Academic literature on the topic 'AI-enabled security'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'AI-enabled security.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "AI-enabled security"
Patel, Ohm. "AI Enabled Security for Ethereum Blockchain Transactions." Journal of Artificial Intelligence & Cloud Computing 1, no. 4 (2022): 1–9. http://dx.doi.org/10.47363/jaicc/2022(1)372.
Full textFang, Binxing, Jinqiao Shi, Zhongru Wang, and Weiqiang Yu. "AI-Enabled Cyberspace Attacks: Security Risks and Countermeasures." Chinese Journal of Engineering Science 23, no. 3 (2021): 60. http://dx.doi.org/10.15302/j-sscae-2021.03.002.
Full textChiranjeevi, G., R. Abhishek Reddy, R. Shyam, Swati Sah, and Rejwan Bin Sulaiman. "Docker Based Decentralized Vulnerability Assessment with Port Scanning Powered by Artificial Intelligence." FMDB Transactions on Sustainable Intelligent Networks 1, no. 4 (2024): 220–41. https://doi.org/10.69888/ftsin.2024.000290.
Full textHan-Mei Liu. "AI-Enabled Adaptive Cybersecurity Response Using Reinforcement Learning." Frontiers in Artificial Intelligence Research 2, no. 1 (2025): 1–12. https://doi.org/10.71465/gwa30h81.
Full textAyaz, Ferheen, Zhengguo Sheng, Daxin Tian, Maziar Nekovee, and Nagham Saeed. "Blockchain-Empowered AI for 6G-Enabled Internet of Vehicles." Electronics 11, no. 20 (2022): 3339. http://dx.doi.org/10.3390/electronics11203339.
Full textRishitha, Kokku. "Revolutionizing DevOps Security: AI and ML-Enabled Automated Testing Approaches." International Journal of Current Science Research and Review 07, no. 10 (2024): 7947–51. https://doi.org/10.5281/zenodo.13972658.
Full textRishitha, Kokku. "Revolutionizing DevOps Security: AI and ML-Enabled Automated Testing Approaches." International Journal of Current Science Research and Review 07, no. 11 (2024): 8140–44. https://doi.org/10.5281/zenodo.14027398.
Full textResearcher. "BLOCKCHAIN-ENABLED AI GOVERNANCE FOR SCALABLE CLOUD SECURITY AUTOMATION." International Journal of Computer Engineering and Technology (IJCET) 15, no. 5 (2024): 947–59. https://doi.org/10.5281/zenodo.13962366.
Full textGupta, Hari, and Vikhyat Gupta. "Data Privacy and Security in AI-Enabled Platforms: The Role of the Chief Infosec Officer." Stallion Journal for Multidisciplinary Associated Research Studies 3, no. 5 (2024): 191–214. https://doi.org/10.55544/sjmars.3.5.15.
Full textKashyap, Gaurav. "AI in Blockchain-Enabled Healthcare Systems." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 12 (2024): 1–7. https://doi.org/10.55041/ijsrem17947.
Full textDissertations / Theses on the topic "AI-enabled security"
KRAYANI, ALI. "Learning Self-Awareness Models for Physical Layer Security in Cognitive and AI-enabled Radios." Doctoral thesis, Università degli studi di Genova, 2022. http://hdl.handle.net/11567/1074612.
Full textSYED, MUHAMMAD FARRUKH SHAHID. "Data-Driven Approach based on Deep Learning and Probabilistic Models for PHY-Layer Security in AI-enabled Cognitive Radio IoT." Doctoral thesis, Università degli studi di Genova, 2021. http://hdl.handle.net/11567/1048543.
Full textLautenschläger, Jana Katharina. "The effect of knowledge about artificial intelligence (Ai) on openness towards ai-enabled products and services: examining whether customer beliefs about the efficiency, convenience, privacy protection and data security of ai-enabled products and services mediate this effect." Master's thesis, 2020. http://hdl.handle.net/10362/104102.
Full textBooks on the topic "AI-enabled security"
Karimipour, Hadis, and Farnaz Derakhshan, eds. AI-Enabled Threat Detection and Security Analysis for Industrial IoT. Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-76613-9.
Full textKarimipour, Hadis, and Farnaz Derakhshan. AI-Enabled Threat Detection and Security Analysis for Industrial IoT. Springer International Publishing AG, 2022.
Find full textKarimipour, Hadis, and Farnaz Derakhshan. AI-Enabled Threat Detection and Security Analysis for Industrial IoT. Springer International Publishing AG, 2021.
Find full textLee, Cheng-Chi. Handbook of Security and Privacy of AI-Enabled Healthcare Systems and Internet of Medical Things. Taylor & Francis Group, 2023.
Find full textLee, Cheng-Chi. Handbook of Security and Privacy of AI-Enabled Healthcare Systems and Internet of Medical Things. Taylor & Francis Group, 2023.
Find full textLee, Cheng-Chi. Handbook of Security and Privacy of AI-Enabled Healthcare Systems and Internet of Medical Things. CRC Press LLC, 2023.
Find full textLee, Cheng-Chi. Handbook of Security and Privacy of AI-Enabled Healthcare Systems and Internet of Medical Things. Taylor & Francis Group, 2023.
Find full textBook chapters on the topic "AI-enabled security"
Strieder, Emanuele, Johanna Baehr, and Matthias Hiller. "AI-Enabled Hardware Security." In AI-Enabled Electronic Circuit and System Design. Springer Nature Switzerland, 2024. https://doi.org/10.1007/978-3-031-71436-8_9.
Full textGupta, Sunil, Monit Kapoor, and Sanjoy Kumar Debnath. "Future Directions for AI-Enabled Healthcare Security." In Artificial Intelligence-Enabled Security for Healthcare Systems. Springer Nature Switzerland, 2025. https://doi.org/10.1007/978-3-031-82810-2_9.
Full textSachdeva, Ritu, and Shilpa Bhatia. "Security and Privacy in Edge AI." In Edge Computational Intelligence for AI-Enabled IoT Systems. CRC Press, 2024. http://dx.doi.org/10.1201/9781032650722-6.
Full textGupta, Sunil, Monit Kapoor, and Sanjoy Kumar Debnath. "Best Practices for Implementing AI-Enabled Healthcare Security." In Artificial Intelligence-Enabled Security for Healthcare Systems. Springer Nature Switzerland, 2025. https://doi.org/10.1007/978-3-031-82810-2_7.
Full textGupta, Sunil, Monit Kapoor, and Sanjoy Kumar Debnath. "Challenges and Risks of AI-Enabled Healthcare Security." In Artificial Intelligence-Enabled Security for Healthcare Systems. Springer Nature Switzerland, 2025. https://doi.org/10.1007/978-3-031-82810-2_6.
Full textSayadi, Hossein, and Zhangying He. "Adapt and Defend: Reinforcement Learning for Hardware-Assisted Security." In AI-Enabled Electronic Circuit and System Design. Springer Nature Switzerland, 2024. https://doi.org/10.1007/978-3-031-71436-8_12.
Full textRouzbahani, Hossein Mohammadi, Zahra Faraji, Mohammad Amiri-Zarandi, and Hadis Karimipour. "AI-Enabled Security Monitoring in Smart Cyber Physical Grids." In Security of Cyber-Physical Systems. Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-45541-5_8.
Full textGupta, Sunil, Monit Kapoor, and Sanjoy Kumar Debnath. "Impact of AI-Enabled Healthcare Security on Patient Outcomes." In Artificial Intelligence-Enabled Security for Healthcare Systems. Springer Nature Switzerland, 2025. https://doi.org/10.1007/978-3-031-82810-2_8.
Full textDasari, Venkata Lakshmi, Ragini Mokkapati, Kotha Lavanya, and Gudditi Chetan. "Protecting AI-Enabled Industrial Engineering in Cloud and Edge Environments." In Industrial Internet of Things Security. CRC Press, 2024. http://dx.doi.org/10.1201/9781003466284-1.
Full textYogi, Manas Kumar, and A. S. N. Chakravarthy. "Novel Security Mechanism for AI Enabled Wastewater Treatment Systems." In Springer Water. Springer Nature Switzerland, 2024. http://dx.doi.org/10.1007/978-3-031-67237-8_12.
Full textConference papers on the topic "AI-enabled security"
Harguess, Josh, and Chris M. Ward. "Offensive security for AI systems: concepts, practices, and applications." In Assurance and Security for AI-enabled Systems 2025, edited by Joshua D. Harguess, Nathaniel D. Bastian, and Teresa L. Pace. SPIE, 2025. https://doi.org/10.1117/12.3055959.
Full textKapusta, Ariel, David Jin, Peter Teague, et al. "A framework for the assurance of AI-enabled systems." In Assurance and Security for AI-enabled Systems 2025, edited by Joshua D. Harguess, Nathaniel D. Bastian, and Teresa L. Pace. SPIE, 2025. https://doi.org/10.1117/12.3056719.
Full textVerma, Dinesh C., and Radha Ratnaparkhi. "Guardrails for safe implementations of AI-based services." In Assurance and Security for AI-enabled Systems 2025, edited by Joshua D. Harguess, Nathaniel D. Bastian, and Teresa L. Pace. SPIE, 2025. https://doi.org/10.1117/12.3051891.
Full textAiyagari, Sanjay, Elisa Bertino, Jan Bieniek, et al. "Security design for NLIP: a universal protocol for AI-enabled systems." In Assurance and Security for AI-enabled Systems 2025, edited by Joshua D. Harguess, Nathaniel D. Bastian, and Teresa L. Pace. SPIE, 2025. https://doi.org/10.1117/12.3055287.
Full textBastian, Nathaniel D. "Operational AI red-teaming: gaps and opportunities in the DoD." In Assurance and Security for AI-enabled Systems 2025, edited by Joshua D. Harguess, Nathaniel D. Bastian, and Teresa L. Pace. SPIE, 2025. https://doi.org/10.1117/12.3068030.
Full textVerma, Dinesh C., Pawan Chowdhary, David Beymer, Swanand R. Kadhe, Jon Lenchner, and Shiqiang Wang. "Patterns for combining large language models with knowledge bases to improve assurance, performance, and reliability of AI solutions." In Assurance and Security for AI-enabled Systems 2025, edited by Joshua D. Harguess, Nathaniel D. Bastian, and Teresa L. Pace. SPIE, 2025. https://doi.org/10.1117/12.3054792.
Full textManzonelli, Nico A., Sean M. Coffey, and Nathaniel D. Bastian. "How private are your chat adapters? Evaluating the privacy of LoRA fine-tuned large language models with membership inference attacks." In Assurance and Security for AI-enabled Systems 2025, edited by Joshua D. Harguess, Nathaniel D. Bastian, and Teresa L. Pace. SPIE, 2025. https://doi.org/10.1117/12.3053265.
Full textCybenko, George, Paul S. Lintilhac, Joshua M. Ackerman, and Nathaniel D. Bastian. "Quantifying adversarial risk of multimodal foundation models for military applications." In Assurance and Security for AI-enabled Systems 2025, edited by Joshua D. Harguess, Nathaniel D. Bastian, and Teresa L. Pace. SPIE, 2025. https://doi.org/10.1117/12.3052788.
Full textJagatheesaperumal, Senthil Kumar, Dhanupriyan Pothiraja, Satheesh Kumaresan, Mohamed Rahouti, Hamza Drid, and Khaled Hamouid. "Authentic key agreement scheme for blockchain-based smart grid applications." In Assurance and Security for AI-enabled Systems 2025, edited by Joshua D. Harguess, Nathaniel D. Bastian, and Teresa L. Pace. SPIE, 2025. https://doi.org/10.1117/12.3054791.
Full textWard, Chris M., and Josh Harguess. "Adversarial threat vectors and risk mitigation for retrieval-augmented generation systems." In Assurance and Security for AI-enabled Systems 2025, edited by Joshua D. Harguess, Nathaniel D. Bastian, and Teresa L. Pace. SPIE, 2025. https://doi.org/10.1117/12.3055931.
Full textReports on the topic "AI-enabled security"
Gehlhaus, Diana. Staying Ahead: Strengthening Tomorrow's U.S. AI and AI-Enabled Workforce. Center for Security and Emerging Technology, 2021. http://dx.doi.org/10.51593/20210075.
Full textHoffman, Wyatt. "Making AI Work for Cyber Defense: The Accuracy-Robustness Tradeoff ". Center for Security and Emerging Technology, 2021. http://dx.doi.org/10.51593/2021ca007.
Full textWilliams, Anthony. Open Source Congress 2024: Shaping the Future of Collaboration in AI, Security, and Digital Public Goods. The Linux Foundation, 2024. https://doi.org/10.70828/mton6557.
Full textPasupuleti, Murali Krishna. Quantum Semiconductors for Scalable and Fault-Tolerant Computing. National Education Services, 2025. https://doi.org/10.62311/nesx/rr825.
Full text