Academic literature on the topic 'AI-Powered Security'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'AI-Powered Security.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "AI-Powered Security"

1

Poongodi, R. K. "Zero Trust AI Authentication and Blockchain Powered Secure AI." International Journal for Research in Applied Science and Engineering Technology 13, no. 2 (2025): 52–56. https://doi.org/10.22214/ijraset.2025.66800.

Full text
Abstract:
The integration of Zero Trust (ZT) security models with Artificial Intelligence (AI) authentication mechanisms, along with the utilization of blockchain technology, offers a novel paradigm for securing digital interactions and data exchanges in increasingly decentralized and complex networks. Zero Trust, a security framework that assumes no implicit trust and enforces strict identity verification, is well-suited for AI-driven authentication systems that require robust, real-time, and adaptive security measures Blockchain technology further enhances this framework by providing a transparent, im
APA, Harvard, Vancouver, ISO, and other styles
2

Gudimetla, Sandeep Reddy, and Niranjan Reddy Kotha. "AI-POWERED THREAT DETECTION IN CLOUD ENVIRONMENTS." Turkish Journal of Computer and Mathematics Education (TURCOMAT) 9, no. 1 (2018): 638–42. http://dx.doi.org/10.61841/turcomat.v9i1.14730.

Full text
Abstract:
This study assesses the effectiveness of artificial intelligence (AI) technologies in enhancing threat detection within cloud environments, a critical component given the escalating security challenges in cloud computing. Leveraging various AI methodologies, including machine learning models, deep learning, and anomaly detection techniques, the research aims to improve the accuracy and efficiency of security systems. These AI methods were applied to a series of simulated threat scenarios across diverse cloud platforms to evaluate their capability in real-time threat identification and mitigati
APA, Harvard, Vancouver, ISO, and other styles
3

Sohaib uz Zaman, Erum Parveen, and Syed Hasnain Alam. "AI to Enhance the Transactional Security in Digital Banking." Journal of Management & Social Science 2, no. 2 (2025): 1–22. https://doi.org/10.63075/2apb3z22.

Full text
Abstract:
The integration of artificial intelligence (AI) has enhanced banking operations by providing improved customer service, security, and efficiency. For data privacy and security, Banks must implement robust data security measures to gain customer trust as well as comply with regulatory requirements. Therefore, this study examined whether AI-based security systems can augment transactional safety, secure pay systems, and strengthen customer trust in digital banks. Quantitative research design and stratified random sampling technique is used for data collection. Questionnaire is filled up with dig
APA, Harvard, Vancouver, ISO, and other styles
4

Dongare, Chinmay, Shubham Jha, Akshara Raul, and Maya Patil. "GUARDIANWATCH: AI-POWERED PUBLIC SAFETY SURVEILLANCE." ICTACT Journal on Data Science and Machine Learning 6, no. 1 (2024): 724–28. https://doi.org/10.21917/ijdsml.2024.0148.

Full text
Abstract:
Nowadays, public safety is a key concern, particularly in fast urbanizing areas, urban development plans, and “smart city” projects where strong security measures have been implemented due to new security threats. The increasing trend of urbanization should be reflected in a coordinated approach to establishing efficient urban security systems. Current security systems have numerous constraints, including threat identification, on-the-spot analysis, and communication. These limitations become particularly emphasized in extremely complex urban areas with high populations and a broad range of ac
APA, Harvard, Vancouver, ISO, and other styles
5

Akhtar, Zarif Bin, and Ahmed Tajbiul Rawol. "Enhancing Cybersecurity through AI-Powered Security Mechanisms." IT Journal Research and Development 9, no. 1 (2024): 50–67. http://dx.doi.org/10.25299/itjrd.2024.16852.

Full text
Abstract:
In the rapidly evolving landscape of digital technology, the proliferation of interconnected systems has brought unprecedented opportunities and challenges. Among these challenges, the escalating frequency and sophistication of cyberattacks pose significant threats to individuals, organizations, and nations. In response, the fusion of Cybersecurity and Artificial Intelligence (AI) has emerged as a pivotal paradigm, offering proactive, intelligent, and adaptable defense mechanisms. This research explores the transformative impacts of AI-powered security on cybersecurity, demonstrating how AI te
APA, Harvard, Vancouver, ISO, and other styles
6

Abubakar, Ruqayyah Abdullahi, Ahmed Abubakar Aliyu, Zahra B. Yashe, et al. "Enhanced AI-Powered Customer Experience Model." Science World Journal 20, no. 1 (2025): 17–21. https://doi.org/10.4314/swj.v20i1.3.

Full text
Abstract:
This journal will focus on the intersection of artificial intelligence (AI) and customer experience (CX), highlighting how emerging technologies enhance customer interactions, personalization and satisfaction.AI- powered customer experience models are revolutionizing how business interact with customers by offering real-time, personalized and data-driven interactions. Today’s customers expect brands to anticipate their needs, resolve issues instantly, and provide seamless interactions across all channels. The enhanced AI- powered customer experience model aims to transform traditional customer
APA, Harvard, Vancouver, ISO, and other styles
7

Gandham, Deepak. "AI-POWERED API SECURITY: REVOLUTIONIZING DIGITAL DEFENSE." INTERNATIONAL JOURNAL OF INFORMATION TECHNOLOGY AND MANAGEMENT INFORMATION SYSTEMS 16, no. 1 (2025): 358–69. https://doi.org/10.34218/ijitmis_16_01_027.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

khan, Emad, MD Hafizullah, MD Saif, MD Ashraf Ansari, and Neha Kumari. "AI powered: Election voting system." International Journal of Research in Engineering and Innovation 09, no. 04 (2025): 199–204. https://doi.org/10.36037/ijrei.2025.9408.

Full text
Abstract:
In democratic countries, free and fair elections are essential for representative governance. Traditional voting systems, whether manual or electronic, face challenges in security, accuracy, and efficiency. This paper proposes an AI-powered Voting System developed using Java and a relational database, focusing on secure voter authentication, intelligent vote management, and automated result processing. The system integrates AI concepts like data validation and anomaly detection alongside a robust Java-based backend and database for reliable data handling. The system aims to enhance electoral p
APA, Harvard, Vancouver, ISO, and other styles
9

Arun Kumar Soumya, Akash. "AI-Powered Strategies for Enhanced Email Security and Phishing Defense." International Journal of Science and Research (IJSR) 13, no. 12 (2024): 1335–37. https://doi.org/10.21275/sr241220090939.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Swapna Reddy Anugu. "AI in Financial Services: Revolutionizing Fraud Detection and Risk Management." International Journal of Scientific Research in Computer Science, Engineering and Information Technology 11, no. 2 (2025): 208–17. https://doi.org/10.32628/cseit25112354.

Full text
Abstract:
This comprehensive article examines the transformative impact of artificial intelligence and machine learning technologies on financial institutions' approaches to fraud detection, risk management, and regulatory compliance. The article explores how cloud-powered AI solutions are revolutionizing security measures and operational efficiency in the financial sector. From advanced fraud detection systems to automated regulatory compliance, the article demonstrates how AI-driven solutions are enabling financial organizations to enhance their security posture while streamlining operations. The arti
APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "AI-Powered Security"

1

Albrecht, Eduardo. Political Automation. Oxford University Press, 2025. https://doi.org/10.1093/9780197696989.001.0001.

Full text
Abstract:
Abstract Governments, once staffed exclusively with human bureaucrats, now routinely use AI-based software to gather information about citizens and make decisions that impact their lives. In many nations, AI determines the level of privacy a person can enjoy, how far they can travel, what public benefits they may receive, and what they can and cannot say publicly. This amounts to a phenomenon of political automation rapidly materializing globally and begs the question: What input do citizens have in how these machines think? The book explores this question in various domains—including policing
APA, Harvard, Vancouver, ISO, and other styles
2

Потапенко, В. Г., І. А. Павленко, В. М. Нагірний, Є. В. Маляревський та А. А. Головка. Аналіз загроз національній безпеці у сфері внутрішньої політики. Національний інститут стратегічних досліджень, 2025. https://doi.org/10.53679/niss-analytrep.2025.06.

Full text
Abstract:
В аналітичній доповіді «Аналіз загроз національній безпеці у сфері внутрішньої політики» представлено результати третього щорічного експертного опитування, проведеного центром внутрішньополітичних досліджень НІСД. Учасники проєкту оцінювали дестабілізаційний потенціал загроз та ймовірність його реалізації. Оцінки експертів, назагал, корелюють з даними соціологічних опитувань. Уперше за час реалізації проєкту було проведене окреме опитування чат-ботів, що використовують штучний інтелект. Отримані результати можуть використати органи державної влади при розробці стратегічних документів та практи
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "AI-Powered Security"

1

Patsariya, Sanjay. "AI-powered autonomous weapons." In Artificial Intelligence for Cyber Security and Industry 4.0. CRC Press, 2025. https://doi.org/10.1201/9781032657264-10.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Syed, Aamiruddin. "AI-Powered Threat Detection and Mitigation." In Supply Chain Software Security. Apress, 2024. http://dx.doi.org/10.1007/979-8-8688-0799-2_6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Pálhalmi, János, and Anna Mező. "AI-Powered Microscopy Platform for Airborne Biothreat Detection." In Security Informatics and Law Enforcement. Springer Nature Switzerland, 2024. http://dx.doi.org/10.1007/978-3-031-62083-6_10.

Full text
Abstract:
AbstractBecause Bacillus anthracis is one of the most lethal bioweapons, it is critical to create rapid, label-free screening and early warning systems to detect and classify anomalies in bacillus form vegetative cell and spore concentrations in the air. Even though significant effort has been invested in the development of various sensor solutions to detect, monitor, and identify airborne biological agents, no standard, interoperable, real-time or near-real-time optical sensor-based biothreat monitoring solution exists. Aside from the numerous advantages of genomic methods in microbe identifi
APA, Harvard, Vancouver, ISO, and other styles
4

Wang, Zhi, Chaoge Liu, Xiang Cui, et al. "DeepC2: AI-Powered Covert Command and Control on OSNs." In Information and Communications Security. Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-15777-6_22.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Gowtham, H., J. Nandha Gopal, and A. Jose Anand. "Ethical Considerations and Privacy in AI-Powered Security." In Handbook of AI-Driven Threat Detection and Prevention. CRC Press, 2025. https://doi.org/10.1201/9781003521020-11.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Priya, P., B. Gopinath, M. Mohamed Ashif, and H. S. Yadeshwaran. "AI Powered Authentication for Smart Home Security—A Survey." In ICT with Intelligent Applications. Springer Nature Singapore, 2023. http://dx.doi.org/10.1007/978-981-99-3758-5_21.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Salama, Ramiz, Fadi Al-Turjman, and Rosario Culmone. "AI-Powered Drone to Address Smart City Security Issues." In Advanced Information Networking and Applications. Springer International Publishing, 2023. http://dx.doi.org/10.1007/978-3-031-28694-0_27.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Rajapaksha, Sampath, Janaka Senanayake, Harsha Kalutarage, and Mhd Omar Al-Kadri. "AI-Powered Vulnerability Detection for Secure Source Code Development." In Innovative Security Solutions for Information Technology and Communications. Springer Nature Switzerland, 2023. http://dx.doi.org/10.1007/978-3-031-32636-3_16.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Senanayake, Janaka, Harsha Kalutarage, Mhd Omar Al-Kadri, Andrei Petrovski, and Luca Piras. "Android Code Vulnerabilities Early Detection Using AI-Powered ACVED Plugin." In Data and Applications Security and Privacy XXXVII. Springer Nature Switzerland, 2023. http://dx.doi.org/10.1007/978-3-031-37586-6_20.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Patil, Jayashree, and Shwetambari Chiwhane. "AI-Powered Automated Methods for Predicting Liver Disease: A Recent Review." In Advancements in Smart Computing and Information Security. Springer Nature Switzerland, 2024. http://dx.doi.org/10.1007/978-3-031-58604-0_11.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "AI-Powered Security"

1

K, Yashaswini, Jyothi S, Prajwal Gowda G, N. Dhanvina, and Nishanth M S. "AI Powered Resource Management System." In 2024 IEEE International Conference on Blockchain and Distributed Systems Security (ICBDS). IEEE, 2024. https://doi.org/10.1109/icbds61829.2024.10837375.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Begum, S. Ariffa, N.Subbulakshmi, P.Sreenivasulu, K. Srinivasa Reddy, S.B.Jabiulla, and G.Raju. "AI-Powered Weapon Detection for Enhanced Public Security." In 2024 5th International Conference on Data Intelligence and Cognitive Informatics (ICDICI). IEEE, 2024. https://doi.org/10.1109/icdici62993.2024.10810984.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Yang, Shuo, Jianyu Niu, and Yinqian Zhang. "SoK: AI-Powered Security Analysis of Smart Contract." In 2024 International Conference on Meta Computing (ICMC). IEEE, 2024. https://doi.org/10.1109/icmc60390.2024.00017.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Zambrano, Patricio, Jenny Torres, Carlos Anchundia, and Johan Illicachi. "Mobbing: AI-Powered Cyberthreat Behavior Analysis and Modeling." In 2024 8th Cyber Security in Networking Conference (CSNet). IEEE, 2024. https://doi.org/10.1109/csnet64211.2024.10851721.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Rufsun, Shoaib, and Mohammad Naim Uddin. "i-Guard: An AI-Powered Security System Leveraging YOLOv10." In 2024 27th International Conference on Computer and Information Technology (ICCIT). IEEE, 2024. https://doi.org/10.1109/iccit64611.2024.11021860.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Ai, Jun. "AI-Powered Software Reliability Engineering and its Application." In 2025 11th International Symposium on System Security, Safety, and Reliability (ISSSR). IEEE, 2025. https://doi.org/10.1109/isssr65654.2025.00010.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Nacheva, Radka, and Otmane Azeroual. "Security of AI-Powered Systems: Threat Intelligence on the Edge." In 2024 8th International Symposium on Multidisciplinary Studies and Innovative Technologies (ISMSIT). IEEE, 2024. https://doi.org/10.1109/ismsit63511.2024.10757185.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Dhanalakshmi, M., B. Rahul, P. Bhuvaneswari, B. Guru Sneha, and K. Ramakalyani. "AI-Powered License Plate Recognition System for Enhanced Border Security." In 2025 International Conference on Knowledge Engineering and Communication Systems (ICKECS). IEEE, 2025. https://doi.org/10.1109/ickecs65700.2025.11035390.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Singh, Vernika, Ashok K, Navya M, P. Malvika Reddy, and Pranisha F. "AI-Powered Dermatological Diagnosis for Diverse Skin Diseases." In 2024 International Conference on Computational Intelligence for Security, Communication and Sustainable Development (CISCSD). IEEE, 2024. https://doi.org/10.1109/ciscsd63381.2024.00052.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Le, Ha V., Hieu T. Hoang, On V. Phung, and Hoa N. Nguyen. "ASAF: AI-powered Static Analysis Framework for Webshell Detection." In 2024 1st International Conference On Cryptography And Information Security (VCRIS). IEEE, 2024. https://doi.org/10.1109/vcris63677.2024.10813450.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "AI-Powered Security"

1

Pasupuleti, Murali Krishna. Securing AI-driven Infrastructure: Advanced Cybersecurity Frameworks for Cloud and Edge Computing Environments. National Education Services, 2025. https://doi.org/10.62311/nesx/rrv225.

Full text
Abstract:
Abstract: The rapid adoption of artificial intelligence (AI) in cloud and edge computing environments has transformed industries by enabling large-scale automation, real-time analytics, and intelligent decision-making. However, the increasing reliance on AI-powered infrastructures introduces significant cybersecurity challenges, including adversarial attacks, data privacy risks, and vulnerabilities in AI model supply chains. This research explores advanced cybersecurity frameworks tailored to protect AI-driven cloud and edge computing environments. It investigates AI-specific security threats,
APA, Harvard, Vancouver, ISO, and other styles
2

Pasupuleti, Murali Krishna. Quantum Intelligence: Machine Learning Algorithms for Secure Quantum Networks. National Education Services, 2025. https://doi.org/10.62311/nesx/rr925.

Full text
Abstract:
Abstract: As quantum computing and quantum communication technologies advance, securing quantum networks against emerging cyber threats has become a critical challenge. Traditional cryptographic methods are vulnerable to quantum attacks, necessitating the development of AI-driven security solutions. This research explores the integration of machine learning (ML) algorithms with quantum cryptographic frameworks to enhance Quantum Key Distribution (QKD), post-quantum cryptography (PQC), and real-time threat detection. AI-powered quantum security mechanisms, including neural network-based quantum
APA, Harvard, Vancouver, ISO, and other styles
3

Pasupuleti, Murali Krishna. Automated Smart Contracts: AI-powered Blockchain Technologies for Secure and Intelligent Decentralized Governance. National Education Services, 2025. https://doi.org/10.62311/nesx/rrv425.

Full text
Abstract:
Abstract: Automated smart contracts represent a paradigm shift in decentralized governance by integrating artificial intelligence (AI) with blockchain technologies to enhance security, scalability, and adaptability. Traditional smart contracts, while enabling trustless and automated transactions, often lack the flexibility to adapt to dynamic regulatory frameworks, evolving economic conditions, and real-time security threats. AI-powered smart contracts leverage machine learning, reinforcement learning, and predictive analytics to optimize contract execution, detect fraudulent transactions, and
APA, Harvard, Vancouver, ISO, and other styles
4

Pasupuleti, Murali Krishna. Next-Generation Extended Reality (XR): A Unified Framework for Integrating AR, VR, and AI-driven Immersive Technologies. National Education Services, 2025. https://doi.org/10.62311/nesx/rrv325.

Full text
Abstract:
Abstract: Extended Reality (XR), encompassing Augmented Reality (AR), Virtual Reality (VR), and Mixed Reality (MR), is evolving into a transformative technology with applications in healthcare, education, industrial training, smart cities, and entertainment. This research presents a unified framework integrating AI-driven XR technologies with computer vision, deep learning, cloud computing, and 5G connectivity to enhance immersion, interactivity, and scalability. AI-powered neural rendering, real-time physics simulation, spatial computing, and gesture recognition enable more realistic and adap
APA, Harvard, Vancouver, ISO, and other styles
5

Pasupuleti, Murali Krishna. Decentralized Creativity: AI-Infused Blockchain for Secure and Transparent Digital Innovation. National Education Services, 2025. https://doi.org/10.62311/nesx/rrvi125.

Full text
Abstract:
Abstract The convergence of artificial intelligence (AI) and blockchain technology is transforming the creative economy by enabling secure, transparent, and decentralized innovation in digital content creation, intellectual property management, and monetization. Traditional creative industries are often constrained by centralized platforms, opaque copyright enforcement, and unfair revenue distribution, which limit the autonomy and financial benefits of creators. By leveraging blockchain’s immutable ledger, smart contracts, and non-fungible tokens (NFTs), digital assets can be authenticated, to
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!