Journal articles on the topic 'AI-Powered Security'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'AI-Powered Security.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Poongodi, R. K. "Zero Trust AI Authentication and Blockchain Powered Secure AI." International Journal for Research in Applied Science and Engineering Technology 13, no. 2 (2025): 52–56. https://doi.org/10.22214/ijraset.2025.66800.
Full textGudimetla, Sandeep Reddy, and Niranjan Reddy Kotha. "AI-POWERED THREAT DETECTION IN CLOUD ENVIRONMENTS." Turkish Journal of Computer and Mathematics Education (TURCOMAT) 9, no. 1 (2018): 638–42. http://dx.doi.org/10.61841/turcomat.v9i1.14730.
Full textSohaib uz Zaman, Erum Parveen, and Syed Hasnain Alam. "AI to Enhance the Transactional Security in Digital Banking." Journal of Management & Social Science 2, no. 2 (2025): 1–22. https://doi.org/10.63075/2apb3z22.
Full textDongare, Chinmay, Shubham Jha, Akshara Raul, and Maya Patil. "GUARDIANWATCH: AI-POWERED PUBLIC SAFETY SURVEILLANCE." ICTACT Journal on Data Science and Machine Learning 6, no. 1 (2024): 724–28. https://doi.org/10.21917/ijdsml.2024.0148.
Full textAkhtar, Zarif Bin, and Ahmed Tajbiul Rawol. "Enhancing Cybersecurity through AI-Powered Security Mechanisms." IT Journal Research and Development 9, no. 1 (2024): 50–67. http://dx.doi.org/10.25299/itjrd.2024.16852.
Full textAbubakar, Ruqayyah Abdullahi, Ahmed Abubakar Aliyu, Zahra B. Yashe, et al. "Enhanced AI-Powered Customer Experience Model." Science World Journal 20, no. 1 (2025): 17–21. https://doi.org/10.4314/swj.v20i1.3.
Full textGandham, Deepak. "AI-POWERED API SECURITY: REVOLUTIONIZING DIGITAL DEFENSE." INTERNATIONAL JOURNAL OF INFORMATION TECHNOLOGY AND MANAGEMENT INFORMATION SYSTEMS 16, no. 1 (2025): 358–69. https://doi.org/10.34218/ijitmis_16_01_027.
Full textkhan, Emad, MD Hafizullah, MD Saif, MD Ashraf Ansari, and Neha Kumari. "AI powered: Election voting system." International Journal of Research in Engineering and Innovation 09, no. 04 (2025): 199–204. https://doi.org/10.36037/ijrei.2025.9408.
Full textArun Kumar Soumya, Akash. "AI-Powered Strategies for Enhanced Email Security and Phishing Defense." International Journal of Science and Research (IJSR) 13, no. 12 (2024): 1335–37. https://doi.org/10.21275/sr241220090939.
Full textSwapna Reddy Anugu. "AI in Financial Services: Revolutionizing Fraud Detection and Risk Management." International Journal of Scientific Research in Computer Science, Engineering and Information Technology 11, no. 2 (2025): 208–17. https://doi.org/10.32628/cseit25112354.
Full textArefin, Sabira. "Strengthening Healthcare Data Security with Ai-Powered Threat Detection." International Journal of Scientific Research and Management (IJSRM) 12, no. 10 (2024): 1477–83. http://dx.doi.org/10.18535/ijsrm/v12i10.ec02.
Full textSudheer Obbu. "Zero trust architecture for AI-powered cloud systems: Securing the future of automated workloads." World Journal of Advanced Research and Reviews 26, no. 1 (2025): 1315–39. https://doi.org/10.30574/wjarr.2025.26.1.1173.
Full textAlok, Anand, Kumar Anish, Babu NJ Akash, Kumar Deepak, and M. K. Varshitha. "AI Powered Code Review Assistant." International Journal of Innovative Science and Research Technology (IJISRT) 9, no. 12 (2024): 458–63. https://doi.org/10.5281/zenodo.14533537.
Full textSandeep, Phanireddy. "AI-Powered Zero Trust Architecture for Web App Security." International Journal of Innovative Research in Engineering & Multidisciplinary Physical Sciences 11, no. 4 (2023): 1–6. https://doi.org/10.5281/zenodo.14945119.
Full textGaddam, Narayana. "AI-POWERED KEY DISTRIBUTION MECHANISM FOR IOT SECURITY." INTERNATIONAL JOURNAL OF INTERNET OF THINGS 1, no. 1 (2023): 16–28. https://doi.org/10.34218/ijiot_01_01_003.
Full textHusnain, Ali. "Artificial Intelligence and Deep Learning in Healthcare, Cyber security, and Food Systems: A Comprehensive Review of Applications, Challenges, and Future Directions." Global Journal of Emerging AI and Computing 1, no. 2 (2025): 95–126. https://doi.org/10.70445/gjeac.1.2.2025.95-126.
Full textMADHURI, BODIGARI, and SMT.A.KALPANA. "The AI-Powered Cybersecurity: Identifying A Threats in Digital Banking." Journal of Engineering Sciences 16, no. 04 (2025): 153–58. https://doi.org/10.36893/jes.2025.v16i04.025.
Full textMohsin, Zainab Rustum. "AI-Powered Encryption Revolutionizing Cybersecurity with Adaptive Cryptographic Algorithms." Turkish Journal of Computer and Mathematics Education (TURCOMAT) 16, no. 1 (2025): 44–62. https://doi.org/10.61841/turcomat.v16i1.14976.
Full textKolawole Joseph Ajiboye. "Ensuring data security and compliance in AI-powered business applications." Global Journal of Engineering and Technology Advances 15, no. 1 (2023): 125–42. https://doi.org/10.30574/gjeta.2023.15.1.0067.
Full textKotte, Girish. "AI-Powered Automated Incident Response in Healthcare Cybersecurity Operations." International Journal of All Research Education & Scientific Methods 13, no. 05 (2025): 3369–75. https://doi.org/10.56025/ijaresm.2025.1210243369.
Full textSutanto, Yulius. "Cybersecurity Challenges and AI-Powered Mitigation Strategies in CCTV Surveillance Systems." International Journal of Information System and Innovative Technology 3, no. 2 (2024): 17–24. https://doi.org/10.63322/fsk65573.
Full textKhan, Prottoy, Md Zahirul Islam, and Sazib Hossain. "AI-Powered Cybersecurity: Revolutionizing Business Threat Detection and Response." American Journal of Smart Technology and Solutions 4, no. 1 (2025): 37–48. https://doi.org/10.54536/ajsts.v4i1.4488.
Full textUpasana, Ranjan Singh Ashish, Raj Ritik, Raj Ritik, and Singh Satyarth. "Next Gen: AI Powered ERP." Recent Innovations in Wireless Network Security 7, no. 2 (2025): 26–35. https://doi.org/10.5281/zenodo.15300471.
Full textKulkarni,, Srushti. "AI Powered Contactless Fingerprint Recognition." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 05 (2024): 1–5. http://dx.doi.org/10.55041/ijsrem35013.
Full textC, Vivek. "AI-Powered Patient Case Similarity." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 09, no. 01 (2025): 1–9. https://doi.org/10.55041/ijsrem40833.
Full textChadrack, Irabaruta, and Dr Nyesheja Muhire Enan. "AI Powered Network Traffic Detection." Journal of Information and Technology 5, no. 2 (2025): 53–65. https://doi.org/10.70619/vol5iss2pp53-65.
Full textShravan Kumar Amjala. "AI-Powered Cloud Automation: A Scholarly Perspective." World Journal of Advanced Engineering Technology and Sciences 15, no. 2 (2025): 2664–72. https://doi.org/10.30574/wjaets.2025.15.2.0845.
Full textKumar, Manish. "AIRA : AI-Powered Code Review & Bug Detection System." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 09, no. 03 (2025): 1–9. https://doi.org/10.55041/ijsrem42592.
Full textSiva Krishna Jampani. "Revolutionizing Penetration Testing: AI-Powered Automation for Enterprise Security." International Journal of Scientific Research in Computer Science, Engineering and Information Technology 10, no. 6 (2024): 1562–69. https://doi.org/10.32628/cseit241061201.
Full textIvan, Mishchenko. "Biometric Authentication in Android: Enhancing Security with AI-Powered Solutions." Asian Journal of Research in Computer Science 18, no. 4 (2025): 416–26. https://doi.org/10.9734/ajrcos/2025/v18i4629.
Full textJyoti Bolannavar, Divyashree R, and Dr. Sumati Ramakrishna Gowda. "Intelligent Safety: Revolutionizing Home Security with AI and IoT." International Journal of Scientific Research in Computer Science, Engineering and Information Technology 10, no. 6 (2024): 2319–33. https://doi.org/10.32628/cseit2410481.
Full textKhan, Ali Raza A., Muhammad Ismaeel Khan, Aftab Arif, Nadeem Anjum, and Haroon Arif. "Intelligent Defense: Redefining OS Security with AI." International Journal of Innovative Research in Computer Science and Technology 13, no. 1 (2025): 85–90. https://doi.org/10.55524/ijircst.2025.13.1.13.
Full textAsst., Prof. Shraddhha Kulkarni. "AI -Powered Digital Marketing and its Vulnerabilities: A Cybersecurity Analysis." International Journal of Advance and Applied Research S6, no. 23 (2025): 188–90. https://doi.org/10.5281/zenodo.15195020.
Full textGifia S, Carolin, and Indhumathi S. "Gen AI-Powered Signature Identifier and Image Manipulation." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 09, no. 04 (2025): 1–9. https://doi.org/10.55041/ijsrem44457.
Full textNze, Stella Udoka. "AI-Powered Chatbots." Global Journal of Human Resource Management 12, no. 6 (2024): 34–45. http://dx.doi.org/10.37745/gjhrm.2013/vol12n63445.
Full textHarutyunyan, Gayane, Gyulnara Danielyan, and Khachatur Ghazeyan. "The effectiveness of ai-powered weapons from the standpoint of strategic decision-making (Case of Armenia)." International Journal of Innovative Research and Scientific Studies 8, no. 2 (2025): 2222–31. https://doi.org/10.53894/ijirss.v8i2.5650.
Full textSibin, Thomas. "AI-Powered Home Safety: The Next Generation of Security Systems." International Journal of Innovative Research in Engineering & Multidisciplinary Physical Sciences 7, no. 2 (2019): 1–5. https://doi.org/10.5281/zenodo.14951146.
Full textKrishnan, Mahendhiran. "API C4E Augmentation: AI-Powered Agent(AIPA) Framework." International Journal for Research in Applied Science and Engineering Technology 12, no. 11 (2024): 988–95. http://dx.doi.org/10.22214/ijraset.2024.65267.
Full textSunday Adeola Oladosu, Adebimpe Bolatito Ige, Christian Chukwuemeka Ike, Peter Adeyemo Adepoju, Olukunle Oladipupo Amoo, and Adeoye Idowu Afolabi. "Next-generation network security: conceptualizing a Unified, AI-Powered Security Architecture for Cloud-Native and On-Premise Environments." International Journal of Science and Technology Research Archive 3, no. 2 (2022): 270–80. https://doi.org/10.53771/ijstra.2022.3.2.0143.
Full textThomas Aerathu Mathew. "AI-powered threat detection: Strengthening data platform security with LLMs." World Journal of Advanced Research and Reviews 26, no. 2 (2025): 387–93. https://doi.org/10.30574/wjarr.2025.26.2.1604.
Full textB, Vivekanandam. "Surveillance 5.0: Next-Gen Security Powered by Quantum AI Optimization." June 2024 3, no. 1 (2024): 113–24. http://dx.doi.org/10.36548/rrrj.2024.1.008.
Full textChetan Prakash Ratnawat. "AI-Powered Financial Reporting Chatbots: Transforming Insurance Industry Operations." International Journal of Scientific Research in Computer Science, Engineering and Information Technology 10, no. 6 (2024): 1779–86. https://doi.org/10.32628/cseit241061222.
Full textUsta, Uygar, Sumer Erkan Kaya, and Savas Barış. "Using AI-Powered Vehicle Identification System in Gas Stations (AI-VIS)." Orclever Proceedings of Research and Development 3, no. 1 (2023): 255–63. http://dx.doi.org/10.56038/oprd.v3i1.330.
Full textReddy Gopireddy, Ravindar. "AI-Powered Security in Cloud Environments: Enhancing Data Protection and Threat Detection." International Journal of Science and Research (IJSR) 10, no. 11 (2021): 1568–72. http://dx.doi.org/10.21275/sr24731135001.
Full textGarg, Chanchal. "AI-Powered Talent Acquisition Platform." INTERNATIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 09, no. 05 (2025): 1–9. https://doi.org/10.55041/ijsrem47414.
Full textBiju, Ashwin, Abijith K, and Mrs Sajitha A S. "Secure Flow AI-Powered Redirection Blocker for Safe Browsing." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 09, no. 04 (2025): 1–9. https://doi.org/10.55041/ijsrem44339.
Full textAyush, Kumar Jha Shahi Raza Khan. "AI-Powered Context-Aware Blockchain Explorer." Career Point International Journal of Research(CPIJR) 1, no. 4 (2025): 53–72. https://doi.org/10.5281/zenodo.15137907.
Full textOlubusola Odeyemi, Chinwe Chinazo Okoye, Onyeka Chrisanctus Ofodile, Omotayo Bukola Adeoye, Wilhelmina Afua Addy, and Adeola Olusola Ajayi-Nifise. "INTEGRATING AI WITH BLOCKCHAIN FOR ENHANCED FINANCIAL SERVICES SECURITY." Finance & Accounting Research Journal 6, no. 3 (2024): 271–87. http://dx.doi.org/10.51594/farj.v6i3.855.
Full textVarma, Jahith Sai Krishna. "EagleAI: AI Powered Real Time Restricted Area Surveillance." International Journal for Research in Applied Science and Engineering Technology 13, no. 5 (2025): 3499–506. https://doi.org/10.22214/ijraset.2025.70612.
Full textAyomide, Oluwaromika Olukoya, Asiimire Shallon, and Refus Adigun Damilare. "Evaluating the Effectiveness of AI-Powered Cloud Based Threat Intelligence in Mitigating Phishing Attacks." International Journal of Innovative Science and Research Technology (IJISRT) 10, no. 1 (2025): 855–63. https://doi.org/10.5281/zenodo.14737744.
Full text