journal article Jan 01, 2024

Artificial Intelligence in Cyber Security

View at Publisher Save 10.2139/ssrn.4687831
Topics

No keywords indexed for this article. Browse by subject →

References
105
[1]
Iso/Iec Cybersecurity -guidelines for internet security (2023)
[2]
International Electrotechnical Commission. Iec -cyber security (2022)
[3]
Tomas Pl?ta Cyber-attacks to critical energy infrastructure and management issues: Overview of selected cases. Insights into regional development. Vilnius: Entrepreneurship and Sustainability Center (2020)
[4]
Enn Tyugu "Artificial intelligence in cyber defense" 2011 3rd International conference on cyber conflict (2011)
[5]
Alan M Turing Computing machinery and intelligence (2009)
[6]
John Mccarthy "Generality in artificial intelligence" Communications of the ACM (1987) 10.1145/33447.33448
[7]
Xavier Seuba "Big data, ai and border enforcement of intellectual property rights" Intelligence (1982)
[8]
H James Managing Risk to the National Information Infrastructure (1998)
[9]
Jeff A Stuart "Multi-gpu mapreduce on gpu clusters" 2011 IEEE International Parallel & Distributed Processing Symposium (2011) 10.1109/ipdps.2011.102
[10]
Constantine Manikopoulos "Network intrusion and fault detection: a statistical anomaly approach" IEEE Communications Magazine (2002) 10.1109/mcom.2002.1039860
[11]
Paulo Cg Costa Bayesian ontologies in ai systems (2006)
[12]
Peng Xie "Using bayesian networks for cyber security analysis" 2010 IEEE/IFIP International Conference on Dependable Systems & Networks (DSN) (2010) 10.1109/dsn.2010.5544924
[13]
Johnathan Mark S Boddy "Course of action generation for cyber security using classical planning" ICAPS (2005)
[14]
Namita Parati "Artificial intelligence based threat prevention and sensing engine: Architecture and design issues" 2008 First International Conference on Emerging Trends in Engineering and Technology (2008) 10.1109/icetet.2008.52
[15]
F Cyrus "Intelligent cyberspace interfaces and wap generic computing" IKS (2002)
[16]
Wei Li "Using genetic algorithm for network intrusion detection" Proceedings of the United States department of energy cyber security group (2004)
[17]
Konrad Rieck "Automatic analysis of malware behavior using machine learning" Journal of computer security (2011) 10.3233/jcs-2010-0410
[18]
Zihan Wu "Rtids: A robust transformer-based approach for intrusion detection system" IEEE Access (2022) 10.1109/access.2022.3182333
[19]
Zezxezbepj Wang Machine learning basics. Deep learning (2016)
[20]
L Chetan "Deep neural network models for computational histopathology: A survey" Medical Image Analysis (2021)
[21]
H Iqbal "Intrudtree: a machine learning based cyber security intrusion detection model" Symmetry (2020)
[22]
Nasrin Sultana Survey on sdn based network intrusion detection system using machine learning approaches. Peer-to-Peer Networking and Applications (2019)
[23]
Tien Dieu "Comparing the prediction performance of a deep learning neural network model with conventional machine learning models in landslide susceptibility assessment" Catena (2020)
[24]
Nikolaus Kriegeskorte "Neural network models and deep learning" Current Biology (2019) 10.1016/j.cub.2019.02.034
[25]
Simon Du "Gradient descent learns one-hidden-layer cnn: Don't be afraid of spurious local minima" International Conference on Machine Learning (2018)
[26]
C Ralf Understanding lstm-a tutorial into long short-term memory recurrent neural networks (2019)
[27]
Mahmoud Said Elsayed "Network anomaly detection using lstm based autoencoder" Proceedings of the 16th ACM Symposium on QoS and Security for Wireless and Mobile Networks (2020)
[28]
Kai Han "Transformer in transformer" Advances in Neural Information Processing Systems (2021)
[29]
Anh Tuan "Deepids: Deep learning approach for intrusion detection in software defined networking" Electronics (2020)
[30]
Distributed attack detection scheme using deep learning approach for Internet of Things

Abebe Abeshu Diro, Naveen Chilamkurti

Future Generation Computer Systems 2018 10.1016/j.future.2017.08.043
[31]
Chuanlong Yin "A deep learning approach for intrusion detection using recurrent neural networks" Ieee Access (2017) 10.1109/access.2017.2762418
[32]
Jihyun Kim "Long short term memory recurrent neural network classifier for intrusion detection" 2016 international conference on platform technology and service (PlatCon) (2016)
[33]
Partha S Sarker "Cyber anomaly-aware distributed voltage control with active power curtailment and ders" IEEE Transactions on Industry Applications (2023)
[34]
Kp Tripathi "A review on knowledge-based expert system: concept and architecture" IJCA Special Issue on Artificial Intelligence Techniques-Novel Approaches & Practical Applications (2011)
[35]
Mohamed Amine Ferrag "Rdtids: Rules and decision tree-based intrusion detection system for internet-of-things networks" Future internet (2020)
[36]
Bhushan Zakiyabanu S Malek "User behavior pattern-signature based intrusion detection" 2020 Fourth World Conference on Smart Trends in Systems, Security and Sustainability (WorldS4) (2020) 10.1109/worlds450073.2020.9210368
[37]
Joseph Bamidele Awotunde "Intrusion detection in industrial internet of things network-based on deep learning model with rule-based feature selection" Wireless communications and mobile computing (2021)
[38]
H Iqbal "Ai-driven cybersecurity: an overview, security intelligence modeling and research directions" SN Computer Science (2021)
[39]
Said Salloum "Phishing email detection using natural language processing techniques: a literature survey" Procedia Computer Science (2021) 10.1016/j.procs.2021.05.077
[40]
Tiberiu-Marian Georgescu "Natural language processing model for automatic analysis of cybersecurity-related documents" Symmetry (2020)
[41]
Hirokazu Otgonpurev Mendsaikhan "Identification of cybersecurity specific content using the doc2vec language model" 2019 IEEE 43rd annual computer software and applications conference (COMPSAC) (2019) 10.1109/compsac.2019.00064
[42]
Stephen Adams "Selecting system specific cybersecurity attack patterns using topic modeling" 2018 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/12th IEEE International Conference On Big Data Science And Engineering (2018)
[43]
Taneeya Satyapanich "Casie: Extracting cybersecurity event information from text" Proceedings of the AAAI conference on artificial intelligence (2020) 10.1609/aaai.v34i05.6401
[44]
Ram Shankar "Adversarial machine learning-industry perspectives" 2020 IEEE Security and Privacy Workshops (SPW) (2020)
[45]
Katina Michael "Biometrics and ai bias" IEEE Transactions on Technology and Society (2022) 10.1109/tts.2022.3156405
[46]
Andrew Mcstay "Emotional ai, soft biometrics and the surveillance of emotional life: An unusual consensus on privacy" Big Data & Society (2020)
[47]
Jacob Sakhnini "Ai and security of cyber physical systems: Opportunities and challenges" Security of Cyber-Physical Systems: Vulnerability and Impact (2020)
[48]
Vasileios Koutsouvelis "Detection of insider threats using artificial intelligence and visualisation" 2020 6th IEEE Conference on Network Softwarization (NetSoft) (2020) 10.1109/netsoft48620.2020.9165337
[49]
Marzieh Bitaab "Hybrid intrusion detection: Combining decision tree and gaussian mixture model" 2017 14th International ISC (Iranian Society of Cryptology) Conference on Information Security and Cryptology (ISCISC) (2017) 10.1109/iscisc.2017.8488375
[50]
Xinyu Yang "Toward a gaussian-mixture model-based detection scheme against data integrity attacks in the smart grid" IEEE Internet of Things Journal (2016)

Showing 50 of 105 references

Metrics
10
Citations
105
References
Details
Published
Jan 01, 2024
Cite This Article
Md Fazley Rafy (2024). Artificial Intelligence in Cyber Security. SSRN Electronic Journal. https://doi.org/10.2139/ssrn.4687831
Related

You May Also Like