advances made so far in the field of applying AI techniques for combating cyber crimes, to demonstrate how these techniques can be an effective tool for detection and prevention of cyber attacks, as well as to give the scope for future work.
Dr. Husam Jasim Mohammed
2021, Materials Today: Proceedings
The aim of the researcher was to determine the effectiveness of artificial intelligence techniques against cyber security risks particularly in case of Iraq, Researcher has opted for quantitative method of research design along with primary data. The researcher collected the data from employees working in this IT industry. The sample size for this study was 468 and confirmatory factor analysis, discriminant validity, basic analysis of model and lastly, hypothesis assessment was carried out. The P-values of all variables were obtained as significant apart from expert system which had no significant relation with artificial intelligence and cyber security. Geographical area, sample size, less variables and accessibility was the main issue.
Dr. Iqbal H. Sarker
2021, SN Computer Science, Springer
Artificial intelligence (AI) is one of the key technologies of the Fourth Industrial Revolution (or Industry 4.0), which can be used for the protection of Internet-connected systems from cyber threats, attacks, damage, or unauthorized access. To intelligently solve today's various cybersecurity issues, popular AI techniques involving machine learning and deep learning methods, the concept of natural language processing, knowledge representation and reasoning, as well as the concept of knowledge or rule-based expert systems modeling can be used. Based on these AI methods, in this paper, we present a comprehensive view on "AI-driven Cybersecurity" that can play an important role for intelligent cybersecurity services and management. The security intelligence modeling based on such AI methods can make the cybersecurity computing process automated and intelligent than the conventional security systems. We also highlight several research directions within the scope of our study, which can help researchers do future research in the area. Overall, this paper's ultimate objective is to serve as a reference point and guidelines for cybersecurity researchers as well as industry professionals in the area, especially from an intelligent computing or AI-based technical point of view.
- We're Hiring!
- Help Center
- Find new research papers in:
- Health Sciences
- Earth Sciences
- Cognitive Science
- Computer Science
- Academia ©2023
- © 2023
Artificial Intelligence in Cyber Security: Theories and Applications
- Tushar Bhardwaj 0 ,
- Himanshu Upadhyay 1 ,
- Tarun Kumar Sharma 2 ,
- Steven Lawrence Fernandes 3
Applied Research Center, Florida International University, Miami Fl, USA
You can also search for this editor in PubMed Google Scholar
Shobhit University, Gangoh, India
Department of computer science, creighton university, omaha, usa.
Highlights the applications and theory of artificial intelligence in the domain of cybersecurity
Presents applications of innovative approaches in real-time environments
Proposes new approaches and ideas
Part of the book series: Intelligent Systems Reference Library (ISRL, volume 240)
- Table of contents
About this book
Editors and affiliations, bibliographic information, buying options.
- Available as EPUB and PDF
- Read on any device
- Instant download
- Own it forever
- Durable hardcover edition
- Dispatched in 3 to 5 business days
- Free shipping worldwide - see info
Tax calculation will be finalised at checkout
Other ways to access
This is a preview of subscription content, access via your institution .
Table of contents (9 chapters)
Front matter, a comprehensive review on cloud security using machine learning techniques.
- Divya Gangwani, Harshal A. Sanghvi, Viral Parmar, Riki H. Patel, Abhijit S. Pandya
Energy Enhanced Routing Protocol for Heterogeneous Networks
- Satyanarayana Mummana, Ramana Babu Budimure, Bosubabu Sambana, Preethi Gandreti, A. Chandra Sekhar
Sentiment Analysis “Using SVM, KNN and SVM with PCA”
- Praveen Verma, Tushar Bhardwaj, Abhay Bhatia, Mohd Mursleen
Security Attack Detection Using Machine Learning and Deep Learning
- Tarun Jain, Nityaa Kalra, Deepak Panwar, Aditya Sinha
Integration of Machine Learning with Cybersecurity: Applications and Challenges
- Suprabha Das, Pranav Gangwani, Himanshu Upadhyay
AI-Based Anomaly Detection on IoT Data-Driven Thermal Power Plants for Condition Monitoring and Preventive Maintenance
- Pranav Gangwani, Santosh Joshi, Himanshu Upadhyay, Leonel Lagos
Deep Learning Aided Intrusion Detection for Smart Grid Cyber Security
- MD. Rifat Hossain, Tushar Bhardwaj
Learning-Based Model for Phishing Attack Detection
- Jayesh Soni, Surya Sirigineedi, Krishna Sai Vutukuru, S. S. ChandanaEswari Sirigineedi, Nagarajan Prabakar, Himanshu Upadhyay
Deep Learning Approach for Detection of Fraudulent Credit Card Transactions
- Jayesh Soni, Pranav Gangwani, Surya Sirigineedi, Santosh Joshi, Nagarajan Prabakar, Himanshu Upadhyay et al.
This book highlights the applications and theory of artificial intelligence in the domain of cybersecurity.
The book proposes new approaches and ideas to present applications of innovative approaches in real-time environments. In the past few decades, there has been an exponential rise in the application of artificial intelligence technologies (such as deep learning, machine learning, blockchain) for solving complex and intricate problems arising in the domain of cybersecurity. The versatility of these techniques has made them a favorite among scientists and researchers working in diverse areas.
- Intelligent Systems
- Artificial Intelligence
- Cyber Security
- Deep Learning
- Anomaly detection
- Neural Networks
Tushar Bhardwaj, Himanshu Upadhyay
Tarun Kumar Sharma
Steven Lawrence Fernandes
Book Title : Artificial Intelligence in Cyber Security: Theories and Applications
Editors : Tushar Bhardwaj, Himanshu Upadhyay, Tarun Kumar Sharma, Steven Lawrence Fernandes
Series Title : Intelligent Systems Reference Library
DOI : https://doi.org/10.1007/978-3-031-28581-3
Publisher : Springer Cham
eBook Packages : Intelligent Technologies and Robotics , Intelligent Technologies and Robotics (R0)
Copyright Information : The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature Switzerland AG 2023
Hardcover ISBN : 978-3-031-28580-6 Published: 07 October 2023
Softcover ISBN : 978-3-031-28583-7 Due: 21 October 2024
eBook ISBN : 978-3-031-28581-3 Published: 06 October 2023
Series ISSN : 1868-4394
Series E-ISSN : 1868-4408
Edition Number : 1
Number of Pages : X, 138
Number of Illustrations : 10 b/w illustrations, 33 illustrations in colour
Topics : Computational Intelligence , Data Engineering , Artificial Intelligence , Systems and Data Security
- Find a journal
- Publish with us